Incident and Vulnerability Manager This role is for an experienced professional in vulnerability management and threat intelligence to join our Cyber Operations team. You will work closely with colleagues across the organisation to further mature and continuously improve our cyber defence capabilities. Cyber Operations forms part of a wider, well established security function operating within a highly regulated environment. In this role, you will lead and continuously enhance the management of vulnerability assessments across our hybrid IT estate. You will prioritise remediation activities using a risk based, threat informed approach, collaborating with stakeholders to strengthen the security posture of our systems and services. You will also oversee our threat intelligence capability, identifying and maintaining relevant intelligence sources to inform tactical, operational, and strategic decision making. You will produce and share high quality threat intelligence products with internal and external stakeholders and use this intelligence to support vulnerability management and threat hunting activities. Additionally, you will contribute to incident response processes and provide support to colleagues responsible for the IPOs protection, detection, and response capabilities. if you have strong relevant expertise, excellent communication skills and a collaborative working style we would love to hear from you. Working Style This role will be carried out in-line with IPO Hybrid working arrangements where staff are currently expected to spend at least 20% of their time working onsite from one of our offices. This role is based in our Newport Office. The requirement for attendance at an office location can vary by role so we would encourage candidates to discuss working arrangements with the recruiting manager to agree a reasonable balance between working from home and the office. Main duties consist of but are not limited to: Vulnerability Management (Primary Focus) Lead and enhance the organisations vulnerability management programme, including our Penetration Testing programme across a complex hybrid IT environment covering both infrastructure and applications. Scoping, prioritising work, engaging with stakeholders, and ensuring remediation activities happen in a timely fashion. Prioritise vulnerabilities using a risk-based, threat-informed approach to support organisational objectives, regulatory requirements, and audit needs. Oversee the full lifecycle of vulnerabilities, including triage, mitigation planning, remediation recommendations, and stakeholder coordination. Develop and maintain vulnerability management policies, procedures, standards, and best practice guidance. Threat Intelligence Produce high quality tactical, operational, and strategic intelligence assessments and briefings using analysis and interpretation of current threat intelligence. Utilising and liaising with internal stakeholders, commercial sources, open-source intelligence and government partners to provide a rounded, comprehensive view of the current threat landscape. Lead initiatives to strengthen the organisations intelligence capability and participate in information sharing communities. Incident Response Support Contribute and enhance our incident response processes, representing Cyber Security in operational incident calls, keeping stakeholders informed and liaising with government bodies to ensure timely and effective management of threat intelligence and threat hunting. Cyber Risk Management Play an integral part in Cyber Security risk management, conducting risk and threat assessments aligned with regulations. Using your knowledge of standards and expertise to support our stakeholders by providing pragmatic and proportionate advice and best practice guidance. Metrics & Reporting Develop and maintain actionable metrics that demonstrate the effectiveness of the organisations vulnerability management and threat intelligence capabilities. Person specification Essential Criteria Strong understanding and experience of vulnerability management, threat intelligence and security operations Experience of managing penetration testing programs Broad technical knowledge, especially around cloud and hybrid technologies. Highly organised and self-motivated, able to manage and deliver on multiple concurrent tasks. Excellent communication and interpersonal skills. Ability to interact with stakeholders of all levels. A team player who is enthusiastic about contributing to the overall success of the team and collaborating with stakeholders of all levels. Sense of urgency and an ability to respond to tasks proactively and promptly. Continually stay abreast of emerging security technologies, threats and trends. Self-motivated to drive their learning needs. How to Apply Click the Apply now button and complete the application form by providing the following: Your CV Upload an anonymised copy of your current CV. Please remove all identifying markers such as name, title, education institution etc. Make sure it clearly shows how you meet the essential criteria listed in the Person Specification. 500-word Personal Statement Use this to explain why youre suitable for the role. Structure your statement around the essential criteria in the Person Specification. Make sure to provide clear examples to show how you meet each requirement. Technical Provide a 250-word example that demonstrates your technical ability: Penetration testing(focussed on managing penetration testing programs rather thanconductingthe tests themselves): Level - Practitioner Well assess you against these behaviours during the selection process: Seeing the Big Picture Managing a Quality Service Changing and Improving Technical skills Well assess you against these technical skills during the selection process: Provide a 250-word example that demonstrates your technical ability. Penetration testing (focussed on managing penetration testing programs rather than conducting the tests themselves) : At interview a presentation will be used to assess this, Further details will be provided in your invite to interview. We only ask for evidence of these technical skills on your application form: Provide a 250-word example that demonstrates your technical ability. Penetration testing (focussed on managing penetration testing programs rather than conducting the tests themselves) : Benefits Alongside your salary of £47,766, Intellectual Property Office contributes £13,837 towards you being a member of the Civil Service Defined Benefit Pension scheme. Find out what benefits a Civil Service Pension provides. Unlimited Pluralsight video learning access Access to Microsofts ESI training suite Hybrid working with no core hours Substantial support for career progression 25 days annual leave moving to 30 days in annual increments You will also get 8 days public leave and 1 day privilege leave For more information about whats on offer at the Intellectual Property Office please review our IPO benefit pack attached to the bottom of this advert. Please note that benefits may be subject to change