What you’ll be doing
as a Cyber Threat & Vulnerability Manager
1. Lead enterprise vulnerability management, ensuring frameworks for identifying, prioritising, and remediating vulnerabilities are defined, implemented, and continuously improved.
2. Manage the Cyber Threat Intelligence service, ensuring intelligence is collected, analysed, and operationalised to support risk reduction and security operations.
3. Collaborate with technical and business stakeholders to align TVM activities with organisational objectives and risk appetite.
4. Develop and maintain TVM documentation, including policies, standards, procedures, and governance controls.
5. Integrate and optimise vulnerability management, threat intelligence, and assessment tooling across enterprise systems and workflows.
6. Oversee intelligence-informed testing activities, including targeted assessments, exploit validation, and internal testing services.
7. Evaluate and recommend tools, technologies, and vendors to support and enhance TVM capabilities.
8. Investigate newly identified vulnerabilities and coordinate risk-based mitigation and remediation activities.
9. Work closely with technology teams to ensure effective patching, remediation tracking, and resolution of blockers.
10. Maintain and evolve the organisation’s cyber threat assessment methodology aligned with industry standards and risk management processes.
11. Lead proactive threat hunting activities to identify emerging threats and suspicious activity across the technology estate.
12. Develop and maintain dashboards, reporting, and operational metrics that demonstrate risk reduction and control effectiveness.
13. Ensure compliance with relevant standards and regulations such as GDPR, NIS, and ISO 27001.
14. Monitor and improve the effectiveness of TVM processes, controls, and supporting technologies.
15. Provide leadership, coaching, and performance management to the TVM and testing team.
16. Build and maintain strong relationships with external intelligence providers, vendors, and delivery partners.
17. Stay current with emerging threats, technologies, and industry best practices to continuously enhance security operations.
18. Support major incident response activities where required as part of Security Operations.
Base location – Hybrid – Clearwater Court, Reading.
Working pattern – 36 hours Monday to Friday.
What you should bring to the role
19. Experience leading or managing threat and vulnerability management processes and controls within a complex enterprise environment.
20. Strong experience in vulnerability remediation and patch management across diverse and evolving technology estates.
21. Experience managing cyber risks within dynamic digital and operational technology environments.
22. Ability to line manage and develop a team of security professionals towards shared objectives.
23. Strong analytical, problem-solving, and decision-making skills.
24. Experience managing third-party delivery partners, vendors, and service providers.
25. Excellent communication skills with the ability to explain complex security concepts to non-technical stakeholders.
26. Strong organisational, planning, and strategic thinking capabilities.
27. Innovative mindset with a focus on continuous improvement and measurable risk reduction.
28. Experience producing operational metrics and dashboards that demonstrate TVM effectiveness and cyber maturity improvements.
Technical experience and skills
29. Hands-on experience with vulnerability management and threat intelligence tools such as Tenable and Qualys.
30. Strong understanding of TVM concepts, including vulnerability assessment, threat modelling, OSINT, threat intelligence, and penetration testing.
31. Knowledge of patch management approaches across SaaS, IaaS, end-user computing, server, and enterprise technology environments.
32. Experience implementing risk-based approaches to vulnerability prioritisation and remediation.
33. Ability to develop dashboards and reporting that demonstrate control effectiveness, risk reduction, and technical debt management.
34. Experience aligning security practices with frameworks and regulations such as ISO 27001, NIS, and GDPR.
Desirable qualifications and experience
35. Experience working within utilities, critical infrastructure, or large complex enterprise environments.
36. Experience managing vulnerabilities and cyber risks within operational technology (OT) environments.
37. Familiarity with legacy systems and managing vulnerabilities within ageing technology estates.
38. Experience supporting cyber security transformation programmes and strategic cyber roadmaps.
Desirable technical skills and qualifications
39. Degree in Cyber Security, Computer Science, Information Technology, Engineering, or a related field.
40. Professional certifications such as CISSP, CISM, or CCSP.
41. TVM-specific certifications such as Certified Threat Intelligence Analyst (CTIA) or Certified Vulnerability Assessor (CVA).
42. Knowledge of penetration testing, ethical hacking, or related security assessment practices.
What’s in it for you?
43. Competitive salary: Up to £90,000 per annum, depending on experience.
44. Car Allowance: £5,800.
45. Annual Leave: 26 days holiday per year, increasing to 30 with the length of service (plus bank holidays).
46. Performance-related pay plan directly linked to company performance measures and targets
47. Generous Pension Scheme through AON.
48. Access to lots of benefits to help you take care of you and your family’s health and wellbeing, and your finances – from annual health MOTs and access to physiotherapy and counselling, to Cycle to Work schemes, shopping vouchers and life assurance.