Cyber Security Lead

Cyber Security Lead

City of London Full-Time 48000 - 72000 £ / year (est.) No home office possible
Go Premium
N

At a Glance

  • Tasks: Lead and innovate in cybersecurity, designing and implementing security operations from the ground up.
  • Company: Join Navro, a pioneering B2B payments startup transforming global transactions.
  • Benefits: Enjoy 26 days annual leave, private healthcare, and flexible working arrangements.
  • Why this job: Make a real impact in a fast-paced environment and shape the future of payments.
  • Qualifications: Experience in cybersecurity, SIEM, and incident response; proactive and detail-oriented mindset.
  • Other info: Be part of a diverse team with excellent career growth opportunities.

The predicted salary is between 48000 - 72000 £ per year.

Location: London, UK (Hybrid: 2 days per week in the office)
Company: Navro – Pioneering the Future of Payments

Securing Trust: Cyber Security Lead

This isn’t just another Information Security role. No legacy systems. No corporate red tape. No coasting. This is about building something from the ground up. Fast.

We’re Navro, a rapidly scaling B2B payments startup, and we’re looking for a bold, proactive, and hands-on Cybersecurity Lead to design, implement, and operate our security operations function, including SIEM, incident response, threat detection, secure by design, shift-left security engineering, and automated monitoring and response. You’ll run and be part of the projects that implement, build, and maintain security integrations across our tech stack, establish incident response playbooks, and lead day‑to‑day SOC operations that protect our platform and customers.

You won’t have layers of approval slowing you down. You will have the freedom to make real, impactful decisions from day one. This isn’t a passenger role. We’re bringing you in for your expertise and your relentless drive. You will be responsible for understanding our information assets, identifying emerging threats, and implementing robust security measures that protect Navro and our clients.

Who We Are

We are transforming payments for global platforms and e-commerce businesses. As the world’s first payments curation platform, we simplify cross-border transactions by uniting best-in-class infrastructure into a seamless ecosystem, enabling businesses to scale and operate effortlessly across borders. Cross-border workforce payments are slow, expensive, and outdated. We can’t be. Businesses rely on us to pay their people accurately and on time – contractors, freelancers, and employees across the globe. When we say we’ll deliver, failure isn’t an option. If we don’t do what we said we would, people don’t get paid – not just a transaction delayed, but real workers left without wages. That means a developer in Argentina missing their paycheck, a freelancer in the Philippines unable to pay rent, or a contractor in Poland unable to get to work. No excuses. No passengers. No tolerance for politics or mediocrity.

What This Role Demands:

⚡ You Own It – You lead our detection and response mission. You help define the roadmap, build the pipelines, and drive measurable outcomes across threat visibility, MTTD/MTTR, and resilience.

⚡ You Ask Questions – You challenge assumptions to improve signal‑to‑noise, coverage, and automation. Why this alert? Where’s the data gap? How do we shift‑left to prevent recurrence?

⚡ You Fix What’s Broken – If telemetry is missing or playbooks stall, you instrument, tune, and automate. You remove toil and reduce manual triage with engineering, not heroics.

⚡ You’re Hands‑On – One hour you’re shipping a new Sentinel analytic rule, the next you’re leading a live incident bridge, then refining a post‑incident problem record and control improvements.

⚡ You Thrive in Chaos – Startups are messy. You bring clarity with crisp runbooks, decision trees, and SLAs that keep operations calm when things get loud.

⚡ You Handle the Pressure – High stakes, time‑sensitive incidents, vendor escalations. You prioritise ruthlessly, communicate precisely, and keep teams aligned.

⚡ You’re Here for the Journey – This is a career‑defining role. You will build capability, mentor others, and leave a legacy of a high‑performing SOC built on automation, quality data, and continuous learning.

