At a Glance
- Tasks: Lead and manage global security incidents, ensuring effective response and improvement.
- Company: Fidelity International is a customer-focused financial services organisation committed to innovation and security.
- Benefits: Enjoy flexible working options, comprehensive benefits, and a supportive development environment.
- Why this job: Join a dynamic team tackling real-world cyber threats while enhancing your skills in a fast-paced environment.
- Qualifications: 3+ years in incident response, strong understanding of security operations, and relevant certifications preferred.
- Other info: Opportunity to work with a global team and contribute to cutting-edge cybersecurity solutions.
The predicted salary is between 48000 - 84000 £ per year.
About the Opportunity
Job Type: Permanent
Application Deadline: 31 August 2025
Department: Cyber Defence Operations - GCIS
Location: Kingswood, Surrey, Gurgaon, Bangalore
Reports To: Senior Manager - CDO
Level: 5
We share a commitment to making things better for clients and each other. We continually explore new technology and different ways of working to put our clients first. So bring your boldest ideas to our Cyber Defense Operations team and feel like you're making progress.
About your team
The Technology function across FIL is responsible for all global aspects of Technology, Digital, Cybersecurity, and Innovation. Fidelity is a value-driven, customer-obsessed organization and in Technology we are fortunate to play a direct role in helping our clients with one of the most important aspects of their lives - their financial well-being.
Within the Technology function is our Global Cyber & Information Security (GCIS) that operates enterprise security services and controls. These are designed to mitigate Cyber and Information Security risks ensuring that Fidelity's business operates securely. The Technical Cybersecurity teams monitor both the internal and external threat environment, responding to security alerts and events in close to real time, as well as providing security assurance and access management services across the enterprise technology and business environment. Our global innovative Cyber Defence Operations team sits within GCIS and provides proactive, cutting-edge solutions to protect clients' digital assets and infrastructure against evolving cyber threats.
The Cyber Security Operational Incident Manager will be responding to and managing widespread security events and should have an understanding on how best to maintain CIRT teams skills and knowledge. The role will be supported by a global team of CIRT analysts who are looking at this role to provide them with direction and guidance during serious incidents. It will also be supported by a strong security leadership team and global incident management process who are keen to develop this capability. Our leadership team will be looking at this role to report on a number of key incident KPI's and provide assurance to our customers on the global operational security response process.
About your role
The successful candidate will be experienced in operational security incident management, including vulnerability management, understanding the value of rigorous planning, tested procedures and playbooks and quick response to critical security incidents. This is a critical role expected to develop and maintain our operational security incident management capability and help mature our global response processes.
The successful candidate will be comfortable working at a technical level, proactively suggesting improvements to the incident playbooks whilst also being able to co-ordinate our front-line CIRT team during major events. The successful candidate will be able to demonstrate understanding of incident response tools and techniques, experience in responding to and managing widespread security events and an understanding on how best to maintain CIRT teams skills and knowledge.
About you
Key Responsibilities
- Own and be accountable for security incidents; taking the lead in driving global remediation activities
- Ensure simple, repeatable, manual tasks are automated within the Incident Response process
- Ensure a "best-practice" program is in place to manage and maintain our security response procedures
- Proactively develop and deliver new incident response capabilities, tooling and processes.
- Develop an incident management strategy, focussing on regular reviews and exercises.
- Create and deliver table-top and simulated exercises focussing on areas of risk identified by our Threat Intelligence team.
- Ensure the operational security process is consistently maintained across our global regions, taking into account different regulatory requirements and rules.
- Acting as the point of contact for our global business incident management team for all security related incidents.
- Run Post Incident Reviews and track and manage outcomes to delivery.
Experience and Skills Required
- Experience and strong understanding of frontline security operations
- Experience running a vulnerability remediation programme or overseeing vulnerability teams would be advantageous
- Experience running complex security incidents at a global scale
- Experience creating or continually improving an incident management program
- Strong reporting ability, with an understanding on how to tailor reports to show improvements and learnings
- In depth understanding of modern attack techniques and flows
- Clear and demonstratable understanding of NIST and MITRE Att&ck Methodologies
- Experience in cloud environments (Ideally Azure)
- Strong communication skills with evidence of being in a position responsible for taking feedback from technical teams and turning this into improvements.
