Skip to content

 

Job Application

 
 
 

Please answer the following questions in order to process your application.

 
 
Email Address *
 
Select your working status in the UK *
 
 
 
File Attachments:
(2MB file maximum. doc, docx, pdf, rtf or txt files only)
 
Attach a CV * 
 
Optional covering letter 
OR
Clear covering letter
 
 
 * denotes required field
 
 
 
Additional Information:
 
First Name
 
Last Name
 
Address
 
Country
 
Home Telephone
 
Mobile/Cell
 
Availability/Notice
 
Salary Expectation GBP
 
Approximately how far are you willing to travel to work (in miles) ?
 
 
 

Key Privacy Information

When you apply for a job, ComputerJobs will collect the information you provide in the application and disclose it to the advertiser of the job.

If the advertiser wishes to contact you they have agreed to use your information following data protection law.

ComputerJobs will keep a copy of the application for 90 days.

More information about our Privacy Policy.

 

Job Details

 

Information Security Officer (Permanent)

Location: Exeter, Devon Country: UK Rate: £65k - £70k per annum + benefits
 

Job Title: Information Security Officer

Location: Exeter - Fully Remote

Salary: £65,000 - £70,000 + benefits

Are you an experienced Information Security Officer looking for your next challenge? If so, this could be the ideal opportunity for you. My client, a specialist financial services business with an excellent reputation, is currently investing within their Information/Cyber Security team. As part of this investment, they are looking to hire an Information Security Officer to join the team.

Reporting directly into the CISO you will provide the specialist expertise to maintain and support IT security strategies by managing the overall IT security governance and compliance processes, ensuring that effective IT security controls and processes are being implemented across the business. They are also undergoing a major transformation programme at the moment and the role will be instrumental in supporting the projects by providing project assurance from an information security perspective.

Key responsibilities

  • To probe systems and processes to ensure appropriate controls are applied.
  • Provide security advice based on best practice to IT or Systems Owners.
  • Evaluation and risk assessment of new suppliers, software, systems or technologies.
  • Annual security reviews and risk assessment of IT suppliers.
  • Perform penetration testing.
  • Analyse IT requirements and provide objective advice on best practice IT security.
  • Identify and mitigate network vulnerabilities.
  • Research/evaluate emerging cyber security threats and ways to manage them.
  • Plan and test for disaster recovery, business continuity and create contingency plans for the event of any security breaches.
  • Monitor for attacks, intrusions and unusual, unauthorised or illegal activity.
  • Identify any gaps in controls on systems eg Active Directory, Intune, AWS, etc.
  • Control use of software libraries by developers and ensure vulnerabilities identified are resolved.
  • Conduct personalised Security Training for different employee groups.
  • Conduct internal audit under CISO supervision.
  • Investigate security alerts and provide support for incident response.
  • Maintain an information security risk register and assist with internal and external audits relating to information security.
  • Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues.
  • Review and refine IT security controls to ensure that they are appropriate to mitigate underlying resilience and residual risk.
  • To influence and manage IT security development best practices on the codebase for both internal and external development teams.
  • To design the security architecture topology, making sure it is part of the Service management framework.
  • To oversee all ongoing activities related to the development, implementation, and maintenance of information security policies and procedures by ensuring these policies and procedures encompass the overall security of information at rest or in transit within the systems.
  • To ensure vulnerabilities are managed by directing periodic internal/external penetration tests using ethical hacking.
  • Upon request of the CISO, to deputise any meetings as necessary to prioritise recommended improvements.

Skills and Experience required

  • Proven background within a similar Information Security Officer position.
  • Proven background within Information Security using proven methodologies with external resources.
  • Information Security certification (CISSP, CEH, CISM, etc)
  • A strong knowledge of ISO27001 and Cyber Essentials +
  • Systematic problem-solving approach, coupled with a strong sense of ownership and drive.
  • The ability to explain the risk of security threats and creating mitigations.
  • Experience with securing cloud-based services such as Azure or AWS.
  • A good understanding of GDPR standards and practices.
  • Excellent written and verbal communications skills as appropriate for the needs of the audience.

For more information or to apply please send a copy of your CV to (see below)


Posted Date: 26 Apr 2024 Reference: JS-DP/ISO7890 Employment Agency: Sanderson Recruitment Plc Contact: Danny Palmer