GBMDN02 - Maidenhead - The Point, United Kingdom
Maersk
Maersk is an integrated logistics company that offers supply chain solutions for managing shipments and cargo. Learn how to register, book and find prices.
Imagine a career where you're not just responding to security incidents—you’re revolutionising how it’s done. At Maersk, one of the world’s largest and most respected logistics and shipping companies, our Cyber team is pioneering a whole new approach to incident response. This isn’t your typical SOC/CERT role: our combined fire team approach is built on cutting-edge research and designed to drive change, resilience, and agility in ways the industry has never seen before.
Here, you’ll be part of a dynamic team that works together to defend, adapt, and innovate with freedom and purpose. You won’t just work on Incident Management; you’ll help improve how it’s done. Dive into purple teaming, create and refine world-class detections, shape change projects, and push the boundaries of what’s possible—all during the workday with no overnight shifts. Plus, we champion continuous learning and growth through Capture the Flag (CTF) exercises and direct opportunities to bring your ideas to life.
Are you ready to be part of something transformational at Maersk and join a team that’s setting a new standard in cybersecurity?
Responsibilities
* Lead incident management activities in response to all high priority cyber-security incidents, maintaining calm and focus during crisis situations.
* Manage conflicting priorities and multiple tasks in a high-pressure environment.
* Coordinate resources across the organisation to develop and execute response plans that ensure effective management of cyber-security incidents.
* Communicate effectively with internal stakeholders, including senior leadership, providing rapid and concise summaries of complex situations.
* Deliver and coordinate post-incident activities, including producing detailed incident reports and conducting post-incident reviews.
* Contribute to and participate in cyber-security incident readiness activities, including simulations and tabletop exercises.
* Identify gaps and continuously improve detection and response capabilities by creating and fine-tuning use cases, developing automation, and documenting processes and playbooks.
* Contribute to the development of detection mechanisms for sophisticated adversarial techniques based on the MITRE ATT&CK framework.
Purple Teaming and Advanced Testing
* Support the planning and response of purple teaming activities.
* Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing.
Leadership and Team Development
* Mentor and coach a multidisciplinary team of analysts and investigators from a technical perspective.
* Contribute to CTF exercises or similar initiatives to maintain continuous development of team skills.
* Champion new processes and conduct coaching sessions to cross-skill team members.
* Assist the leadership team with quality control and feedback reviews.
* Develop training materials and deliver training as part of the team’s continuous development.
* Conduct and lead Cyber Incident Response exercises.
Soft Skills
* Operations Management & Issue Resolution: Proactively identify and address operational issues, team dynamics, and inefficiencies in ticket handling.
* Report Writing: Convey highly technical information in an accessible manner for non-technical audiences.
* Communication: Exhibit excellent written/verbal communication skills, developing documentation and explaining technical details concisely.
* Mentorship: Train and guide junior team members, promoting a culture of knowledge sharing and continuous learning.
* Critical Thinking, Adaptability & Problem-Solving: Demonstrate strong analytical skills and flexibility to adapt to changing priorities and emerging cybersecurity threats.
* Time Management & Organization: Prioritize tasks efficiently and maintain organized documentation and processes to enhance team productivity.
* Teamwork & Positive Attitude: Foster a collaborative environment where team members feel supported, practicing active listening, motivating the team, and maintaining a positive demeanor, especially in high-pressure situations.
Qualifications
* 5+ years of experience in an Incident Management role, with a minimum of 3 years in a SOC or incident response leadership role.
* Relevant advanced certifications (e.g., GCIA, GSEC, CEH, GCDA, GCIH, GCFA, OSCP) are highly desirable but not essential.
* Proven self-learning abilities demonstrated through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF.
Bonus Points
* Knowledge of reverse engineering tools and processes is desirable.
* Some programming experience (e.g., C, Python, Go) is desirable.
* Assembly language knowledge is a plus but not essential.
* Experience with multiple platforms (Linux, MacOS, mobile) is a plus.
* A background in intelligence is a plus.
* Knowledge of scripting languages (e.g., Bash, Python, PowerShell) for automation and process improvement is desirable.
Maersk is committed to a diverse and inclusive workplace, and we embrace different styles of thinking. We will consider qualified applicants with criminal histories in a manner consistent with all legal requirements.
We are happy to support your need for any adjustments during the application and hiring process. If you need special assistance or accommodation, please contact us by emailing accommodationrequests@maersk.com.
#J-18808-Ljbffr