National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Cyber Security Manager

ICBC Standard Bank
London
1 year ago
Applications closed

Related Jobs

View all jobs

Cyber Security Manager

Information Security Manager

IT Security Manager Glasgow - Clydebank

EMEA & APAC Cyber Defence and Security Operations Manager

Cyber Security Analyst, Vulnerability Management

Network Security Engineer / Cyber Security / CISSP / CISA / CCNA

Summary


The Information Technology Risk and Cyber Security team, which is part of the IT Department, supports over 100 different applications and a wide range of infrastructure operating systems and databases across London, NY and Asia and provides security
support across the Bank.

Job Purpose
This London-based Cyber Security role is within the IT department of a Global Investment Bank. This dedicated role is to provide Cyber Security services globally. This hands-on role focusses on driving the Cyber Assurance programme end to end for the bank to reduce the bank's cyber threat landscape across the technology estate and drive the "Business As usual" cyber assurance process.

Key Responsibilities
Manage the Cyber Test and Validation process, Support Cyber Risk Assessment and drive Cyber Assurance programme across the bank through:
- Conduct cyber assessment of projects helping to drive adoption of application and infrastructure security controls and best practices.
- Advise on leading edge engineering to protect the bank's network from security risks related to web, mobile, web services, and client/server architectures.
- Conduct risk reviews of 3rd party systems and applications to assess the standard and proprietary application security controls used by the application (e.g.authentication, authorization, input validation, output sanitization, error handling, application resilience) against bank policies and standards.
- Work with different teams in various jurisdictions where specific technology and cybersecurity regulations create requirements that are not directly supported by our global framework.
- Drive implementation of security controls in various platforms by working with technology infrastructure teams. Demonstrate deep understanding, passion and thought leadership for Information and Cybersecurity and its impact of new technologies, services and solutions.
- Investigate, coordinate and address Information and Cybersecurity incidents
- Act as liaison for global team in coordinating collection and preservation of forensic evidence in support of security event investigation.
- Analyse potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach.
- Collaborate with stakeholders to continually operate and improve a world-class cyber program by providing input into the uplift of sensory tools, detection tuning, and access to data sources to increase detection effectiveness.
- Convey complicated technical analysis to management via investigation synopses, graphical depictions of attacks, and comprehensive presentations.
- Act as a liaison to stakeholders, including those outside of the technology team(s), during security investigations and incidents
- Respond to regulatory requests regarding security incidents, as well as the relevant protective and detective security measures.
- Report the status of ongoing incidents, as well as the follow-up actions for resolved incidents to management
- Support Compliance, regulatory, or litigation related investigations by coordinating e-discovery, evidence collection and other such activities.
- Communicating status and risks in a succinct, direct and open manner for proper issue management life cycle tracking.
- Drafting responses to requests for information from regulators in the jurisdictions in which the bank operates
- Coordinating engagements with regulators, including periodic reporting, preparation of presentations and written deliverables
- Conducting analysis to identify potential gaps and issues from ongoing changes of regulatory requirement of relevance to the bank's business and risk environments
- Preparing presentations and written products on regulatory trends and issues to inform leadership decisions
- Coordinating with counterparts in other jurisdictions and regional stakeholders (e.g. Legal, Compliance, Operational Risk) to ensure consistent responses across all regulators

Preferred Qualifications and Experience
- Experience with a mix of Cybersecurity, Systems, Infrastructure, Network, and Cloud experience.
- Broad technical security skills in multiple technology areas such as applications deployments, endpoints, data, infrastructure, cloud, DNS, PKI, Email, OS (Windows, MAC, *NIX), SDN, encryption, forensics, authentication, firewalls, proxies, identity and access control, BC/DR, remote access, and cryptography.
- Extensive experience in architecting and engineering complex security solutions utilizing and interpreting models to implement company policies, standards globally.
- Familiarity with techniques/methodologies such as "Attack and Defensive" methods, Threat Hunting, Threat modeling, Reverse engineering, Vulnerability Management, Data modeling, Evaluation of security products/services, Metrics development, etc.
- Proficiency and experience in automation and scripting using Python, Shell, Ansible, Jenkins, etc.
- Demonstrated experience with utilizing and migrating to one or more cloud technologies such as Microsoft Azure, and AWS. Knowledge of Google Cloud Platform, Alibaba Cloud, and Microsoft Office 365 is a plus.
- Information Security and/or Information Technology industry certification (CISSP, CISM, CISSP-ISSMP, CRISC, GIAC, Azure and AWS equivalent) preferred.
- Ability to synthesize data, conceptualize and get to the root cause of processes that created the risk.
- Experience working in a multi-vendor and outsourced IT environment.
- Good understanding of COBIT and ITIL processes including change, incident and problem management.
- Experience in Financial Services is a nice to have but not mandatory.

Personal attributes:
- High level of integrity
- Demonstrable technical credibility and subject matter expert
- Ability to visualize, articulate and solve complex technical problems via sounds analytical and problem-solving skills
- Proven global team management and coordination skills
- Team player approachable, ability to share and consult others
- Demonstrable ability to plan, prioritise and manage multiple activities
- Results orientated
- Proven influence at manager level with excellent facilitation, negotiation, challenge and conflict resolution skills

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.