At a Glance
- Tasks: Lead the charge in identifying and managing cyber vulnerabilities to keep our systems secure.
- Company: Join a leading tech services provider committed to innovation and inclusivity.
- Benefits: Enjoy competitive pay, flexible working options, and opportunities for professional growth.
- Why this job: Make a real difference in cybersecurity while working with cutting-edge technologies.
- Qualifications: Experience in cyber security and vulnerability management is essential.
- Other info: Be part of a diverse team that values your unique contributions and perspectives.
The predicted salary is between 36000 - 60000 £ per year.
Location: UK - London, UK - Hatfield, UK - Milton Keynes, UK - Nottingham, UK - Reading
Contract type: Standard
Business Unit: Cyber Security
Life on the team
Are you passionate about staying one step ahead of cyber threats? Do you thrive in a fast‐paced, forward‐thinking security environment? If so, we’d love to hear from you.
We’re seeking a Vulnerability Manager to join our expanding global security team—an expert group dedicated to protecting our platforms, services, and operational environments from an ever‐evolving threat landscape.
Who Are We?
We are a global community of security specialists united by a shared purpose: safeguarding the organisation on every front. Our team is built around three core functions:
- Security Engineering
- Vulnerability Operations
- Cyber Security Specialists
Together, these teams deliver a full-spectrum, data‐driven approach to vulnerability management—ensuring our environments remain secure, resilient, and future‐ready.
Working as a Vulnerability Manager you will be responsible for the day‐to‐day delivery of the vulnerability management function, including its technology and processes. The role will be responsible for the identification, prioritisation and reporting of technical vulnerabilities, as well as providing expert support to operational delivery teams on the remediation of vulnerabilities.
What you’ll do
- Be responsible for owning and operating the vulnerability management process for Computacenter.
- Execute the roadmap for vulnerability management processes and technologies.
- Be responsible for the day‐to‐day operation of vulnerability identification, assessment and alerting tooling.
- Identify, evaluate and prioritise vulnerability remediation activities across the Computacenter group.
- Provide expert security guidance to support resolver teams in the remediation of technical vulnerabilities and weaknesses.
- Provide experienced support to the vulnerability analysts.
- Operate the vulnerability management process across the Computacenter group to ensure cooperation amongst all centralised and regional resolver teams.
- Remain current on the latest cyber security threats, new vulnerabilities and the Tactics, Techniques, and Procedures (TTPs) used by threat actors exploiting them.
- Analyse vulnerability intelligence feeds to inform and prioritise vulnerability remediation.
- Operate as a technical vulnerability SME and support on the Group's response to new major vulnerabilities affecting Computacenter.
- Support in vulnerability investigation and analysis on cyber security incidents to support the Computacenter Cyber Security Incident Response Team (CSIRT).
- Proactively measure the effectiveness of the vulnerability management process through monitoring and conformance to policy and standards (patch, configuration etc).
- Identify opportunities for the continual improvement of the vulnerability management programme.
- Prepare regular, accurate and actionable reporting metrics to senior management and organisational stakeholders.
- Deliver vulnerability exposure reviews to technical resolver groups for their business areas across the group.
- Support the cyber risk management function by verifying that vulnerability controls are delivered for assets and information systems, identifying where controls are not being met and the cyber exposure that results in for Computacenter.
- Support penetration testers in their delivery by providing accurate vulnerability analysis pre‐and post‐assessment.
- Support CTO with the technical validation of security controls.
- Support our internal organisation by ensuring vulnerability control requirements are delivered for assets and digital services.
What you’ll need
- Demonstrable experience in Information and Cyber Security; especially vulnerability management.
- Experienced in vulnerability analysis and assessment, including the operation of risk‐based vulnerability management.
- Experienced in the day‐to‐day operation of specialist security tooling for vulnerability identification and analysis (e.g., Tenable/Qualys/OWASP ZAP/MDE TVM etc.).
- Experienced in preparing threat and vulnerability briefings for management and technical resolvers.
- Practical experience in supporting IT operations including asset, configuration and patch management.
