Cyber Security Manager

ICBC Standard Bank
London
1 year ago
Applications closed

Related Jobs

View all jobs

Cyber Security Manager

Information Security Manager

Security Manager

Cyber Security Consultants - DV Cleared

Cyber Assurance Manager

Cyber Security Operations Lead

Summary


The Information Technology Risk and Cyber Security team, which is part of the IT Department, supports over 100 different applications and a wide range of infrastructure operating systems and databases across London, NY and Asia and provides security
support across the Bank.

Job Purpose
This London-based Cyber Security role is within the IT department of a Global Investment Bank. This dedicated role is to provide Cyber Security services globally. This hands-on role focusses on driving the Cyber Assurance programme end to end for the bank to reduce the bank's cyber threat landscape across the technology estate and drive the "Business As usual" cyber assurance process.

Key Responsibilities
Manage the Cyber Test and Validation process, Support Cyber Risk Assessment and drive Cyber Assurance programme across the bank through:
- Conduct cyber assessment of projects helping to drive adoption of application and infrastructure security controls and best practices.
- Advise on leading edge engineering to protect the bank's network from security risks related to web, mobile, web services, and client/server architectures.
- Conduct risk reviews of 3rd party systems and applications to assess the standard and proprietary application security controls used by the application (e.g.authentication, authorization, input validation, output sanitization, error handling, application resilience) against bank policies and standards.
- Work with different teams in various jurisdictions where specific technology and cybersecurity regulations create requirements that are not directly supported by our global framework.
- Drive implementation of security controls in various platforms by working with technology infrastructure teams. Demonstrate deep understanding, passion and thought leadership for Information and Cybersecurity and its impact of new technologies, services and solutions.
- Investigate, coordinate and address Information and Cybersecurity incidents
- Act as liaison for global team in coordinating collection and preservation of forensic evidence in support of security event investigation.
- Analyse potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach.
- Collaborate with stakeholders to continually operate and improve a world-class cyber program by providing input into the uplift of sensory tools, detection tuning, and access to data sources to increase detection effectiveness.
- Convey complicated technical analysis to management via investigation synopses, graphical depictions of attacks, and comprehensive presentations.
- Act as a liaison to stakeholders, including those outside of the technology team(s), during security investigations and incidents
- Respond to regulatory requests regarding security incidents, as well as the relevant protective and detective security measures.
- Report the status of ongoing incidents, as well as the follow-up actions for resolved incidents to management
- Support Compliance, regulatory, or litigation related investigations by coordinating e-discovery, evidence collection and other such activities.
- Communicating status and risks in a succinct, direct and open manner for proper issue management life cycle tracking.
- Drafting responses to requests for information from regulators in the jurisdictions in which the bank operates
- Coordinating engagements with regulators, including periodic reporting, preparation of presentations and written deliverables
- Conducting analysis to identify potential gaps and issues from ongoing changes of regulatory requirement of relevance to the bank's business and risk environments
- Preparing presentations and written products on regulatory trends and issues to inform leadership decisions
- Coordinating with counterparts in other jurisdictions and regional stakeholders (e.g. Legal, Compliance, Operational Risk) to ensure consistent responses across all regulators

Preferred Qualifications and Experience
- Experience with a mix of Cybersecurity, Systems, Infrastructure, Network, and Cloud experience.
- Broad technical security skills in multiple technology areas such as applications deployments, endpoints, data, infrastructure, cloud, DNS, PKI, Email, OS (Windows, MAC, *NIX), SDN, encryption, forensics, authentication, firewalls, proxies, identity and access control, BC/DR, remote access, and cryptography.
- Extensive experience in architecting and engineering complex security solutions utilizing and interpreting models to implement company policies, standards globally.
- Familiarity with techniques/methodologies such as "Attack and Defensive" methods, Threat Hunting, Threat modeling, Reverse engineering, Vulnerability Management, Data modeling, Evaluation of security products/services, Metrics development, etc.
- Proficiency and experience in automation and scripting using Python, Shell, Ansible, Jenkins, etc.
- Demonstrated experience with utilizing and migrating to one or more cloud technologies such as Microsoft Azure, and AWS. Knowledge of Google Cloud Platform, Alibaba Cloud, and Microsoft Office 365 is a plus.
- Information Security and/or Information Technology industry certification (CISSP, CISM, CISSP-ISSMP, CRISC, GIAC, Azure and AWS equivalent) preferred.
- Ability to synthesize data, conceptualize and get to the root cause of processes that created the risk.
- Experience working in a multi-vendor and outsourced IT environment.
- Good understanding of COBIT and ITIL processes including change, incident and problem management.
- Experience in Financial Services is a nice to have but not mandatory.

Personal attributes:
- High level of integrity
- Demonstrable technical credibility and subject matter expert
- Ability to visualize, articulate and solve complex technical problems via sounds analytical and problem-solving skills
- Proven global team management and coordination skills
- Team player approachable, ability to share and consult others
- Demonstrable ability to plan, prioritise and manage multiple activities
- Results orientated
- Proven influence at manager level with excellent facilitation, negotiation, challenge and conflict resolution skills

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Penetration Tester Jobs in the UK: What Employers Actually Want in 2026

The demand for skilled professionals in cyber security has never been higher, and penetration testers sit at the very heart of this rapidly evolving industry. As organisations across the UK continue to digitise their operations, protect sensitive data, and defend against increasingly sophisticated threats, the need for ethical hackers has grown dramatically. If you are considering a career in this field—or looking to advance within it—it is essential to understand what employers are really looking for in 2026. This guide breaks down the current expectations, required skills, certifications, and practical experience that can help you stand out in a competitive job market.

SOC Analyst Jobs UK 2026: Salaries, Skills & How to Get Hired

Cyber security is one of the UK's fastest-growing career paths — and SOC analyst is where most people begin. It's in high demand, genuinely accessible, and you don't need a degree or years of experience to get started. But knowing what UK employers actually want in 2026 — what they pay, which certs matter, and how to stand out — is a different matter. This guide covers all of it.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.