A.P. Moller - Maersk Logo

A.P. Moller - Maersk

Technical Lead - Cyber

Posted 12 Days Ago
Be an Early Applicant
Maidenhead, Berkshire, England
Senior level
Maidenhead, Berkshire, England
Senior level
The Technical Lead will oversee incident response initiatives, act as a primary technical contact during cyber incidents, and drive enhancements in detection and response capabilities. The role involves mentoring a multidisciplinary team and engaging in proactive threat hunting, purple teaming exercises, and continuous improvement of cyber defense strategies.
The summary above was generated by AI

Join Maersk’s groundbreaking Cyber Team: Redefining Incident Management & Response  

 

Imagine a career where you're not just responding to security incidents—you’re revolutionising how it’s done. At Maersk, one of the world’s largest and most respected logistics and shipping companies, our Cyber team is pioneering a whole new approach to incident response. This isn’t your typical SOC/CERT role: our combined fire team approach team is built on cutting-edge research and designed to drive change, resilience, and agility in ways the industry has never seen before.  

 

Here, you’ll be part of a dynamic team that works together to defend, adapt, and innovate with freedom and purpose. You won’t just work on IR; you’ll help improve how it’s done. Dive into purple teaming, create and refine world-class detections, shape change projects, and push the boundaries of what’s possible—all during the workday with no overnight shifts. Plus, we champion continuous learning and growth through Capture the Flag (CTF) exercises and direct opportunities to bring your ideas to life.  

Are you ready to be part of something transformational at Maersk and join a team that’s setting a new standard in cybersecurity?   

  • Join a World-Class Cyber Team: Be part of an elite cyber operation at one of the globe’s most renowned logistics companies, where your contributions truly make a difference.  
  • Multidimension role to Keep You Engaged: Unlike any traditional Incident Response type roles, as a CERT analyst in Maersk, you’ll engage in a variety of activities, switching between defensive and offensive strategies, conducting threat hunts, and participating in innovative projects and research. This multifaceted approach ensures you won’t experience burnout often associated with Incident Response.  
  • Continuous Learning & Dynamic Environment: Enjoy ongoing training and development in a fast-paced, stimulating atmosphere. Participate in exciting CTF competitions alongside a team of experts, pushing the boundaries of your knowledge and skills.  
  • Using cutting edge technologies: Tackle complex cyber incidents that require innovative solutions and utilizing the latest technologies available in the market. Your expertise will be crucial in addressing and mitigating sophisticated threats, allowing you to hone your skills in a real-world environment.  
  • Innovate and Impact: Engage in innovative projects that allow you to bring your ideas to life, help shape the future of cybersecurity while developing new capabilities that enhance our operations.  

 

Key responsibilities 

 

Incident Response and Leadership 

  • Act as the principal technical point of contact for all cyber security matters, providing expertise to senior engineers and analysts. 
  • Act as the principal escalation point for the most complex and high-risk incidents, driving resolution with precision and technical depth. 
  • Leading the cyber Incident Response process from a technical perspective and effective management of high-priority cyber incidents. 
  • Supporting the Incident Manager in driving post-incident reviews 
  • Collaborate with global stakeholders in technical conversations, to align response efforts and communicate effectively across technical audiences during incidents.  

Continuous Improvement 

  • Identify gaps and continuously improve detection and response capabilities by creating and fine-tuning use cases, developing automation and documenting processes and playbooks. 
  • Identifying lessons learned to improve future incident response and detection strategies. 
  • Contribute to development of detection mechanisms for sophisticated adversarial techniques based on the MITRE ATT&CK framework.   

Purple Teaming and Advanced Testing 

  • Lead purple teaming exercises to integrate offensive and defensive strategies, driving measurable improvements in detection and response. 
  • Architect and execute advanced attack simulations, employing state-of-the-art offensive tools and TTPs to test organizational resilience. 
  • Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing. 

