At a Glance
- Tasks: Lead vulnerability management and enhance cyber defence capabilities in a dynamic team.
- Company: Join a well-established security function within the Intellectual Property Office.
- Benefits: Enjoy competitive salary, hybrid working, unlimited learning access, and generous leave.
- Why this job: Make a real impact on cybersecurity while developing your skills in a supportive environment.
- Qualifications: Experience in vulnerability management and excellent communication skills are essential.
- Other info: Great career progression opportunities in a collaborative and innovative workplace.
The predicted salary is between 36000 - 60000 £ per year.
This role is for an experienced professional in vulnerability management and threat intelligence to join our Cyber Operations team. You will work closely with colleagues across the organisation to further mature and continuously improve our cyber defence capabilities. Cyber Operations forms part of a wider, well established security function operating within a highly regulated environment.
In this role, you will lead and continuously enhance the management of vulnerability assessments across our hybrid IT estate. You will prioritise remediation activities using a risk based, threat informed approach, collaborating with stakeholders to strengthen the security posture of our systems and services. You will also oversee our threat intelligence capability, identifying and maintaining relevant intelligence sources to inform tactical, operational, and strategic decision making. You will produce and share high quality threat intelligence products with internal and external stakeholders and use this intelligence to support vulnerability management and threat hunting activities. Additionally, you will contribute to incident response processes and provide support to colleagues responsible for the IPO's protection, detection, and response capabilities.
Working Style
This role will be carried out in-line with IPO Hybrid working arrangements where staff are currently expected to spend at least 20% of their time working onsite from one of our offices. This role is based in our Newport Office. The requirement for attendance at an office location can vary by role so we would encourage candidates to discuss working arrangements with the recruiting manager to agree a reasonable balance between working from home and the office.
Main duties consist of but are not limited to:
- Vulnerability Management (Primary Focus)
- Lead and enhance the organisation's vulnerability management programme, including our Penetration Testing programme across a complex hybrid IT environment covering both infrastructure and applications.
- Scoping, prioritising work, engaging with stakeholders, and ensuring remediation activities happen in a timely fashion.
- Prioritise vulnerabilities using a risk‑based, threat‑informed approach to support organisational objectives, regulatory requirements, and audit needs.
- Oversee the full lifecycle of vulnerabilities, including triage, mitigation planning, remediation recommendations, and stakeholder coordination.
- Develop and maintain vulnerability management policies, procedures, standards, and best practice guidance.
- Threat Intelligence
- Produce high quality tactical, operational, and strategic intelligence assessments and briefings using analysis and interpretation of current threat intelligence.
- Utilising and liaising with internal stakeholders, commercial sources, open-source intelligence and government partners to provide a rounded, comprehensive view of the current threat landscape.
- Lead initiatives to strengthen the organisation's intelligence capability and participate in information sharing communities.
- Incident Response Support
- Contribute and enhance our incident response processes, representing Cyber Security in operational incident calls, keeping stakeholders informed and liaising with government bodies to ensure timely and effective management of threat intelligence and threat hunting.
- Cyber Risk Management
- Play an integral part in Cyber Security risk management, conducting risk and threat assessments aligned with regulations.
- Using your knowledge of standards and expertise to support our stakeholders by providing pragmatic and proportionate advice and best practice guidance.
- Metrics & Reporting
- Develop and maintain actionable metrics that demonstrate the effectiveness of the organisation's vulnerability management and threat intelligence capabilities.
Person specification
Essential Criteria
- Strong understanding and experience of vulnerability management, threat intelligence and security operations.
- Experience of managing penetration testing programs.
- Broad technical knowledge, especially around cloud and hybrid technologies.
- Highly organised and self-motivated, able to manage and deliver on multiple concurrent tasks.
- Excellent communication and interpersonal skills.
- Ability to interact with stakeholders of all levels.
- A team player who is enthusiastic about contributing to the overall success of the team and collaborating with stakeholders of all levels.
