At a Glance
- Tasks: Lead the charge in identifying and managing cyber vulnerabilities to keep our systems secure.
- Company: Join a leading tech services provider with a commitment to innovation and inclusivity.
- Benefits: Enjoy competitive pay, flexible working options, and opportunities for professional growth.
- Why this job: Make a real difference in cybersecurity while working with cutting-edge technologies.
- Qualifications: Experience in cyber security and vulnerability management is essential.
- Other info: Be part of a diverse team that values your unique contributions and fosters career development.
The predicted salary is between 36000 - 60000 £ per year.
Location: UK - London, UK - Hatfield, UK - Milton Keynes, UK - Nottingham, UK - Reading
Life on the team
Are you passionate about staying one step ahead of cyber threats? Do you thrive in a fastāpaced, forwardāthinking security environment? If so, we would love to hear from you.
We are seeking a Vulnerability Manager to join our expanding global security teamāan expert group dedicated to protecting our platforms, services, and operational environments from an everāevolving threat landscape.
Who Are We?
We are a global community of security specialists united by a shared purpose: safeguarding the organisation on every front. Our team is built around three core functions:
- Security Engineering
- Vulnerability Operations
- Cyber Security Specialists
Together, these teams deliver a full-spectrum, dataādriven approach to vulnerability managementāensuring our environments remain secure, resilient, and futureāready.
Working as a Vulnerability Manager you will be responsible for the day-to-day delivery of the vulnerability management function, including its technology and processes. The role will be responsible for the identification, prioritisation and reporting of technical vulnerabilities, as well as providing expert support to operational delivery teams on the remediation of vulnerabilities.
What you will do:
- Be responsible for owning and operating the vulnerability management process for Computacenter.
- Execute the roadmap for vulnerability management processes and technologies.
- Be responsible for the day-to-day operation of vulnerability identification, assessment and alerting tooling.
- Identify, evaluate and prioritise vulnerability remediation activities across the Computacenter group.
- Provide expert security guidance to support resolver teams in the remediation of technical vulnerabilities and weaknesses.
- Provide experienced support to the vulnerability analysts.
- Operate the vulnerability management process across the Computacenter group to ensure cooperation amongst all centralised and regional resolver teams.
- Remain current on the latest cyber security threats, new vulnerabilities and the Tactics, Techniques, and Procedures (TTPs) used by threat actors exploiting them.
- Analyse vulnerability intelligence feeds to inform and prioritise vulnerability remediation.
- Operate as a technical vulnerability SME and support on the Group's response to new major vulnerabilities affecting Computacenter.
- Support in vulnerability investigation and analysis on cyber security incidents to support the Computacenter Cyber Security Incident Response Team (CSIRT).
- Proactively measure the effectiveness of the vulnerability management process through monitoring and conformance to policy and standards (patch, configuration etc).
- Identify opportunities for the continual improvement of the vulnerability management programme.
- Prepare regular, accurate and actionable reporting metrics to senior management and organisational stakeholders.
- Deliver vulnerability exposure reviews to technical resolver groups for their business areas across the group.
- Support the cyber risk management function by verifying that vulnerability controls are delivered for assets and information systems, identifying where controls are not being met and the cyber exposure that results for Computacenter.
- Support penetration testers in their delivery by providing accurate vulnerability analysis pre- and post-assessment.
- Support CTO with the technical validation of security controls.
- Support our internal organisation by ensuring vulnerability control requirements are delivered for assets and digital services.
What you will need:
- Demonstrable experience in Information and Cyber Security; especially vulnerability management.
- Experienced in vulnerability analysis and assessment, including the operation of risk-based vulnerability management.
- Experienced in the day-to-day operation of specialist security tooling for vulnerability identification and analysis (e.g., Tenable/Qualys/OWASP ZAP/MDE TVM etc.).
- Experienced in preparing threat and vulnerability briefings for management and technical resolvers.
- Practical experience in supporting IT operations including asset, configuration and patch management.
- Understanding of technical IT security best practices including endpoint security, network security, cloud security and the key vulnerabilities and threats affecting them.
- Understanding of common IT enterprise technologies - Windows, Linux, cloud, networking platforms etc. and a desire to deliver success with new and evolving technologies.
