Vulnerability Manager

Solihull
3 days ago
Create job alert

Vulnerability Manager
Hybrid role – Birmingham on site 2–3 days per week
£70,000 – £80,000 per annum (DOE)
12‑Month Fixed Term Contract
We have an exciting opportunity for a Vulnerability Manager to join a high‑performing Business Change and Technology function on a 12‑month fixed term salaried contract.
Reporting into the Information Security Manager, you will be responsible for managing, maintaining, and continuously improving the vulnerability management programme across a complex enterprise technology estate. This includes the identification, assessment, prioritisation, and remediation tracking of security vulnerabilities across on‑premises systems, cloud environments, networks, applications, and endpoint devices.
This role plays a critical part in ensuring the organisation’s technology environment remains secure, resilient, and aligned with internal security policies, legal and regulatory requirements, and industry best practice.
The Opportunity – Vulnerability Manager
Vulnerability Management & Analysis
Lead the end‑to‑end vulnerability management lifecycle, including discovery, scanning, validation, prioritisation, reporting, and remediation tracking. Operate and optimise vulnerability scanning platforms (e.g. Microsoft Defender Vulnerability Management, Edgescan, or equivalent). Conduct regular internal and external vulnerability assessments across infrastructure, applications, and cloud environments.Validate and analyse vulnerability data to ensure findings are accurate, contextualised, and relevant to the organisation’s operational environment.

  • Identify and assess critical vulnerabilities and zero‑day threats, determining when expedited remediation is required.
  • Assess vulnerability severity based on real‑world exploitability, considering threat intelligence, exposure, asset criticality, and compensating controls.
  • Maintain a defensible position on exploitable vs non‑exploitable vulnerabilities, clearly documenting risk decisions and rationale.
  • Assess and articulate business risk based on exploitability, asset value, and threat intelligence.
    Remediation Coordination
  • Work closely with internal technical teams and third‑party partners to ensure vulnerabilities are remediated within agreed SLAs and risk tolerances.
  • Develop remediation plans, monitor progress, and escalate high‑risk issues where necessary.
  • Support patch governance activities, ensuring both routine and emergency patching meets security requirements.
    Security Governance & Compliance
  • Ensure vulnerability management activities align with internal information security policies, standards, and procedures.
  • Support compliance with relevant regulatory and security frameworks (e.g. GDPR, PCI DSS).
  • Produce regular vulnerability risk reports, dashboards, and KPIs for senior stakeholders.
  • Provide evidence and reporting to support audits, penetration tests, and regulatory reviews.
    Threat Intelligence & Continuous Improvement
  • Integrate threat intelligence to prioritise remediation of actively exploited or high‑risk vulnerabilities.
  • Recommend and drive improvements to tools, processes, automation, and reporting to enhance programme maturity.
  • Stay current with emerging vulnerabilities, zero‑day threats, and vendor advisories.
  • Support incident response activities where vulnerabilities are linked to potential security events.
    What You’ll Bring
  • Proven experience in vulnerability management, cyber security operations, or a related technical security role. Strong hands‑on experience with vulnerability management tooling (e.g. Microsoft Defender Vulnerability Management, Edgescan, or similar). Solid understanding of cloud platforms (Azure), operating systems (Windows, Linux), networking, and enterprise technologies. Strong knowledge of CVSS scoring, exploit analysis, and risk‑based prioritisation. Experience working in large, complex enterprise environments. Familiarity with regulatory and compliance requirements relevant to vulnerability management. Knowledge of SIEM, SOAR, EDR, and associated security tooling. Strong analytical skills with the ability to translate technical risk into clear, executive‑level reporting. Experience supporting incident response and investigations. Excellent stakeholder management skills, with the confidence to challenge and influence both technical and non‑technical teams. Strong understanding of patch management processes and operational constraints in business‑critical environments. Able to manage multiple competing priorities and make pragmatic, risk‑based decisions.
    Qualifications
  • Proven hands‑on experience in vulnerability management or cyber security operations.
  • Demonstrable understanding of security principles, standards, and methodologies.
  • One or more of the following certifications preferred:
    CISM, CISSP, CEH, CompTIA Security+, CompTIA CySA+, GIAC GVMS

Related Jobs

View all jobs

Cybersecurity manager

SOC Manager - SC Cleared - Inside IR35

Cyber Operations Management & Oversight Manager - SC Cleared

Technical Programme Manager

Security Operations Centre (SOC) Manager – SC Cleared

Cyber Security Engineer

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.