by Paul Clayton on 2023-01-24

Introducing Paul Clayton, SOC manager

Paul Clayton is a SOC manager at Airbus Protect’s Newport campus. With five years’ experience in the role, he has a wealth of expertise. Some of which he’s passing on to his daughter Heather, who joined Airbus Protect in 2022 as a project controller. 
We sat down with Paul to learn more about his career trajectory – from the military to cybersecurity – and to get his top tips for anyone thinking of applying to our open SOC jobs at Airbus Protect. 
First up, we have to ask, what’s it like to work alongside a family member? 
Enjoyable. Heather is new to this kind of work, so it’s good that I’m there to offer her a helping hand when she comes across the hundreds of three-word acronyms we use daily. 

There’s a lot of jargon to get to grips with when you start working in cyber. But it’s all part of the challenge – every day in this job is different!
Can you explain your path to becoming a SOC manager?
It started when I was still in the military. In the summer of 2005, I was posted to the UK’s Joint Cyber Unit, which was responsible for the protective monitoring of military networks. I ended up staying for three years to train and work shifts, and for a final year as a shift supervisor. 

After this, I took off my uniform and walked across the Ministry of Defence's Global Operations Security Control Centre (GOSCC) floorplate to join Airbus as a shift analyst – where I [...]

  • Share

Discover all the latest releases

Digital twins with light blue background Innovation

Digital Twins in companies

Contribute to the assessment of the environmental performance of companies using digital twins for simulation and decision making. What are the challenges of adopting the taxonomy of sustainable activities at EU level? Taxonomy at EU level On April 21, 2021, the European Commission adopted a set of measures aimed at better directing capital flows towards […]

Read more
Honeypot & deceptive security Cybersecurity

Deceptive security: how to catch more flies with honeypots

From governments to industrial manufacturers, organisations across all sectors are experiencing an unprecedented level of cyber-attacks, intrusion attempts and malware. To stay one step ahead, it’s crucial for cyber security leaders to gain a deep understanding of attackers’ tactics, equipment and methods, without compromising the confidentiality, integrity and availability of their organisation’s systems. Increasingly, honeypots […]

Read more
Satellite cyber security - Airbus Protect Cybersecurity

Satellite cyber security is more important than ever – here’s why

Orbiting miles above us, satellites play a crucial role in ensuring life on Earth runs smoothly. Navigation systems, TV broadcasts, weather and climate monitoring, military communications and IoT devices all rely on satellites. And our dependence on them is increasing each day. Consider the recent launch of Elon Musk’s Starlink internet system, which uses satellites […]

Read more
The golden age of ransomware - Airbus Protect Cybersecurity

The golden age of ransomware: what you should know

So far this year, 68.5% of all cyber-attacks worldwide have been ransomware related – representing an all-time high. The popularity of ransomware has been rising steeply since 2018. It’s no surprise then, that many have dubbed this the golden age of ransomware. With over 300 million ransomware attacks occurring annually, it’s not a question of if your organisation will face […]

Read more
code lignes Cybersecurity

Think twice before implementing encryption

As we’ve seen before[*], encryption is a protection means rather than a security objective. Strong of that knowledge, we have clearly defined who should have access to our data, and who should not. Is encryption a good solution, then? Security attributes are often summed in three, sometimes four, basic properties that we may need to […]

Read more
digital system Cybersecurity

Security of sensor fusion systems: Mission statement

Systems have been using sensors for a long time, to gain an understanding of their environment. More recently, the advent of autonomous systems, and the increasing demands of reliability, have led to the multiplication of sensor inputs. So we now commonly have systems that estimate their location using a mix of GPS, odometry, LIDAR, cameras, […]

Read more