- Banking or Finance industry related experience desirable
- Security Incident Management Qualifications preferred
- Security Incident related qualifications (e.g SANS 504)
- At least 3 years of experience working in an Incident Response position.
- Experienced responding to global complex security events
- Experienced using NIST or MITRE frameworks to deploy defensive plans and/or actions
- Experience explaining the risk of security threats and creating mitigations.
- Experience of general IT infrastructure technologies and principles.
- Experience of using vulnerability management tooling e.g Nexpose, Qualys etc.
- Understanding of the underlying protocols including: HTTP, HTTPS, SMTP, SQL.
- Understanding of Networking Architecture (OSI Model).
- Analytical skills
- Challenge the current processes
- Passion for the cybersecurity field
- Time management
- Able to organize others
Nice to Have
- Certifications - Security+, Network+, GCIA, GCIH, GCFA, GMON, GNFA, SSCP, OSCP
Feel rewarded
For starters, we'll offer you a comprehensive benefits package. We'll value your wellbeing and support your development. And we'll be as flexible as we can about where and when you work - finding a balance that works for all of us. It's all part of our commitment to making you feel motivated by the work you do and happy to be part of our team.
Cyber Security Operational Incident Manager - Technical Consultant employer: Fidelity International
Contact Detail:
Fidelity International Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Security Operational Incident Manager - Technical Consultant
✨Tip Number 1
Familiarise yourself with the latest cybersecurity trends and threats. Being knowledgeable about current attack techniques and frameworks like NIST and MITRE will not only help you in interviews but also demonstrate your passion for the field.
✨Tip Number 2
Network with professionals in the cybersecurity industry, especially those who work in incident management. Attend relevant conferences or webinars to connect with potential colleagues and learn from their experiences.
✨Tip Number 3
Prepare to discuss specific incidents you've managed in the past. Be ready to explain your role, the challenges faced, and how you contributed to the resolution, as this will showcase your hands-on experience.
✨Tip Number 4
Highlight your ability to automate processes within incident response. Discuss any tools or scripts you've developed that improved efficiency, as this aligns with the role's focus on enhancing operational capabilities.
We think you need these skills to ace Cyber Security Operational Incident Manager - Technical Consultant
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in operational security incident management and showcases your understanding of incident response tools and techniques. Use specific examples that demonstrate your ability to manage widespread security events.
Craft a Strong Cover Letter: In your cover letter, express your passion for cybersecurity and detail how your skills align with the responsibilities of the Cyber Security Operational Incident Manager role. Mention your experience with vulnerability management and your ability to lead CIRT teams during incidents.
Highlight Relevant Qualifications: If you have any security incident management qualifications or certifications (like SANS 504), be sure to mention them prominently in your application. This will help demonstrate your commitment and expertise in the field.
Showcase Communication Skills: Since strong communication skills are essential for this role, provide examples in your application of how you've effectively communicated with technical teams and translated feedback into actionable improvements. This will show your ability to work collaboratively in high-pressure situations.
How to prepare for a job interview at Fidelity International
✨Understand the Role Thoroughly
Before the interview, make sure you have a solid grasp of what the Cyber Security Operational Incident Manager role entails. Familiarise yourself with key responsibilities such as managing security incidents and developing incident management strategies. This will help you articulate how your experience aligns with the job requirements.
✨Showcase Your Technical Skills
Be prepared to discuss your technical expertise in cybersecurity, particularly in incident response tools and techniques. Highlight any experience you have with frameworks like NIST or MITRE, and be ready to explain how you've applied these in real-world scenarios.
✨Demonstrate Leadership and Communication
Since this role involves leading CIRT teams during incidents, it's crucial to showcase your leadership skills. Provide examples of how you've effectively communicated with technical teams and managed complex security incidents. This will demonstrate your ability to coordinate and guide others under pressure.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your problem-solving abilities in high-pressure situations. Think of past incidents you've managed and be ready to discuss your approach, the challenges faced, and the outcomes. This will illustrate your practical experience and decision-making skills.