Leadership and Team Development 

  • Mentor and coach a multidisciplinary team of analysts and investigators, from a technical perspective. 
  • Lead CTF exercises or other similar initiatives to maintain continuously development of team skills. 
  • Champion new technologies and run coaching sessions to cross skill team members. 
  • Assist the leadership team with quality control and feedback reviews. 
  • Develop training materials and deliver training as part of the team’s continuous development. 
  • Conduct and participate in Cyber Incident Response exercises. 

 

 

Required experience & skills 

 

Technical Skills and Knowledge: 

  • Incident Response: 
    • Ability to conduct thorough host and network investigations to analyze and mitigate malicious activities using tools like Sysinternals, Wireshark, and TCPDump. 
    • Strong log analysis skills across various platforms, including OS, web applications, network devices, and security tools (e.g., Anti-malware, EDR, IPS, IDS, WAF, email protection, DLP, routers, load balancers, and proxies). 

 

  • Cloud Security Knowledge: 
    • Strong knowledge of cloud technologies and security (e.g., AWS, Azure, Alibaba, Google Cloud), with skills in performing investigations, log analysis, and incident response. 

 

  • OT/IOT: 
    • Understanding of OT environment and security is desirable but not essential.  

 

  • OS Security Knowledge: 
    • Deep understanding of operating systems, OS-level exploits, and cybersecurity for Windows and Linux, including OS hardening techniques. 
    • Ability to locate, analyze, and interpret forensic artifacts in Windows and Linux during investigations (e.g., registry, event logs, browser history, memory dumps) using tools like Volatility and FTK. 

 

  • Application Security Knowledge: 
    • Familiarity with application-level attacks, prevention methods, hardening configurations, and log analysis for applications like web applications and databases. 
    • Proficiency in scripting languages (e.g., Bash, Python, PowerShell) for automation and process improvement. 
    • Strong understanding of malware behavior, persistence mechanisms, and the ability to perform static and dynamic analysis, including sandbox report interpretation and reverse engineering. 

 

  • Purple Teaming: 
    • Knowledge of various cyber attacks, simulations, and identification methods. 
    • Ability to lead purple teaming activities, developing scenarios and engaging in both blue and red team activities. Proficiency with offensive tools like Metasploit, Nmap, Cobalt Strike, Hydra, John the Ripper, Burp Suite, Mimikatz, Bloodhound, and others. 

 

  • Threat Hunting: 
    • Experience with advanced persistent threat (APT) tactics, techniques, and procedures (TTPs) mapped to the cyber kill chain. 
    • Create hypotheses for proactive threat hunts and utilize tools like MISP and Jupyter Notebook for effective hunts. 

 

  • Process Development: 
    • Develop playbooks and templates for incident management. 
    • Identify and address gaps in current processes, collaborate with other teams, and build streamlined cross-departmental processes. 
  • Automation Development: 
    • Identify repetitive tasks and develop automation ideas. 
    • Collaborate with automation teams to build capabilities using platforms like CrowdStrike Fusion, AWS Lambda, Azure Logic Apps, XSOAR, and Python scripts. 
  • Languages: 
    • Query Languages: Proficiency in query languages like KQL and Logscale for investigations and log analysis. 
    • Scripting Languages: Proven experience in scripting. 
  • Managing Relationships: 
    • Develop and maintain key relationships with forensics, security operations governance, cyber defence engineering, risk and compliance, IT, and other business units. 

 

Soft Skills: 

  • Operations Management & Issue Resolution: Ensure smooth operations and continuity by proactively identifying and addressing operational issues, team dynamics, and inefficiencies in ticket handling. 
  • Report Writing: Ability to write reports that convey highly technical information whilst remaining accessible to a non-technical audience (including at executive level). 
  • Communication: Exhibit excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner. 
  • Mentorship: training and guiding junior team members, promoting a culture of knowledge sharing and continuous learning. 
  • Critical Thinking, Adaptability & Problem-Solving: Demonstrate strong analytical skills and flexibility to adapt to changing priorities and emerging cybersecurity threats while effectively solving problems. 
  • Time Management & Organization: Prioritize tasks efficiently and maintain organized documentation and processes to enhance team productivity. 
  • Teamwork & Positive Attitude: Foster a collaborative environment where team members feel supported, practicing active listening, motivating the team, and maintaining a positive demeanour, especially in high-pressure situations. 

