At a Glance
- Tasks: Lead cyber threat and vulnerability management to enhance security across IT and OT environments.
- Company: Join Thames Water, a leader in cybersecurity resilience and innovation.
- Benefits: Competitive salary, generous annual leave, car allowance, and extensive health benefits.
- Other info: Hybrid working model with excellent career growth opportunities.
- Why this job: Make a real impact on cybersecurity while developing your skills in a dynamic environment.
- Qualifications: Experience in threat and vulnerability management with strong analytical and communication skills.
The predicted salary is between 90000 - 90000 € per year.
As a Cyber Threat & Vulnerability Manager, you will play a key role within the Security Operations function at Thames Water, leading the organisation’s approach to identifying, assessing, and reducing cyber risk across both IT and OT environments. Working closely with cybersecurity leadership, enterprise architects, and business stakeholders, you will ensure that threat and vulnerability management (TVM) capabilities are effective, scalable, and continuously improved. This role contributes to Thames Water’s cybersecurity resilience by establishing robust vulnerability management frameworks, integrating threat intelligence into risk processes, and driving proactive security improvements. You will collaborate across the organisation to reduce risk exposure, enhance cyber maturity, and ensure compliance with industry standards while maintaining strong governance and reporting practices. You must be able to obtain Counter Terrorist Check (CTC) Clearance to be eligible for this position.
What you’ll be doing as a Cyber Threat & Vulnerability Manager:
- Lead vulnerability management across the enterprise, ensuring frameworks for identification, categorisation, and mitigation are defined, implemented, and maintained.
- Establish and manage the operating model for vulnerability management, ensuring alignment and adoption across the business.
- Collaborate with stakeholders to develop threat assessment and TVM strategies aligned to organisational objectives.
- Develop and maintain TVM documentation, including policies, standards, and procedures.
- Integrate vulnerability management and threat intelligence tools with existing systems and infrastructure.
- Evaluate and recommend tools, technologies, and vendors to support TVM capabilities.
- Investigate newly identified vulnerabilities and provide risk‑based mitigation and remediation guidance.
- Coordinate with technology and business stakeholders to ensure effective patching and vulnerability remediation.
- Maintain and evolve a cyber threat assessment methodology aligned to industry standards.
- Perform proactive threat hunting to identify emerging risks across the technology estate.
- Develop and maintain dashboards and reporting to track vulnerability and threat metrics.
- Ensure compliance with relevant standards and regulations such as GDPR, NIS, and ISO 27001.
- Monitor and optimise TVM tool performance, implementing improvements where required.
- Provide technical leadership and guidance to junior team members.
- Build and maintain strong relationships with vendors and service providers.
- Stay current with emerging threats, technologies, and best practices to continuously enhance security operations.
- Support major incident response where required as part of Security Operations.
What you should bring to the role:
- Experience leading or managing threat and vulnerability management processes within a complex enterprise environment.
- Strong experience in vulnerability remediation and patch management across diverse technology stacks.
- Experience managing cyber risk across dynamic and evolving digital environments.
- Ability to line manage and develop at least one team member towards shared objectives.
- Strong analytical, problem‑solving, and decision‑making skills.
- Experience working with third‑party delivery partners and vendors.
- Excellent communication skills with the ability to explain complex security concepts to non‑technical stakeholders.
- Strong organisational, planning, and strategic thinking capabilities.
- Innovative mindset with a focus on continuous improvement and risk reduction.
Technical experience and skills:
- Hands‑on experience with vulnerability management tools such as Tenable and Qualys.
- Strong understanding of TVM concepts, including threat modelling, vulnerability assessment, and OSINT.
- Knowledge of patch management approaches across SaaS, IaaS, end‑user computing, and server environments.
- Ability to develop metrics and dashboards that demonstrate risk reduction and control effectiveness.
- Experience aligning security practices with frameworks such as ISO 27001, NIS, and GDPR.
Desirable qualifications and experience:
- Experience working within utilities, critical infrastructure, or large enterprise environments.
- Experience managing vulnerabilities in operational technology (OT) environments.
- Familiarity with legacy systems and managing risk in ageing technology estates.
- Experience supporting cyber security programmes and transformation initiatives.
