Vulnerability / Threat Management Analyst

The Vulnerability or Threat Management Analyst identifies and manages weaknesses and cyber threats in networks and software and then takes measures to correct and strengthen security within the system.

Role overview

Vulnerability or Threat Management Analysts are responsible for maintaining all vulnerability or threat management solutions, ensuring that all assets and systems are scanned for vulnerabilities regularly. They then need to bring any findings to the attention of the business while working within the cybersecurity department to prioritize and remediate threats.

Threat Management Analysts
may also be referred to as:
Cloud Security Threat Management Engineer
Cybersecurity Threat Engineer
Cybersecurity Threat Specialist
Cyber Threat Assessor
Cyber Threat Engineer
Cybersecurity Threat Analyst
Cybersecurity Vulnerability Analyst
Cybersecurity Vulnerability Assessor
Security Threat Coordinator
Threat And Vulnerability Engineer
Threat And Vulnerability Management Analyst
Threat And Vulnerability Management Intern
Threat And Vulnerability Manager
Vulnerability Analyst
Vulnerability Management Administrator
Vulnerability Management Analyst
Vulnerability Manager

Career Path

Map your career path by understanding role relationships

Average Salary

Based upon experience, salary for this role ranges from:
National Average


Operating the vulnerability scanning tool set, including Nexpose and Tenable.
Improving business-wide knowledge and understanding of emerging threats.
Reviewing and analyzing vulnerability data to identify trends and patterns.
Advising employees responsible for remediation on the best reduction and remediation practices.
Influencing the development of vulnerability management standards and security policies.
Operating vulnerability management processes, suggesting applicable change controls, and security exceptions.
Designing and implementing vulnerability reporting and monitoring solutions.
Maintaining and updating process guides and assisting with reporting to leadership and service stakeholders.
Assisting and supporting the manager in incident handling/investigations.
Performing risk-based technical assessments on technical vulnerabilities.

Tools & Environment

Vulnerability or Threat Management Analysts use various tools associated with vulnerability management, such as Qualys, Kenna, Microsoft Defender ATP, and ServiceNow. They also work with various public cloud infrastructures, scripting languages, and reporting tools.


[cyber_job_role_count] Vulnerability / Threat Management Analyst jobs



Watch our latest videos, talks an recorded events

White Papers

Download our whitepapers and printed resources

Free Courses

Browse our training courses and educational resources
See All


Listen to our podcast features and recorded roundtables

The CyberSN™ Provider Exchange

The training courses, services, products, and DEI providers you need to take control and accelerate your success.


Get in touch to see your product, training course, service, or DEI support on our provider exchange.

Cyber Security Cloud & SaaS Solutions Outfitter

Invest in Turbo Charging Cyber Security Solutions – Faster Incident Detection, Response and Recovery Times – Get Access To Over 100 New and Emerging Cloud and Cyber Security Software Solutions

Cybersecurity, Risk Management, Continuity of Operations, and Data Protection & Governance

You need expertise to help you manage risk and protect your data from cyber attacks. Whether it’s strategy, cloud security, compliance, or anything in between, Vertex11 is your ultimate resource for getting the job done.
ESCALATE | Point3 Security

Identify Highly Skilled Individuals with ESCALATE Talent Screening

Traditional hiring has a couple of flaws. Human biases prevent good hires. Over-reliance on certifications and years of experience & HR Software and AI often removes top performers. With ESCALATE Talent Screening, your candidates physically demonstrate necessary skills, informing your hiring process far beyond certs or years of experience.
Rapid Ascent, Inc

Ascend with a Career in Cybersecurity

Hands-on, on-the-job training using state-of-the-art AI, gamified live-fire threats with real-world projects, and coaching from industry experts.

A Cybersecurity SaaS Ecosystem

CYRISMA combines Data Discovery/Data Loss Prevention, Vulnerability Scanning, Configuration Hardening, Score Card Evaluation, Various Reporting and Mitigation planning and Mitigation Execution in a single web-based platform generating Monthly Recurring Revenue for the MSSP.

Get our latest insights. Subscribe to our newsletter.