- Understanding of technical IT security best practices including endpoint security, network security, cloud security and the key vulnerabilities and threats affect them.
- Understanding of common IT enterprise technologies - Windows, Linux, cloud, networking platforms etc. and a desire to deliver success with new and evolving technologies.
- Information security standards and frameworks including CIS, NIST, ISO 27001, Cyber Essentials (Plus), PCI DSS & GDPR.
- The MITRE ATT&CK Framework.
- Cyber threats and vulnerabilities.
- Advanced Persistent Threats (APT) and their associated Tactics, Techniques, and Procedures (TTP).
- Incident response and handling methodologies.
- Risk management processes (e.g., methods for assessing and mitigating risk).
- Recognised information security and/or information technology industry certification (CISM, CISSP, ISO27001 lead implementer, Nessus/Qualys or equivalent/superior).
About us
We are a leading independent technology and services provider, trusted by large corporate and public sector organisations. We are a responsible business that believes in winning together for our people and our planet. We help our customers to source, transform and manage their technology infrastructure to deliver digital transformation, enabling people and their business.
Our business may be about technology, but first of all it’s about people. With over 20,000 people across 22 countries, we are proud of our inclusive culture - where everyone can thrive, feel valued, and truly belong.
As an equal opportunities employer, we’re committed to ensuring fair and equal access to opportunities for all. Your application will be considered on its merits, regardless of your age, disability, ethnicity, gender identity, or any other characteristics protected by law. What matters most to us is that you share our vision and values, and bring the experience and skills we’re looking for.
We are proud to be a Disability Confident Employer. We welcome applications from disabled people and accept applications in alternative formats. We also guarantee to interview applicants who have a disability.
If you share our values and want to make a meaningful impact in a supportive, forward‐thinking environment - we’d love to hear from you!
Vulnerability Manager in London employer: Computacenter
Contact Detail:
Computacenter Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Vulnerability Manager in London
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the cyber security field. Attend meetups, webinars, or even local events. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a portfolio or a personal website where you can showcase your projects, certifications, and any relevant experience. This is a great way to stand out and give potential employers a taste of what you can do.
✨Tip Number 3
Prepare for interviews by brushing up on common vulnerability management scenarios. Think about how you'd handle specific situations and be ready to discuss your thought process. Practice makes perfect, so consider mock interviews with friends or mentors.
✨Tip Number 4
Don't forget to apply through our website! We love seeing applications directly from candidates who are passionate about joining our team. Plus, it shows you're genuinely interested in being part of our mission to keep things secure.
We think you need these skills to ace Vulnerability Manager in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Vulnerability Manager role. Highlight your experience in vulnerability management and any relevant tools you've used, like Tenable or Qualys. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how you can contribute to our team. Be sure to mention specific experiences that relate to the job description.
Showcase Your Knowledge: Demonstrate your understanding of current cyber threats and vulnerabilities in your application. Mention any frameworks or standards you're familiar with, like NIST or ISO 27001, as this shows us you're up-to-date and ready to tackle challenges.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets to the right people. Plus, it shows us you're serious about joining our team!
How to prepare for a job interview at Computacenter
✨Know Your Vulnerabilities
Before the interview, brush up on the latest cyber threats and vulnerabilities. Familiarise yourself with tools like Tenable or Qualys, as well as the MITRE ATT&CK Framework. Being able to discuss recent vulnerabilities and how they relate to the role will show your passion and expertise.
✨Showcase Your Experience
Prepare specific examples from your past work that demonstrate your experience in vulnerability management. Highlight situations where you identified, prioritised, and remediated vulnerabilities. This will help the interviewers see how your skills align with their needs.
✨Understand the Company’s Security Culture
Research the company’s approach to cyber security and their values. Be ready to discuss how you can contribute to their mission of safeguarding their platforms and services. Showing that you understand their culture will set you apart from other candidates.
✨Ask Insightful Questions
Prepare thoughtful questions about the team dynamics, the tools they use, and their current challenges in vulnerability management. This not only shows your interest in the role but also helps you gauge if the company is the right fit for you.