At a Glance
- Tasks: Lead vulnerability management and enhance cyber defence capabilities in a dynamic team.
- Company: Join the Intellectual Property Office, a key player in cyber security.
- Benefits: Enjoy competitive salary, hybrid working, and extensive career development opportunities.
- Why this job: Make a real impact on national security while growing your skills in a supportive environment.
- Qualifications: Experience in vulnerability management and excellent communication skills are essential.
- Other info: Be part of a collaborative culture with a focus on continuous improvement.
The predicted salary is between 40000 - 60000 £ per year.
This role is for an experienced professional in vulnerability management and threat intelligence to join our Cyber Operations team. You will work closely with colleagues across the organisation to further mature and continuously improve our cyber defence capabilities. Cyber Operations forms part of a wider, well established security function operating within a highly regulated environment.
In this role, you will lead and continuously enhance the management of vulnerability assessments across our hybrid IT estate. You will prioritise remediation activities using a risk based, threat informed approach, collaborating with stakeholders to strengthen the security posture of our systems and services. You will also oversee our threat intelligence capability, identifying and maintaining relevant intelligence sources to inform tactical, operational, and strategic decision making. You will produce and share high quality threat intelligence products with internal and external stakeholders and use this intelligence to support vulnerability management and threat hunting activities. Additionally, you will contribute to incident response processes and provide support to colleagues responsible for the IPO's protection, detection, and response capabilities.
Working Style
This role will be carried out in-line with IPO Hybrid working arrangements where staff are currently expected to spend at least 20% of their time working onsite from one of our offices. This role is based in our Newport Office. The requirement for attendance at an office location can vary by role so we would encourage candidates to discuss working arrangements with the recruiting manager to agree a reasonable balance between working from home and the office.
Main duties consist of but are not limited to:
- Vulnerability Management (Primary Focus)
- Lead and enhance the organisation's vulnerability management programme, including our Penetration Testing programme across a complex hybrid IT environment covering both infrastructure and applications.
- Scoping, prioritising work, engaging with stakeholders, and ensuring remediation activities happen in a timely fashion.
- Prioritise vulnerabilities using a risk‑based, threat‑informed approach to support organisational objectives, regulatory requirements, and audit needs.
- Oversee the full lifecycle of vulnerabilities, including triage, mitigation planning, remediation recommendations, and stakeholder coordination.
- Develop and maintain vulnerability management policies, procedures, standards, and best practice guidance.
- Threat Intelligence
- Produce high quality tactical, operational, and strategic intelligence assessments and briefings using analysis and interpretation of current threat intelligence.
- Utilising and liaising with internal stakeholders, commercial sources, open-source intelligence and government partners to provide a rounded, comprehensive view of the current threat landscape.
- Lead initiatives to strengthen the organisation's intelligence capability and participate in information sharing communities.
- Incident Response Support
- Contribute and enhance our incident response processes, representing Cyber Security in operational incident calls, keeping stakeholders informed and liaising with government bodies to ensure timely and effective management of threat intelligence and threat hunting.
- Cyber Risk Management
- Play an integral part in Cyber Security risk management, conducting risk and threat assessments aligned with regulations.
- Using your knowledge of standards and expertise to support our stakeholders by providing pragmatic and proportionate advice and best practice guidance.
- Metrics & Reporting
- Develop and maintain actionable metrics that demonstrate the effectiveness of the organisation's vulnerability management and threat intelligence capabilities.
Person specification
Essential Criteria
- Strong understanding and experience of vulnerability management, threat intelligence and security operations.
- Experience of managing penetration testing programs.
- Broad technical knowledge, especially around cloud and hybrid technologies.
- Highly organised and self-motivated, able to manage and deliver on multiple concurrent tasks.
- Excellent communication and interpersonal skills.
- Ability to interact with stakeholders of all levels.
- A team player who is enthusiastic about contributing to the overall success of the team and collaborating with stakeholders of all levels.
- Sense of urgency and an ability to respond to tasks proactively and promptly.