Desirable technical skills and qualifications:
- Degree in Cyber Security, Computer Science, Information Technology, Engineering, or a related field.
- Professional certifications such as CISSP, CISM, or CCSP.
- TVM‑specific certifications such as Certified Threat Intelligence Analyst (CTIA) or Certified Vulnerability Assessor (CVA).
- Knowledge of penetration testing or ethical hacking practices.
What’s in it for you?
- Competitive salary: Up to £90,000 per annum, depending on experience.
- Car Allowance: £5,800.
- Annual Leave: 26 days holiday per year, increasing to 30 with the length of service (plus bank holidays).
- Performance‑related pay plan directly linked to company performance measures and targets.
- Generous Pension Scheme through AON.
- Access to a wide range of benefits to support health, wellbeing and finances, including annual health checks, physiotherapy, counselling, Cycle to Work schemes, shopping vouchers and life assurance.
Cyber Threat & Vulnerability Manager in Reading employer: Cyber UK
Thames Water is an exceptional employer, offering a dynamic work environment where innovation and collaboration thrive. As a Cyber Threat & Vulnerability Manager, you will benefit from a competitive salary, generous annual leave, and a robust pension scheme, all while contributing to the vital mission of enhancing cybersecurity resilience in a critical infrastructure setting. With a strong focus on employee growth and well-being, Thames Water provides numerous opportunities for professional development and access to a comprehensive range of health and financial benefits.
StudySmarter Expert Advice🤫
We think this is how you could land Cyber Threat & Vulnerability Manager in Reading
✨Tip Number 1
Network like a pro! Reach out to folks in the cybersecurity field, especially those at Thames Water. Attend industry events or webinars, and don’t be shy about sliding into DMs on LinkedIn. Building connections can open doors that job applications alone can't.
✨Tip Number 2
Show off your skills! Create a portfolio or a personal project that highlights your experience with vulnerability management tools like Tenable or Qualys. This not only demonstrates your expertise but also gives you something tangible to discuss during interviews.
✨Tip Number 3
Prepare for the interview by brushing up on your knowledge of industry standards like ISO 27001 and GDPR. Be ready to discuss how you've applied these in past roles. We want to see that you can translate complex security concepts into actionable strategies.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, it shows you’re genuinely interested in joining the team at Thames Water. Let’s get you that Cyber Threat & Vulnerability Manager role!
We think you need these skills to ace Cyber Threat & Vulnerability Manager in Reading
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the Cyber Threat & Vulnerability Manager role. Highlight your experience in threat and vulnerability management, and don’t forget to mention any relevant tools you've used like Tenable or Qualys.
Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you’re the perfect fit for this role. Mention how your skills align with the job description and show your enthusiasm for working with us at Thames Water.
Showcase Your Achievements:When detailing your experience, focus on specific achievements rather than just duties. Use metrics where possible to demonstrate how you’ve reduced risk or improved processes in previous roles.
Apply Through Our Website:We encourage you to apply through our website for a smoother application process. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates!
How to prepare for a job interview at Cyber UK
✨Know Your Cyber Threat Landscape
Before the interview, brush up on the latest trends in cyber threats and vulnerabilities. Familiarise yourself with tools like Tenable and Qualys, as well as frameworks such as ISO 27001 and GDPR. This will show that you’re not just knowledgeable but also proactive about staying current in the field.
✨Showcase Your Leadership Skills
As a Cyber Threat & Vulnerability Manager, you'll need to demonstrate your ability to lead and develop a team. Prepare examples of how you've successfully managed teams or projects in the past, focusing on your strategic thinking and problem-solving skills. Highlight any experience you have in mentoring junior team members.
✨Prepare for Technical Questions
Expect technical questions related to vulnerability management processes and patch management across various environments. Be ready to discuss your hands-on experience with specific tools and methodologies. Practising common interview questions can help you articulate your thoughts clearly and confidently.
✨Communicate Effectively with Non-Technical Stakeholders
Since you'll be collaborating with various stakeholders, practice explaining complex security concepts in simple terms. Think of examples where you've successfully communicated technical information to non-technical audiences. This will demonstrate your excellent communication skills and your ability to bridge the gap between technical and non-technical teams.