- Information security standards and frameworks including CIS, NIST, ISO 27001, Cyber Essentials (Plus), PCI DSS & GDPR.
- The MITRE ATT&CK Framework.
- Cyber threats and vulnerabilities.
- Advanced Persistent Threats (APT) and their associated Tactics, Techniques, and Procedures (TTP).
- Incident response and handling methodologies.
- Risk management processes (e.g., methods for assessing and mitigating risk).
- Recognised information security and/or information technology industry certification (CISM, CISSP, ISO27001 lead implementer, Nessus/Qualys or equivalent/superior).
About us
We are a leading independent technology and services provider, trusted by large corporate and public sector organisations. We are a responsible business that believes in winning together for our people and our planet. We help our customers to source, transform and manage their technology infrastructure to deliver digital transformation, enabling people and their business.
Our business may be about technology, but first of all it is about people. With over 20,000 people across 22 countries, we are proud of our inclusive culture - where everyone can thrive, feel valued, and truly belong.
As an equal opportunities employer, we are committed to ensuring fair and equal access to opportunities for all. Your application will be considered on its merits, regardless of your age, disability, ethnicity, gender identity, or any other characteristics protected by law. What matters most to us is that you share our vision and values, and bring the experience and skills we are looking for.
We are proud to be a Disability Confident Employer. We welcome applications from disabled people and accept applications in alternative formats. We also guarantee to interview applicants who have a disability.
If you share our values and want to make a meaningful impact in a supportive, forward-thinking environment - we would love to hear from you!
Vulnerability Manager in London employer: Computacenter AG & Co. oHG
Contact Detail:
Computacenter AG & Co. oHG Recruiting Team
StudySmarter Expert Advice š¤«
We think this is how you could land Vulnerability Manager in London
āØTip Number 1
Network like a pro! Reach out to folks in the cyber security field, especially those already working at Computacenter. A friendly chat can open doors and give you insider info on the role.
āØTip Number 2
Prepare for the interview by brushing up on the latest cyber threats and vulnerabilities. Show us youāre not just a candidate, but a passionate expert ready to tackle challenges head-on!
āØTip Number 3
Donāt forget to showcase your experience with vulnerability management tools like Tenable or Qualys. We want to see how youāve used these in real-world scenarios to make an impact.
āØTip Number 4
Finally, apply through our website! Itās the best way to ensure your application gets the attention it deserves. Plus, we love seeing candidates who take that extra step!
We think you need these skills to ace Vulnerability Manager in London
Some tips for your application š«”
Tailor Your CV: Make sure your CV is tailored to the Vulnerability Manager role. Highlight your experience in vulnerability management and any relevant tools you've used, like Tenable or Qualys. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how you can contribute to our team. Be sure to mention specific experiences that relate to the job description.
Showcase Your Knowledge: In your application, demonstrate your understanding of current cyber threats and vulnerabilities. Mention any frameworks or standards you're familiar with, like NIST or ISO 27001, as this shows us you're up-to-date and ready to tackle challenges.
Apply Through Our Website: We encourage you to apply through our website for the best chance of being noticed. Itās straightforward and ensures your application goes directly to us. Plus, we love seeing candidates who take the initiative to connect with us directly!
How to prepare for a job interview at Computacenter AG & Co. oHG
āØKnow Your Vulnerabilities
Before the interview, brush up on the latest vulnerabilities and threats in the cyber security landscape. Familiarise yourself with tools like Tenable or Qualys, as well as the MITRE ATT&CK Framework. This will show your passion for the role and your commitment to staying ahead of cyber threats.
āØShowcase Your Experience
Be ready to discuss your hands-on experience with vulnerability management processes and technologies. Prepare specific examples of how you've identified, prioritised, and remediated vulnerabilities in past roles. This will help demonstrate your expertise and problem-solving skills.
āØUnderstand the Companyās Needs
Research Computacenter's approach to cyber security and their specific challenges. Tailor your responses to align with their values and objectives, showing that youāre not just a fit for the role but also for the company culture.
āØPrepare Questions
Have insightful questions ready to ask at the end of the interview. Inquire about their current vulnerability management strategies or how they measure success in this area. This shows your genuine interest in the position and helps you assess if itās the right fit for you.