Job Search and Career Advice Platform

Enable job alerts via email!

Technical Incident Manager

Zopa Bank Limited

City of Westminster

On-site

GBP 60,000 - 80,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading financial services provider in the United Kingdom is seeking an Incident Management Lead to oversee the technology services' incident management lifecycle. The successful candidate will ensure rapid response to incidents and coordinate multi-discipline teams to restore service with minimal business impact. The role demands strong leadership, analytical skills, and a hands-on approach to IT service management, ideally in a regulated environment. Certification in ITIL is essential, and experience with relevant incident management tools is preferred.

Qualifications

  • Hands-on experience in IT service delivery and incident management.
  • Proven track record in coordinating major incidents and resolving complex issues.
  • Strong experience with incident management tools and automating workflows.

Responsibilities

  • Oversee the incident management lifecycle and ensure rapid response.
  • Lead and coordinate major incident response across teams.
  • Train and mentor colleagues to enhance service delivery.

Skills

IT Service Management
Incident Management
Stakeholder Management
Analytical Skills
Problem-Solving Skills
Leadership

Education

ITIL Certification

Tools

Jira Service Management
PagerDuty
Splunk
Job description

This role sits within our Technology Operations & Risk Team, which is responsible for IT Service Management as well as 1LOD Technology Risk, Business Change. Our goal is to help the technology organisation and wider business achieve its commercial objectives through balanced risk management, effective change delivery and resilience through timely response and resolution of incidents. As an enablement function for the business, we are continuously looking at ways to simplify and strengthen our processes through automation and AI. A day in the life:

Responsibilities
  • Take ownership for the end‑to‑end incident management lifecycle for our technology services – ensuring rapid detection, response, triage, remediation and post‑incident reviews, aligned to business needs and SLAs.
  • Lead the major incident / technical incident response process: ensure correct escalation, coordinate multi‑discipline teams (infrastructure, applications, security, operations etc), communicate status to stakeholders, restore service with minimal business impact, and ensure root‑cause and corrective/preventive actions.
  • Oversee the tooling ecosystem for incident management: ensure that incident management platforms (ticketing, alerting, monitoring dashboards, runbooks) are configured, maintained and optimised for efficiency, automation and metrics.
  • Monitor service performance and incident metrics (mean time to detect, mean time to resolve, recurrence rates, SLA compliance) and present reports to tech teams and senior leadership, using data to drive continual service improvement.
  • Partner with the security operations / cyber incident team to manage security‑related incidents (e.g., logging/alerting, log‑analysis, triage of suspicious activity, coordinating with SOC, forensic hand‑off, lessons‑learnt).
  • Own and evolve processes under recognised service‑management frameworks (for example ITIL / ISO/IEC 20000) ensuring they reflect Zopa Bank's environment, governance requirements and regulatory obligations.
  • Work closely with other IT and business stakeholders (operations, risk, compliance, development, infrastructure) to ensure service delivery is aligned to business outcomes, risks are managed and continuous improvement is embedded.
  • Train and mentor colleagues across the business, ensuring they have the right skills, tooling access and processes to deliver excellent service and response to incidents.
Qualifications
  • Hands‑on experience in IT service delivery/operations, with specific responsibility for incident management in a complex, high‑availability environment.
  • Proven track record of technical incident management: coordinating major incidents, triaging complex issues across infrastructure, applications, networks, coordinating cross‑team responses and driving resolution.
  • Strong experience with incident management tooling and platforms (for example ticket/alerting systems such as Jira Service Management, PagerDuty, Splunk, monitoring/observability tools, log‑analysis tools) and the ability to optimise workflows and automate where appropriate.
  • Certifications in relevant frameworks such as ITIL (Foundation or preferably Intermediate/Expert) and familiarity with service‑management standards such as ISO/IEC 20000.
  • Experience or strong awareness of security incident management practices: log analysis, triage of security alerts, coordination with SOC teams, performing root‑cause/root‑cause analysis for security events.
  • Excellent stakeholder management and communication skills: able to translate technical incident status into business‑impact language, manage expectations, escalates appropriately and keep leadership informed.
  • Strong analytical and problem‑solving skills: ability to review incident metrics, spotting trends, hypotheses for root causes, and initiating improvements.
  • Leadership skills: able to lead through incident pressure, guide teams, ensure calm in high‑stress incident responses, and drive incident review and lessons‑learnt into service improvements.
  • A proactive mindset for continual improvement: you identify and drive enhancements to processes, tooling, service‑levels, and resilience across the IT service management domain.
  • Ideally, experience working in a regulated environment (such as a bank/financial services) with an understanding of risk, compliance, audit and service‑governance implications of incident management.
Added Bonus
  • Experience with observability, monitoring and alerting platforms (for example Splunk, Prometheus, Grafana) and hands‑on log‑analysis skills (e.g., analysing event logs, application logs, network logs to support incident response or security investigations).
  • Certification or working knowledge in security or cyber incident response (for example CISSP, CISM, or incident response training).
  • Experience in designing and delivering major‑incident simulation/drill programmes or running incident simulation exercises (table‑top drills) to test readiness.
  • Experience in managing / migrating incident management tools and platforms.
  • Experience working in a Fintech or banking environment with real‑time services, where high availability, change‑control, risk and regulatory constraints are part of the daily operating model.
  • Knowledge of DevOps/CI/CD and how incident management integrates with deployment pipelines, monitoring, post‑release health checks and service resilience.
  • Experience managing external vendors/third‑party service providers in the incident response context (escalation, service‑contracts, SLAs, hand‑off).
  • Familiarity with cloud‑native incident monitoring and response (e.g., AWS CloudWatch) and hybrid infrastructure environments.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.