# Cyber Operations Vice President

**Company**: BlackRock
**Location**: Edinburgh
**Work arrangement**: onsite
**Experience**: senior
**Job type**: full-time
**Category**: IT
**Industry**: Finance
**Wikidata**: https://www.wikidata.org/wiki/Q219635

**Apply**: https://jobs.workable.com/view/3YtEL4MFZkMvfvLGXd8uKz/cyber-operations-vice-president-in-edinburgh-at-blackrock
**Canonical**: https://yubhub.co/jobs/job_9ed72a77-988

## Description

Join our global team of cyber security experts, protecting our business and developing exciting capabilities on the frontline of cyber defense. As a Cyber Operations Vice President, you will support the global Cyber Operations function and have key responsibilities such as acting as an escalation point for regional information security incidents, performing daily review of reports and alerts to identify Information Security events for further investigation, and collaborating with technical teams to identify, resolve, and mitigate events.

The ideal candidate will have 6+ years of experience in Security Operations, either engineering, development or analytics, and a university degree. Intermediate knowledge in system security architecture and security solutions, networking fundamentals, malware operation and indicators, current threat landscape, and security related technologies is required. Advanced event analysis leveraging SIEM tools, advanced incident investigation and response skill set, and log parsing and analysis skill set are also needed.

In addition to your technical skills, you will need strong oral and written communication skills, attention to detail, strong organizational skills, experience with scripting, knowledge of forensic techniques, integrity and the highest ethical standards, rapidly assimilating complex data and information, self-starting abilities, courage of convictions, and natural curiosity and desire to always learn.

## Skills

### Required
- system security architecture
- security solutions
- networking fundamentals
- malware operation
- indicators
- current threat landscape
- security related technologies
- SIEM tools
- incident investigation
- response
- log parsing
- analysis
