Shape the Future of AIJoin one of the UK's fastest-growing companies and become a Professional Development Expert in Artificial Intelligence.

View Roles

Cyber Incident Manager

Maersk
Berkshire
2 weeks ago
Create job alert

Join Maersk’s groundbreaking Cyber Team: Redefining Incident Management & Response 

Imagine a career where you're not just responding to security incidents—you’re revolutionising how it’s done. At Maersk, one of the world’s largest and most respected logistics and shipping companies, our Cyber team is pioneering a whole new approach to incident response. This isn’t your typical SOC/CERT role: our combined fire team approach team is built on cutting-edge research and designed to drive change, resilience, and agility in ways the industry has never seen before.

Here, you’ll be part of a dynamic team that works together to defend, adapt, and innovate with freedom and purpose. You won’t just work on Incident Management; you’ll help improve how it’s done. Dive into purple teaming, create and refine world-class detections, shape change projects, and push the boundaries of what’s possible—all during the workday with no overnight shifts. Plus, we champion continuous learning and growth through Capture the Flag (CTF) exercises and direct opportunities to bring your ideas to life. 

Are you ready to be part of something transformational at Maersk and join a team that’s setting a new standard in cybersecurity?

Join a World-Class Cyber Team: Be part of an elite cyber operation at one of the globe’s most renowned logistics companies, where your contributions truly make a difference.  Multidimension role to Keep You Engaged: Unlike any traditional SOC role, as a CERT analyst in Maersk, you’ll engage in a variety of activities, switching between defensive and offensive strategies, conducting threat hunts, and participating in innovative projects and research. This multifaceted approach ensures you won’t experience burnout like in a typical SOC role.  Continuous Learning & Dynamic Environment: Enjoy ongoing training and development in a fast-paced, stimulating atmosphere. Participate in exciting CTF competitions alongside a team of experts, pushing the boundaries of your knowledge and skills.  Using cutting edge technologies: Tackle complex cyber incidents that require innovative solutions and utilizing the latest technologies available in the market. Your expertise will be crucial in addressing and mitigating sophisticated threats, allowing you to hone your skills in a real-world environment.  Innovate and Impact: Engage in innovative projects that allow you to bring your ideas to life, help shape the future of cybersecurity while developing new capabilities that enhance our operations. 

About the role:

Incident Response and Leadership

Lead incident management activities in response to all high priority cyber-security incidents, with the ability to remain calm and focused during crisis situations. Ability to manage conflicting priorities and multiple tasks in a high-pressure environment. Strong leadership skills with the ability to motivate and manage response teams during high-pressure situations. Co-ordinate resources across the organisation to develop and execute response plans that ensure cyber-security incidents are managed effectively and efficiently and limit or mitigate business impact. Communicate effectively with internal stakeholders, including senior leadership with the ability to provide rapid and concise summaries of complex situations. Deliver and co-ordinate Post Incident activities which include producing detailed incident reports and conducting Post Incident Reviews. Contribute to and participate in cyber-security incident readiness activities which can include simulations and tabletop exercises.

Continuous Improvement

Identify gaps and continuously improve detection and response capabilities by creating and fine-tuning use cases, developing automation and documenting processes and playbooks. Identifying lessons learned to improve future incident response and detection strategies. Contribute to development of detection mechanisms for sophisticated adversarial techniques based on the MITRE ATT&CK framework. 

Purple Teaming and Advanced Testing

Support the planning and response of purple teaming activities. Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing.

Leadership and Team Development

Mentor and coach a multidisciplinary team of analysts and investigators, from a technical perspective. Contribute to CTF exercises or other similar initiatives to maintain continuously development of team skills. Champion new processes and run coaching sessions to cross skill team members. Assist the leadership team with quality control and feedback reviews. Develop training materials and deliver training as part of the team’s continuous development. Conduct and lead in Cyber Incident Response exercises.

Soft Skills:

Operations Management & Issue Resolution: Ensure smooth operations and continuity by proactively identifying and addressing operational issues, team dynamics, and inefficiencies in ticket handling.Report Writing:Ability to write reports that convey highly technical information whilst remaining accessible to a non-technical audience (including at executive level).Communication:Exhibit excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.Mentorship: training and guiding junior team members, promoting a culture of knowledge sharing and continuous learning.Critical Thinking, Adaptability & Problem-Solving: Demonstrate strong analytical skills and flexibility to adapt to changing priorities and emerging cybersecurity threats while effectively solving problems.Time Management & Organization: Prioritize tasks efficiently and maintain organized documentation and processes to enhance team productivity.Teamwork & Positive Attitude: Foster a collaborative environment where team members feel supported, practicing active listening, motivating the team, and maintaining a positive demeanour, especially in high-pressure situations.