What You’ll Be Doing:

  • Own the design, implementation, and operation of our SIEM and SOC capability with Microsoft Sentinel, including data ingestion, workspace architecture, analytics, automation, and dashboards.
  • Integrate high‑value telemetry sources (Entra, M365, Google Workspace, AWS, GCP, endpoints/EDR, network, SaaS, CI/CD, identity, and proprietary platforms) into Sentinel via native connectors, APIs, custom logs, and event hubs.
  • Engineer detection content: write, test, and tune KQL analytics, scheduled rules, UEBA policies, MSTIC notebooks, watchlists, and hunting queries that map to industry frameworks (MITRE ATT&CK).
  • Build incident response playbooks and SOAR automation with Logic Apps to enrich, correlate, contain, notify, and ticket, reducing MTTD/MTTR and false positives.
  • Run the incident lifecycle: triage, investigation, containment, eradication, recovery, lessons learned, and problem management with crisp communications to stakeholders and customers as needed.
  • Establish and lead the SOC operating model: business and non-business hours on‑call, runbooks, SLAs/OLAs, quality reviews, and where applicable, manage an MDR/MSSP partner for 24×7 coverage and surge capacity.
  • Stand up threat intelligence workflows: curate intel sources, integrate TI into Sentinel, operationalise indicators, and drive threat‑informed defense and periodic purple‑team exercises.
  • Partner with DevOps/SRE to enforce security controls in CI/CD, secure by design infrastructure as code, and configuration baselines; shift‑left through preventive guardrails and detection-in-depth.
  • Support audits and regulators by evidencing monitoring, incident response, logging coverage, and continuous improvement; align to ISO 27001, SOC 2, PCI‑DSS, and DORA incident obligations.
  • Develop the Secure Development Lifecycle with members of the team and Engineering; uplevel the wider team’s security capabilities and automate.
  • Lead tabletop exercises and simulations; keep IR playbooks current for scenarios like identity compromise, malware/ransomware, email compromise, data exfiltration, insider risk, vendor breach, and cloud abuse.
  • Measure what matters: publish operational metrics (alert volumes, use‑case efficacy, dwell time, containment time, critical incident trends), and drive quarterly capability maturity improvements.

What We’re Looking For:

⚡ Start-It-Up – Preferably have worked in a start-up or scale-up environment before where ambiguity and chaos do not faze you, you are proactive and hungry for the challenge.

⚡ Detail-Obsessed – You don’t miss a thing. Your attention to detail and decision-making capabilities are top-notch. You’re able to horizon scan and research effectively to find the missing details.

⚡ SIEM & Sentinel Expertise – Proven experience in architecting, implementing, and operating Microsoft Sentinel at scale: data connectors, KQL, analytics, UEBA, SOAR (Logic Apps), workbooks, and cost governance.

⚡ SOC Leadership – Demonstrated capability to build and run a SOC internally, including processes, on‑call, playbooks, case management, ticketing, and continuous detection engineering

⚡ Incident Response – Hands‑on leadership of security incidents across identity, endpoint, cloud, email, and SaaS; confident in live triage, scoping, containment, eradication, and stakeholder comms.

⚡ Engineering Mindset – Comfortable with APIs, scripting (PowerShell, Python), automation, infrastructure logging (Datadog), CNAPP (Wiz), and integrating tools (EDR, Email security, Storage security, WAF/CDN, IdP, MDM, etc.).

⚡ Cloud & Identity – Strong knowledge of Microsoft Entra ID, Azure, security workloads, Google Workspace, plus familiarity with AWS logging and control sets; experience with zero‑trust principles.

⚡ Compliance Savvy – Understanding of ISO 27001 controls for logging/monitoring, SOC 2 CC7, PCI‑DSS logging/IR, and DORA incident reporting; able to evidence controls and outputs.

⚡ Collaborator Extraordinaire – Strong communications skills with the ability to explain technical and security concepts, risks, controls in business terms.

You may not possess every single required skill listed, and that\\\’s perfectly fine. If you have most of them, along with grit, passion, a desire to learn quickly, and the willingness to get stuck in, we encourage you to apply.

Why Navro?

  • Lead and Shape the Future: This is your chance to build and grow a market from zero to one.
  • Make Real Impact: Your decisions will directly shape Navro’s growth journey.
  • Innovative Environment: Be at the forefront of Fintech innovation and payments disruption.
  • Career-Defining Role: This isn’t just another job. It’s a legacy.

Ready to Build Something Big?

This is your chance to leave your mark. If you’re ready to lead, build, and grow with the intensity that only startups offer, we want to hear from you.

Apply now and be part of Navro’s journey to revolutionise payments with us.

