Category Manager

London
3 months ago
Applications closed

Related Jobs

View all jobs

Group Category Manager

Digital Senior Category Manager

Sourcing Manager- Cyber and Saas

IT Procurement & Supply Chain Specialist

IT Procurement & Supply Chain Specialist

Senior Technical Product Manager – Enterprise Applications

Category Manager - Cloud & Information Security Procurement

The WTW Procurement Sourcing Team are seeking an experienced IT Procurement professional to own the Cloud & Information Security category and drive commercial value, risk reduction, and supplier performance across a global stakeholder base. You will build and execute a 6–12‑month category strategy and pipeline, lead complex sourcing and renewals spanning cloud infrastructure/services and cyber tooling, and act as the steward of data quality in Ariba so that decisions, reporting, and governance are rock solid. Specific product expertise is a plus, but proven IT procurement and category leadership matter most. You’ll collaborate daily with colleagues in UK/US/France & Mumbai. This role requires a minimum two days per week in London office.

The Role:

Category strategy & pipeline:

  • Own the Cloud & InfoSec category plan for 6–12 months: size the opportunity, define value levers (cost, risk, performance), set KPIs, and maintain a visible, prioritized pipeline of sourcing events and renewals aligned to stakeholder and security roadmap goals.

  • Embed ESG/diversity considerations and standardized ways of working that align with Procurement’s operating model.

    Sourcing, negotiation & contracting:

  • Lead end‑to‑end sourcing projects or contract renewals in Ariba (RFI/RFP, evaluation, BAFO, award) and negotiate commercial/contractual terms in partnership with Business Stakeholders, Legal and Risk functions; ensure contract records are created/updated and stored within Ariba Contracts.

  • Deliver measurable outcomes (TCO savings, cost avoidance, payment terms improvements, consolidation of suppliers/licenses) and log benefits in the approved Ariba workflow.

    Data stewardship in Ariba (single source of truth):

  • Champion data quality across sourcing projects, contracts and savings forms—owning taxonomy alignment, metadata completeness and timeliness (e.g., renewal dates, values, clauses). Use the latest upload templates and required fields; fix gaps rapidly to keep reporting dependable.

  • Produce category MI from, SpendViz and Ariba to inform decisions (pipeline, cycle times, compliance, value delivery).

    Supplier Risk Management (SRM) & compliance:

  • Initiate and coordinate SRM assessments and ongoing reviews (e.g., InfoSec, Privacy, BCM/Resilience) for material/critical suppliers; ensure Riskonnect/Ariba status and artefacts are up to date.

  • Operate to the Procurement Policy and Source‑to‑Pay process—no supplier discussions or commitments outside approved Ariba pathways; ensure stakeholder are advised to raise PO’s and approvals follow policy thresholds.

    Stakeholder engagement & business partnership:

  • Act as trusted advisor to the Cloud and ICS teams and adjacent technology stakeholders (HR/Finance/CRM platform owners, service management, programme teams), aligning category plans with roadmaps and transformation priorities.

  • Work seamlessly across UK/US/France & Mumbai teams; drive clarity on business requirements, evaluation criteria and decision governance.

    What Success Looks Like (first 6-12 months)

  • Build and develop your Category plan and have approved and refreshed quarterly; visible project pipeline covering new events and all renewals 6–12 months ahead.

  • Data Quality excellence within Ariba: 100% of in‑scope contracts loaded in a timely manner with complete, correct metadata; sourcing projects and savings forms kept current; reporting is “board‑ready”.

  • Value & risk: Achieve agreed savings/avoidance targets to support overall Sourcing team savings targets; all material suppliers through SRM with actions tracked to closure.

  • Stakeholder engagement: build appropriate stakeholder relationships.

    Qualifications

    The Requirements:

  • Extensive experience in IT Procurement / Category Management (cloud services, software/SaaS, or cyber security). Strong record leading multi‑stage sourcing and complex negotiations.

  • Demonstrable a clear understanding of category planning capability (market analysis, segmentation, strategy, pipeline) and stakeholder management across business/technology and global time zones.

  • Ideally to have hands‑on with Ariba Sourcing & Contracts (or equivalent S2P), or a commitment to learn and work within Ariba, with a clear data stewardship mindset—comfortable owning metadata, templates, and reporting to drive decisions.

  • Solid understanding of supplier risk workflows and partnering with Legal, InfoSec, Privacy and BCM.

  • Strategic and analytical thinker who converts insight into pragmatic commercial actions; excellent written and verbal communication, with a positive and “can do” approach to their work.

    Nice to Have:

  • Working knowledge of hyperscale cloud and security ecosystems (e.g., AWS/Azure/GCP; SIEM/EDR/IAM tooling) and cloud commercials (committed spend, RIs/Savings Plans, unit‑based pricing) – willingness to learn the specifics is essential.

  • CIPS or equivalent; experience with FinOps or cloud cost optimization concepts; prior experience in global financial services.

    Equal Opportunity Employer:

    At WTW, we believe difference makes us stronger. We want our workforce to reflect the different and varied markets we operate in and to build a culture of inclusivity that makes colleagues feel welcome, valued and empowered to bring their whole selves to work every day. We are an equal opportunity employer committed to fostering an inclusive work environment throughout our organization. We embrace all types of diversity.

    At WTW, we trust you to know your work and the people, tools and environment you need to be successful. The majority of our colleagues work in a” hybrid” style, with a mix of remote, in-person and in-office interactions dependent on the needs of the team, role and clients. Our flexibility is rooted in trust and “hybrid” is not a one-size-fits-all solution.

    We’re committed to equal employment opportunity and provide application, interview and workplace adjustments and accommodations to all applicants

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.