- Continually stay abreast of emerging security technologies, threats and trends.
- Self-motivated to drive their learning needs.
How to Apply
Click the 'Apply now' button and complete the application form by providing the following:
- Your CV - Upload an anonymised copy of your current CV. Please remove all identifying markers such as name, title, education institution etc. Make sure it clearly shows how you meet the essential criteria listed in the Person Specification.
- 500-word Personal Statement - Use this to explain why you're suitable for the role. Structure your statement around the essential criteria in the Person Specification. Make sure to provide clear examples to show how you meet each requirement.
- Technical - Provide a 250-word example that demonstrates your technical ability: Penetration testing (focused on managing penetration testing programs rather than conducting the tests themselves).
Benefits
Alongside your salary of £47,766, Intellectual Property Office contributes £13,837 towards you being a member of the Civil Service Defined Benefit Pension scheme. Benefits include:
- Unlimited Pluralsight video learning access.
- Access to Microsoft's ESI training suite.
- Hybrid working with no core hours.
- Substantial support for career progression.
- 25 days annual leave moving to 30 days in annual increments.
- 8 days public leave and 1 day privilege leave.
Please note that benefits may be subject to change.
Incident and Vulnerability Manager - Newport in Lavant employer: Intellectual Property Office
Contact Detail:
Intellectual Property Office Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Incident and Vulnerability Manager - Newport in Lavant
✨Tip Number 1
Network like a pro! Reach out to your connections in the cyber security field, especially those who work at the IPO or similar organisations. A friendly chat can lead to insider info about the role and even a referral!
✨Tip Number 2
Prepare for the interview by brushing up on your technical skills. Make sure you can discuss your experience with vulnerability management and threat intelligence confidently. We want to see your passion and expertise shine through!
✨Tip Number 3
Don’t forget to showcase your soft skills! Communication and collaboration are key in this role, so be ready to share examples of how you've worked effectively with teams and stakeholders in the past.
✨Tip Number 4
Apply through our website! It’s the best way to ensure your application gets the attention it deserves. Plus, you’ll find all the details you need to tailor your application perfectly to the role.
We think you need these skills to ace Incident and Vulnerability Manager - Newport in Lavant
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the role of Incident and Vulnerability Manager. Highlight your experience in vulnerability management and threat intelligence, and don’t forget to showcase your communication skills and collaborative approach!
Craft a Compelling Personal Statement: Your personal statement is your chance to shine! Use it to explain why you’re the perfect fit for this role. Structure it around the essential criteria and provide clear examples that demonstrate your expertise in managing vulnerabilities and incident response.
Show Off Your Technical Skills: When providing your technical example, focus on your experience with penetration testing programmes. Make sure to clearly outline your role in managing these programmes rather than just conducting tests. Keep it concise and relevant!
Apply Through Our Website: We encourage you to apply through our website for a smooth application process. It’s the best way to ensure your application gets the attention it deserves. Don’t miss out on this opportunity to join our Cyber Operations team!
How to prepare for a job interview at Intellectual Property Office
✨Know Your Vulnerabilities
Before the interview, brush up on your knowledge of vulnerability management and threat intelligence. Be ready to discuss specific examples from your experience, especially around managing penetration testing programmes. This will show that you understand the core responsibilities of the role.
✨Communicate Clearly
Since this role involves collaboration with various stakeholders, practice articulating your thoughts clearly and concisely. Use examples to demonstrate your excellent communication skills, especially when discussing complex technical concepts in a way that non-technical colleagues can understand.
✨Show Your Organisational Skills
Be prepared to talk about how you manage multiple tasks and prioritise effectively. Share specific strategies or tools you use to stay organised, as this is crucial for leading vulnerability assessments and remediation activities in a fast-paced environment.
✨Engage with Current Threats
Stay updated on the latest trends in cyber threats and vulnerabilities. Bring insights into recent incidents or emerging technologies to the table during your interview. This demonstrates your proactive approach and commitment to continuous learning in the field of cybersecurity.