As part of this role you will receive the following:

  • You will enjoy 26 days of annual leave (excluding Bank holidays)
  • Volunteering & Compassionate leaves
  • Maternity and Paternity leaves
  • Private Healthcare
  • Company Options Scheme
  • Team socials
  • Comprehensive, interactive & engaging Training – Leadership, Communication and Presentation Skills, Behavioural Profiling, Conflict Management, etc
  • Career frameworks
  • Flexibility surrounding other commitments; within your team we will work around child-care or other appointments you have. We just ask for advance notice!
  • For those London Based 2-3 days per week in office
  • Working in a diverse and inclusive environment where we ensure that our people thrive

Navro does not accept unsolicited resumes from search firms/recruiters. Navro will not pay any fees to search firms/recruiters if a candidate is submitted by a search firm/recruiter unless an agreement has been entered into with respect to specific open position(s). Search firms/recruiters submitting resumes on an unsolicited basis shall be deemed to accept this condition, regardless of any other provision to the contrary.

#J-18808-Ljbffr

Cyber Security Lead employer: Navro

Navro is an exceptional employer for those seeking to make a significant impact in the fast-paced world of fintech. With a hybrid work model in London, employees enjoy a flexible environment that fosters innovation and collaboration, alongside comprehensive benefits such as private healthcare, generous leave policies, and extensive training opportunities. Here, you will not only lead critical cybersecurity initiatives but also have the chance to shape the future of payments while growing your career in a supportive and dynamic culture.
N

Contact Detail:

Navro Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Cyber Security Lead

✨Tip Number 1

Network like a pro! Reach out to people in the industry, attend meetups, and connect with potential colleagues on LinkedIn. You never know who might have the inside scoop on job openings or can put in a good word for you.

✨Tip Number 2

Prepare for interviews by researching the company and its culture. Understand their products and services, especially how they handle cybersecurity. Tailor your responses to show how your skills align with their mission and values.

✨Tip Number 3

Showcase your hands-on experience! Be ready to discuss specific projects you've worked on, especially those that demonstrate your ability to lead and innovate in cybersecurity. Real-world examples will make you stand out.

✨Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, it shows you’re genuinely interested in being part of our journey at Navro.

We think you need these skills to ace Cyber Security Lead

Cybersecurity Leadership
SIEM Implementation
Microsoft Sentinel Expertise
Incident Response Management
Threat Detection and Response
KQL Analytics Development
Automation and Scripting (PowerShell, Python)
Cloud Security Knowledge (Azure, AWS)
Compliance with ISO 27001, SOC 2, PCI-DSS
Security Operations Centre (SOC) Management
Telemetry Integration
Problem-Solving Skills
Communication Skills
Adaptability in Start-up Environments
Continuous Improvement Mindset

Some tips for your application 🫡

Be Bold and Authentic: When you're writing your application, let your personality shine through! We want to see the real you, so don’t be afraid to show your passion for cybersecurity and how you can make an impact at Navro.

Tailor Your Application: Make sure to customise your CV and cover letter to highlight your relevant experience and skills that match the job description. We love seeing how your background aligns with our mission and values!

Showcase Your Problem-Solving Skills: In your application, share examples of how you've tackled challenges in previous roles. We’re looking for someone who thrives in chaos and can bring clarity to complex situations, so let us know how you’ve done this before!

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates from our team!

How to prepare for a job interview at Navro

✨Know Your Stuff

Dive deep into the specifics of SIEM and Microsoft Sentinel. Be ready to discuss your hands-on experience with KQL analytics, incident response, and how you've tackled security challenges in past roles. This isn't just about theory; they want to see your practical knowledge in action.

✨Show Your Proactive Side

Navro is looking for someone who can take charge and lead initiatives. Prepare examples of how you've identified threats or improved security measures in previous positions. Highlight your ability to challenge assumptions and drive improvements in security operations.

✨Embrace the Chaos

Startups can be messy, and Navro wants someone who thrives in that environment. Share experiences where you've successfully navigated ambiguity or high-pressure situations. Discuss how you maintain clarity and focus when things get hectic.

✨Communicate Clearly

Strong communication skills are a must. Be prepared to explain complex security concepts in simple terms. Think about how you've communicated with stakeholders in the past, especially during incidents, and be ready to share those stories.

Cyber Security Lead
Navro
Location: City of London
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

N
  • Cyber Security Lead

    City of London
    Full-Time
    48000 - 72000 £ / year (est.)
  • N

    Navro

    50-100
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>