Qualifications:

5+ years of experience in an Incident Management role, with a minimum of 3 years in a SOC or incident response leadership role. Relevant advanced certifications (e.g., GCIA, GSEC, CEH, GCDA, GCIH, GCFA, OSCP) are highly desirable but not essential. Proven self-learning abilities demonstrated through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF.

Bonus Points:

Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc) is desirable. Some programming experience for example, C, Python, Go, and/or other languages desirable. Assembly language knowledge is a plus but not essential is desirable. Development and deployment of dockerized applications, desirable but not essential. Experience with multiple platforms (Linux, MacOS, mobile, etc.) is a plus but not necessarily essential. A background in intelligence is a plus. Knowledge of scripting languages is desirable (e.g., Bash, Python, PowerShell) for automation and process improvement. 

Company Benefits:

Flexible working arrangement:Remote working with occasional in person team building activitiesCollaborative Culture: Experience a supportive and inclusive work environment that values teamwork and innovation. We believe in open communication and knowledge sharing, ensuring that every team member feels empowered and valued.Work-Life Balance: We understand the importance of maintaining a healthy work-life balance. Our flexible working arrangements and supportive policies enable you to excel in your role while enjoying your personal life.

Maersk is committed to a diverse and inclusive workplace, and we embrace different styles of thinking. Maersk is an equal opportunities employer and welcomes applicants without regard to race, colour, gender, sex, age, religion, creed, national origin, ancestry, citizenship, marital status, sexual orientation, physical or mental disability, medical condition, pregnancy or parental leave, veteran status, gender identity, genetic information, or any other characteristic protected by applicable law. We will consider qualified applicants with criminal histories in a manner consistent with all legal requirements.

We are happy to support your need for any adjustments during the application and hiring process. If you need special assistance or an accommodation to use our website, apply for a position, or to perform a job, please contact us by emailing <. 

Related Jobs

View all jobs

Cyber Incident Manager

Cyber Incident Response Analyst

Cyber Incident Response Analyst

Technical Incident Manager

Major Incident Manager | S2 | IT Operations | Milton Keynes

Major Incident Manager

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Automate Your Cyber Security Jobs Search: Using ChatGPT, RSS & Alerts to Save Hours Each Week

Cyber roles drop across consultancies, MSSPs, hyperscalers, banks, gov & start-ups every day—often buried in ATS portals or duplicated across boards. The fix is simple: put discovery on autopilot with keyword-rich alerts, RSS feeds & a reusable ChatGPT workflow that triages listings, ranks fit, & tailors your CV in minutes. This copy-paste playbook is built for www.cybersecurityjobs.tech readers. It’s UK-centric, practical, & designed to save you hours each week. What You’ll Have Working In 30 Minutes A role & keyword map spanning SecOps/Detection, DFIR, AppSec, Cloud Security, GRC, Red Team, Threat Intel, IAM/PAM, OT/ICS & Vulnerability Management. Shareable Boolean search strings for Google & job boards to cut noise fast. Always-on alerts & RSS feeds delivering fresh roles to your inbox/reader. A ChatGPT “Cyber Job Scout” prompt that deduplicates, scores fit & outputs tailored actions. A simple pipeline tracker so deadlines & follow-ups never slip.

10 Cyber Security Recruitment Agencies in the UK You Should Know (2025 Job‑Seeker Guide)

UK cyber security hiring remains resilient in 2025, driven by nation-state threats, cloud security investments, and NCSC regulatory pressures. Lightcast reports +42 % YoY growth in UK roles mentioning “SOC”, “cyber risk”, “offensive security” or “GRC”. Yet despite 30,000 active cyber professionals, monthly live vacancies remain in the 2,500–2,900 range. The result: strong demand across public and private sector. We reviewed 50 + consultancies and included only those that: Are registered in the UK (Companies House) Operate a dedicated Cyber Security / InfoSec / Risk & Compliance desk Posted at least 5 UK cyber security roles between March and June 2025 This guide includes 2025 salary ranges, key skills, interview prep tips, and a verified recruiter directory.

Cyber Security Jobs Skills Radar 2026: Emerging Frameworks, Tools & Certifications to Learn Now

Cyber threats are evolving—and so must the people defending against them. As ransomware, AI-enhanced phishing, and supply chain attacks grow more advanced, UK employers are urgently hiring cyber security professionals with the right mix of strategic and hands-on skills. Welcome to the Cyber Security Jobs Skills Radar 2026, your go-to guide for the most in-demand tools, frameworks, certifications, and technologies shaping the UK's cyber workforce. Whether you're a SOC analyst, penetration tester, or cloud security architect, this annual radar is designed to help you stay ahead of the market.