Cyber Security Operations Manager at Met Office
Exeter EX1 3PB, , United Kingdom -
Full Time


Start Date

Immediate

Expiry Date

12 Sep, 25

Salary

56738.0

Posted On

13 Jun, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Boundaries, Learning, Escalation, Documentation, Decision Making, Team Leadership, Performance Metrics, Social Impact, Assessment, Government, It, Tuning, Service Improvement, Triage, Security Metrics, Threat Intelligence, Metrics, Meteorology, Security Operations

Industry

Information Technology/IT

Description

Job Introduction
We’re looking for an exceptional Cyber Security Operations Manager to help us make a difference to our planet.
As our Cyber Security Operations Manager, the job may be suitable for hybrid working, which is where an employee works part of the week in the office and part of the week from home. This is a voluntary, non-contractual arrangement and the location advertised will be your contractual place of work.
Our opportunity is full time, 37 hours per week. Our people are at the heart of what we do and we’ll do our best to agree a working pattern that works for everyone.

ESSENTIAL CRITERIA, SKILLS AND EXPERIENCE:

  • We live and breathe it - Demonstrated ability to lead and manage a team with integrity and genuine passion for our purpose, fostering an inclusive, collaborative culture, and continuously developing team skills and expertise through learning and knowledge‐sharing.
  • We keep evolving - In‐depth knowledge of incident management processes to lead incident detection, triage, escalation and resolution, assessing impacts and directing appropriate measures to contain and mitigate threats, conduct post incident reviews and drive continual service improvement including exercising to test procedures with the collaborative mindset to drive cross‐team and external support for swift, sustainable response.
  • We’re experts by nature - Proven experience delivering an effective, continuously improving security monitoring capability, proactively hunting threats and refining detection rules to reflect evolving risks, leveraging deep technical expertise and curiosity, and ensuring that monitoring activities contribute responsibly to organisational resilience with continuous improvements that reflect changes from risks and threats in a timely manner, including proactive threat hunting and intrusion detection.
  • We’re a force for good - Proven experience delivering threat intelligence and assessment in the context of the organisation to stakeholders by gathering and analysing information to identify and mitigate cyber threats from both open-source (OSINT) and commercial threat intelligence.
  • We’re experts by nature - Proven experience operating and optimising cybersecurity tools (e.g. SIEM), maintaining accurate security records and documentation in accordance with robust operating procedures, continually seeking innovative automation and process improvements, and sharing learnings to raise the overall expertise of the organisation (cyber security operations).
  • We’re better together - Demonstrated experience managing relationships with external vendors, MSSPs and technology partners setting and enforcing SLAs and performance metrics with transparency and fairness, collaborating to solve challenges and share successes, and holding partners to high standards.
Responsibilities
  • Team Leadership and Development: Lead, manage and mentor a team of cyber security analysts to ensure the team operate effectively. Develop the team utilising the career framework to identify learning needs and career pathways.
  • Incident Management: Lead incident detection, triage, escalation and resolution processes; assessing impacts and directing appropriate measures to contain and mitigate threats, conduct post‑incident reviews and drive continual service improvement including exercising to test procedures.
  • Security Monitoring: Be the escalation point for alerts. Provide direction for improvements to monitoring systems for our environment covering specific technologies or threats. Direct the development and tuning of new and existing rules.
  • Threat Intelligence: Stay up to date on the latest cyber threats and attack techniques, incorporating threat intelligence into security practices, cascading to relevant stakeholders.
  • Reporting and Metrics: Define cyber security metrics and targets. Prepare and present regular reports on security incidents, and trends to management, translating technical metrics into business focused risk insights
Loading...