Cyber Security Manager

ICBC Standard Bank
London
1 year ago
Applications closed

Related Jobs

View all jobs

Cyber Security Manager

IT Security Manager / Consultant

Information Security Manager - ISO27001

Head of Cyber Security / Information Security Manager

Cyber Security Engineer

Cyber Security Resilience Manager

Summary


The Information Technology Risk and Cyber Security team, which is part of the IT Department, supports over 100 different applications and a wide range of infrastructure operating systems and databases across London, NY and Asia and provides security
support across the Bank.

Job Purpose
This London-based Cyber Security role is within the IT department of a Global Investment Bank. This dedicated role is to provide Cyber Security services globally. This hands-on role focusses on driving the Cyber Assurance programme end to end for the bank to reduce the bank's cyber threat landscape across the technology estate and drive the "Business As usual" cyber assurance process.

Key Responsibilities
Manage the Cyber Test and Validation process, Support Cyber Risk Assessment and drive Cyber Assurance programme across the bank through:
- Conduct cyber assessment of projects helping to drive adoption of application and infrastructure security controls and best practices.
- Advise on leading edge engineering to protect the bank's network from security risks related to web, mobile, web services, and client/server architectures.
- Conduct risk reviews of 3rd party systems and applications to assess the standard and proprietary application security controls used by the application (e.g.authentication, authorization, input validation, output sanitization, error handling, application resilience) against bank policies and standards.
- Work with different teams in various jurisdictions where specific technology and cybersecurity regulations create requirements that are not directly supported by our global framework.
- Drive implementation of security controls in various platforms by working with technology infrastructure teams. Demonstrate deep understanding, passion and thought leadership for Information and Cybersecurity and its impact of new technologies, services and solutions.
- Investigate, coordinate and address Information and Cybersecurity incidents
- Act as liaison for global team in coordinating collection and preservation of forensic evidence in support of security event investigation.
- Analyse potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach.
- Collaborate with stakeholders to continually operate and improve a world-class cyber program by providing input into the uplift of sensory tools, detection tuning, and access to data sources to increase detection effectiveness.
- Convey complicated technical analysis to management via investigation synopses, graphical depictions of attacks, and comprehensive presentations.
- Act as a liaison to stakeholders, including those outside of the technology team(s), during security investigations and incidents
- Respond to regulatory requests regarding security incidents, as well as the relevant protective and detective security measures.
- Report the status of ongoing incidents, as well as the follow-up actions for resolved incidents to management
- Support Compliance, regulatory, or litigation related investigations by coordinating e-discovery, evidence collection and other such activities.
- Communicating status and risks in a succinct, direct and open manner for proper issue management life cycle tracking.
- Drafting responses to requests for information from regulators in the jurisdictions in which the bank operates
- Coordinating engagements with regulators, including periodic reporting, preparation of presentations and written deliverables
- Conducting analysis to identify potential gaps and issues from ongoing changes of regulatory requirement of relevance to the bank's business and risk environments
- Preparing presentations and written products on regulatory trends and issues to inform leadership decisions
- Coordinating with counterparts in other jurisdictions and regional stakeholders (e.g. Legal, Compliance, Operational Risk) to ensure consistent responses across all regulators

Preferred Qualifications and Experience
- Experience with a mix of Cybersecurity, Systems, Infrastructure, Network, and Cloud experience.
- Broad technical security skills in multiple technology areas such as applications deployments, endpoints, data, infrastructure, cloud, DNS, PKI, Email, OS (Windows, MAC, *NIX), SDN, encryption, forensics, authentication, firewalls, proxies, identity and access control, BC/DR, remote access, and cryptography.
- Extensive experience in architecting and engineering complex security solutions utilizing and interpreting models to implement company policies, standards globally.
- Familiarity with techniques/methodologies such as "Attack and Defensive" methods, Threat Hunting, Threat modeling, Reverse engineering, Vulnerability Management, Data modeling, Evaluation of security products/services, Metrics development, etc.
- Proficiency and experience in automation and scripting using Python, Shell, Ansible, Jenkins, etc.
- Demonstrated experience with utilizing and migrating to one or more cloud technologies such as Microsoft Azure, and AWS. Knowledge of Google Cloud Platform, Alibaba Cloud, and Microsoft Office 365 is a plus.
- Information Security and/or Information Technology industry certification (CISSP, CISM, CISSP-ISSMP, CRISC, GIAC, Azure and AWS equivalent) preferred.
- Ability to synthesize data, conceptualize and get to the root cause of processes that created the risk.
- Experience working in a multi-vendor and outsourced IT environment.
- Good understanding of COBIT and ITIL processes including change, incident and problem management.
- Experience in Financial Services is a nice to have but not mandatory.

Personal attributes:
- High level of integrity
- Demonstrable technical credibility and subject matter expert
- Ability to visualize, articulate and solve complex technical problems via sounds analytical and problem-solving skills
- Proven global team management and coordination skills
- Team player approachable, ability to share and consult others
- Demonstrable ability to plan, prioritise and manage multiple activities
- Results orientated
- Proven influence at manager level with excellent facilitation, negotiation, challenge and conflict resolution skills

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.

How to Write a Cyber Security Job Ad That Attracts the Right People

Cyber security is now a board-level priority for organisations across the UK. From financial services and healthcare to critical infrastructure, SaaS platforms and the public sector, demand for skilled cyber security professionals continues to grow. Yet despite this demand, many employers struggle to attract the right candidates. Cyber security job adverts often generate large volumes of applications, but few are a genuine match. Meanwhile, experienced security engineers, analysts and architects quietly ignore adverts that feel vague, unrealistic or disconnected from real security work. In most cases, the problem is not a lack of talent — it is the quality of the job advert. Cyber security professionals are trained to assess risk, spot weaknesses and question assumptions. A poorly written job ad signals organisational immaturity and weak security culture. A well-written one signals seriousness, competence and trust. This guide explains how to write a cyber security job ad that attracts the right people, improves applicant quality and positions your organisation as a credible security employer.

Maths for Cyber Security Jobs: The Only Topics You Actually Need (& How to Learn Them)

If you are applying for cyber security jobs in the UK it can feel like “real security people” must be brilliant at maths. The reality is simpler: most roles do not need degree-level pure maths. What they do need is confidence with a small set of practical topics that show up repeatedly in day-to-day work across SOC, incident response, cloud security, AppSec, threat detection, IAM & security engineering. This guide strips the maths down to what actually helps you get hired. It includes a 6-week learning plan plus portfolio projects you can publish to prove the skills. You will focus on: Number systems & bitwise thinking (binary, hex, bytes, XOR) Modular arithmetic basics (enough to understand how modern crypto “works”) Probability & statistics for detection, triage & risk Discrete maths for logic, sets, graphs & complexity Security maths habits: estimation, false positive control & evidence-led reporting You will not waste time on heavy theory that rarely appears in junior or mid-level cyber security roles.