- Sense of urgency and an ability to respond to tasks proactively and promptly.
- Continually stay abreast of emerging security technologies, threats and trends.
- Self-motivated to drive their learning needs.
How to Apply
Click the 'Apply now' button and complete the application form by providing the following:
- Your CV - Upload an anonymised copy of your current CV. Please remove all identifying markers such as name, title, education institution etc. Make sure it clearly shows how you meet the essential criteria listed in the Person Specification.
- 500-word Personal Statement - Use this to explain why you're suitable for the role. Structure your statement around the essential criteria in the Person Specification. Make sure to provide clear examples to show how you meet each requirement.
- Technical - Provide a 250-word example that demonstrates your technical ability: Penetration testing (focused on managing penetration testing programs rather than conducting the tests themselves).
Benefits
Alongside your salary of £47,766, Intellectual Property Office contributes £13,837 towards you being a member of the Civil Service Defined Benefit Pension scheme. Benefits include:
- Unlimited Pluralsight video learning access.
- Access to Microsoft's ESI training suite.
- Hybrid working with no core hours.
- Substantial support for career progression.
- 25 days annual leave moving to 30 days in annual increments.
- 8 days public leave and 1 day privilege leave.
Please note that benefits may be subject to change.
Incident and Vulnerability Manager - Newport in Saint Helens employer: Intellectual Property Office
Contact Detail:
Intellectual Property Office Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Incident and Vulnerability Manager - Newport in Saint Helens
✨Tip Number 1
Network like a pro! Reach out to your connections in the cyber security field, especially those who work at the IPO or similar organisations. A friendly chat can sometimes lead to insider info about job openings or even a referral.
✨Tip Number 2
Prepare for the interview by brushing up on your technical skills and understanding of vulnerability management. Be ready to discuss your experience with penetration testing and how you’ve tackled vulnerabilities in past roles.
✨Tip Number 3
Show off your communication skills! During interviews, make sure to articulate your thoughts clearly and engage with your interviewers. They want to see how well you can collaborate with stakeholders across different levels.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, it shows you’re serious about joining our team and contributing to our cyber defence capabilities.
We think you need these skills to ace Incident and Vulnerability Manager - Newport in Saint Helens
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the role of Incident and Vulnerability Manager. Highlight your experience in vulnerability management and threat intelligence, and don’t forget to showcase your communication skills and collaborative approach!
Craft a Compelling Personal Statement: Your 500-word personal statement is your chance to shine! Structure it around the essential criteria and provide clear examples that demonstrate how you meet each requirement. Be genuine and let your passion for cyber security come through.
Showcase Your Technical Skills: When providing your 250-word example of technical ability, focus on your experience with managing penetration testing programmes. Make it clear how your skills align with the needs of the role and the organisation.
Apply Through Our Website: We encourage you to apply through our website for a smooth application process. It’s the best way to ensure your application gets the attention it deserves, so don’t miss out!
How to prepare for a job interview at Intellectual Property Office
✨Know Your Vulnerabilities
Before the interview, brush up on your knowledge of vulnerability management and threat intelligence. Be ready to discuss specific examples from your experience, especially around managing penetration testing programmes. This will show that you understand the core responsibilities of the role.
✨Communicate Clearly
Since this role involves collaboration with various stakeholders, practice articulating your thoughts clearly and concisely. Use examples to demonstrate your excellent communication skills, especially when discussing complex technical concepts. Remember, it's not just about what you know, but how you convey it.
✨Show Your Organisational Skills
Be prepared to discuss how you manage multiple tasks and prioritise effectively. Share specific strategies or tools you use to stay organised, especially in a fast-paced environment like cyber operations. This will highlight your ability to handle the demands of the role.
✨Stay Current with Trends
Make sure you're up-to-date with the latest trends in cybersecurity, particularly around emerging threats and technologies. Bring this knowledge into the conversation to demonstrate your proactive approach to learning and your commitment to enhancing the organisation's security posture.