Cyber Threat Senior Manager

London, United Kingdom

EDF

EDF is an energy provider, supplying electricity and gas to homes and businesses in the UK. Compare our energy prices, get a quote and switch. Our electricity is zero carbon

View all jobs at EDF

Apply now Apply later

Job Description

Our Team

Cybersecurity has a fundamental role to play in the success of the EDF UK core mission in helping Britain achieve Net Zero by promoting trust and confidence in the EDF UK brand and the safety of nuclear power, the availability of EDF UK Systems which are critical to the safe and effective nuclear operational excellence, and by protecting the data of our customers and sensitive nuclear information

The cyber security team support business units by providing secure services and platforms to enable businesses to focus on their core missions. The cyber security team enable the EDF UK business units through the available, efficient, and effective provision of services, including architecture, monitoring & response, and security technologies.

 

What’s my role and where do I fit in?  

The Cyber Threat Senior Manager is a senior leadership position in Cyber. This individual will oversee multiple security functions—Cyber Threat Intelligence (CTI), Vulnerability Management, Threat Hunting, and eventually Penetration Testing—to create a proactive, intelligence-driven security posture. The Head of Cyber Threat will drive the strategic vision for threat management, lead cross-functional teams, and collaborate closely with other security and business stakeholders.

 

Strategy & Leadership

  • Define Vision & Roadmap: Develop a multi-year strategy for cyber threat intelligence, vulnerability management, threat hunting, and pen testing that aligns with the broader cybersecurity and business objectives.
  • Team Management: Build, mentor, and lead high-performing teams. Oversee hiring, professional development, and performance evaluations.
  • Budget & Resource Allocation: Plan and manage budgets for tools, subscription services, and staffing. Present business cases for new investments to leadership.

 

Cyber Threat Intelligence (CTI)

  • Threat Landscape Monitoring: Oversee the collection and analysis of threat data from diverse sources (open-source, commercial threat feeds, dark web intelligence).
  • Intelligence Reporting: Oversee the production of actionable threat intelligence products tailored to different audiences, from technical teams to executive leadership.
  • Collaboration & Partnerships: Develop relationships with government agencies, industry partners, and peers to enhance information sharing and collective defence.

 

Vulnerability Management

  • Program Governance: Work with the vulnerability manager to maintain a comprehensive vulnerability management program, including scanning, reporting, and remediation tracking.
  • Risk Prioritization: Work with IT operations and business units to prioritise vulnerabilities based on risk scores (CVSS, exploit availability, business impact, regulatory compliance) and drive timely remediation.
  •  
  • Metrics & Dashboards: Develop regular vulnerability management reports to show progress and highlight critical or overdue findings to senior leadership.
  • Partnership Development: Foster relationships with key industry partners, exploring opportunities for collaboration and innovation.

 

Threat Hunting

  • Methodologies & Frameworks: Implement threat hunting frameworks (e.g. MITRE ATT&CK) and maintain playbooks for proactive hunting activities.
  • Proactive Investigations: Coordinate with Security Operations Centre and Incident Response teams to detect and remove threats.
  • Tooling & Automation: Continuously evaluate new technologies (SIEM, EDR, XDR) to enhance visibility and streamline threat hunting processes.

 

Stakeholder Engagement

  • Executive Briefings: Translate complex technical threats and vulnerabilities into executive-friendly insights that articulate potential business risks and recommended actions.
  • Policy & Compliance Alignment: Collaborate with GRC to ensure adherence to relevant regulations.
  • Crisis Support: Provide real-time threat intelligence insights during major security incidents, supporting incident response and crisis communications.

 

What do I need to be great at this role?

You will need to have excellent stakeholder management skills, experience running cyber security teams in one or more areas: CTI, Vulnerability Management, Threat Hunting. The ability to present complex information to senior leadership.  

  • Familiarity threat intelligence platforms, working with SOC and vulnerability discovery tools.
  • Strong knowledge of adversary TTPs and frameworks like MITRE ATT&CK.
  • Able to distil complex technical issues into concise, business-friendly updates and reports.
  • Skilled at interpreting data to identify trends, prioritise risks, and propose realistic mitigation strategies.
  • Seeks opportunities to streamline processes and enhance efficiency.

Additional Information

Success is personal. It's your journey, powered by us. Join us and we'll help Britain achieve Net Zero together.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Automation Compliance CVSS EDR Exploit Governance Incident response MITRE ATT&CK Monitoring Nuclear Pentesting SIEM SOC Strategy Threat intelligence TTPs Vulnerabilities Vulnerability management XDR

Perks/benefits: Career development

Region: Europe
Country: United Kingdom

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.