UK cyber security boss Ciaran Martin to step down
Ciaran Martin, CEO of the UK’s National Cyber Security Centre (NCSC), is to step down later in 2020 after nearly seven years in charge of the government’s cybersecurity efforts.
Having been appointed to the board of GCHQ as security head in 2013, Martin, who was appointed a Companion of the Order of the Bath (CB) in the New Year’s Honours List, was instrumental in the establishment of the NCSC as a unit within GCHQ following the 2015 General Election.
“It has been the privilege of a lifetime to set up the NCSC and lead its brilliant people. When we created the NCSC, we set out to achieve something truly special, and I hope and believe we are leaving UK cyber security in much better shape,” said Martin.
“Challenges around securing technology are only going to get ever more complex, so it’s right that after six and a half years that someone else takes this world-class organisation to the next level.”
A career civil servant and latterly a frequent fixture on Computer Weekly’s UKtech50 list of the most influential people in British IT, Martin helped position the NCSC at the forefront of major improvements to the UK’s security posture – Britain is considered a global leader in cyber as a result.
The NCSC now employs more than 1,000 and commands a budget in excess of £250m. It has dealt with well over 2,000 major cyber security incidents since it opened its doors in 2016 and has driven a more assertive cyber security policy on behalf of the government.
This has included providing evidence to enable Westminster to publicly attribute state-sponsored cyber attacks to Russia and other states, taking steps to improve the security of Britain’s critical national infrastructure in areas such as energy and communications, and pioneering an active cyber defence programme that has helped the government clamp down on malicious websites, including those that spoof legitimate public sector services such as HMRC.
It has also backed the government’s Cyber Essentials scheme, which provides security support for businesses, and taken a leading role in the Cyber Girls First programme, which has provided thousands of girls with cyber security education.
GCHQ will soon set out the processes for appointing a new chief executive in anticipation of a smooth handover during the summer of 2020. The post is a director general-level appointment within GCHQ, and reports directly to GCHQ director Jeremy Fleming.
Due to his position as a senior civil servant, Martin is subject to regulations that prevent him from disclosing his future plans for the time being, although he will be taking up a position as a visiting professor at King’s College London this autumn.
Industry: Cyber Security
- Outside IR 35 CONTRACT SC CLEARED Cyber Security Operations Analyst SPLUNK ES- UK REMOTE- £500 a day.
6 month contract Outside IR35 Operational Cyber Security Analyst. Hands on Splunk Security Enterprise and Security clearance is required As is someone that holds SC clearance. SOC and Vulnerability management experience. Vulnerability Analysis / Management - Tenable
- SailPoint Consultant
- Upto €80,000
SailPoint Consultant is need for this rapidly expanding global business, The business is currently in the middle of a SailPoint Deployment, they require an experienced Consultant who is able to help them on this Journey You will be responsible for helping to configure and deploy SailPoint as well as on board applications onto the platform You will also work with the business to understand workflow and process to help align the way the business works to ensure that the business gets the most from the deployment We are looking for an experienced SailPoint consultant who has experience with both Deployment and BAU work and is interested in joining a business which is at the start of an interesting IAM Journey
- SOC Manager Security Operations. SIEM, Threat / Vulnerability, IR, SOC Service- Exclusive
- United Kingdom
SOC Manager- SIEM, Threat / Vulnerability, Incident response. Exclusive Project. Management and on growth growth of Security Operations Centre capability. Managing and maturing the team, technical services line and fronting client engagements where needed. An in-depth technical background is essential, experience across SOC SIEM/ Threat Hunting (IR) tools, processes, techniques, operational is a MUST. The role will include, but not limited to; evolving the technical process, building operational capability, managing and hiring team, involved at a high level overviewing policy/playbooks, fine turning of the go-to-market collateral etc.
- Contact 12 month- Security Operations- Tanium Engineer / Analyst.
- United Kingdom
- Dependent on experience
Security Operations engineer / Analyst with Tanium for a 12 month contract. Experience configuring using, managing, supporting troubleshooting Tanium's suite of end point solutions is essential. The opportunity is due to a client expanding its international capability to a follow the sun model. To be involved in spinning up a European capability. Based in the UK. English essential and ideally being fluent in French.