 

Qualifications: 

  • 7+ years of experience in cybersecurity, with a minimum of 3 years in a SOC or incident response leadership role. 
  • Relevant advanced certifications (e.g., GCIA, GSEC, CEH, GCDA, GCIH, GCFA, OSCP) are highly desirable but not essential. 
  • Proven self-learning abilities demonstrated through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF. 

 

 

Bonus Points: 

  • Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc). 
  • Low-level programming experience for example, C, Python, Go, and/or other languages desirable 
  • Assembly language knowledge is a plus. 
  • Experience in User-Interface/User-Experience (UI/UX) design and development. 
  • Development and deployment of dockerized applications. 
  • 3 years of experience in static and dynamic malicious code reverse engineering. 
  • Experience with multiple platforms (Linux, MacOS, mobile, etc.) is a plus. 
  • A background in intelligence is a plus. 

Company Benefits:

  • Flexible working arrangement: Remote working with occasional in person team building activities
  • Collaborative Culture: Experience a supportive and inclusive work environment that values teamwork and innovation. We believe in open communication and knowledge sharing, ensuring that every team member feels empowered and valued.
  • Work-Life Balance: We understand the importance of maintaining a healthy work-life balance. Our flexible working arrangements and supportive policies enable you to excel in your role while enjoying your personal life.

Maersk is committed to a diverse and inclusive workplace, and we embrace different styles of thinking. Maersk is an equal opportunities employer and welcomes applicants without regard to race, colour, gender, sex, age, religion, creed, national origin, ancestry, citizenship, marital status, sexual orientation, physical or mental disability, medical condition, pregnancy or parental leave, veteran status, gender identity, genetic information, or any other characteristic protected by applicable law. We will consider qualified applicants with criminal histories in a manner consistent with all legal requirements.

 

We are happy to support your need for any adjustments during the application and hiring process. If you need special assistance or an accommodation to use our website, apply for a position, or to perform a job, please contact us by emailing  [email protected]

Top Skills

Application Security
Automation Development
Cloud Security
Cybersecurity
Incident Response
Os Hardening
Process Development
Purple Teaming
Scripting Languages
Security Tools
Threat Hunting

Similar Jobs

2 Days Ago
London, Greater London, England, GBR
Senior level
Senior level
Financial Services
The Cyber Security Engineer will manage and monitor security systems, conduct threat assessments, design security solutions, deliver security training, and handle incident responses, all while ensuring compliance with security standards. They will also assess third-party risks and integrate security practices within DevOps pipelines.
9 Hours Ago
Hybrid
London, Greater London, England, GBR
Senior level
Senior level
Financial Services
As a Product Security Lead, you'll drive security culture, manage security risks, and collaborate with teams on a wide range of cybersecurity issues while ensuring compliance and enhancing product security. Your role involves acting as a thought leader, managing emerging security issues, and translating complex technical concepts for diverse stakeholders.
19 Hours Ago
Hybrid
London, Greater London, England, GBR
Senior level
Senior level
Fintech • Mobile • Payments • Software • Financial Services
The Senior Presales Consultant at Wise will design payment solutions for enterprises, engaging with stakeholders to understand their needs. The role includes presenting product demos, influencing decision-making, and driving revenue alongside sales teams, while ensuring reliable solutions are documented and customer feedback is integrated into product roadmaps.

What you need to know about the London Tech Scene

London isn't just a hub for established businesses; it's also a nursery for innovation. Boasting one of the most recognized fintech ecosystems in Europe, attracting billions in investments each year, London's success has made it a go-to destination for startups looking to make their mark. Top U.K. companies like Hoptin, Moneybox and Marshmallow have already made the city their base — yet fintech is just the beginning. From healthtech to renewable energy to cybersecurity and beyond, the city's startups are breaking new ground across a range of industries.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account