At a Glance
- Tasks: Join our team to protect enterprise systems and data from cyber threats.
- Company: Dynamic tech company focused on cybersecurity and innovation.
- Benefits: Competitive salary, flexible work options, and opportunities for professional growth.
- Other info: Fast-paced environment with a strong focus on collaboration and career advancement.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technology.
- Qualifications: 3+ years in IT and 2+ years in cybersecurity risk management required.
The predicted salary is between 50000 - 60000 £ per year.
OVERVIEW
This is a hands‑on security position working within the Information Security group and with the internal IT department at large. This position's core focus is to ensure consistent, measurable end‑to‑end delivery of security services. The successful candidate will work to develop and deploy capabilities, ensuring enterprise systems and data are protected with the security controls and tools required to meet policy and compliance requirements. We are looking for candidates who have a passion for cybersecurity, threat detection, risk mitigation, and response. You will be a key part of our efforts to build and support a defensible environment where we are able to detect, contain and respond quickly to threats and compromises in ways that serve to enable the business needs of a highly collaborative organisation. The environment is fast‑paced and commonly on the leading edge of technology, including early adoption of various cloud services along with the challenges of integrating those services into our security practice.
RESPONSIBILITIES
- Support a Technology Vendor Management program, ensuring technology risk reviews across multiple disciplines, and monitoring for renewals and savings opportunities.
- Participate in risk reviews of the IT control framework (NIST CSF, CIS, ITIL, ISO 270001, etc.).
- Conduct thorough vendor, product and application security assessments partnering with systems owners to integrate security early during the project lifecycle.
- Partner with business groups to review workflows, producing output to enhance security processes in support of those workflows.
- Coordinate, across service owners, the implementation of core security integrations (SSO, Event Logs, Secrets, Alerting, Threat Model and Backup/Recovery) with applications developed in‑house and externally/SaaS hosted environments.
- Ensure the security considerations identified are implemented and solutions are configured securely.
- Coordinate with IRM leadership to develop and deliver key security metrics to ensure technical security controls meet desired objectives; ensuring the measurable effectiveness of CAA's technical controls.
QUALIFICATIONS/REQUIREMENTS
- At least 3+ years' experience in Information Technology.
- At least 2 years' experience in cybersecurity risk management.
- A bachelor's or master's degree in a relevant field of work.
- Strong analytical skills in conducting due diligence to identify, assess and prioritise vendor risks.
- Familiarity with information security frameworks (NIST, ISO27001), data privacy regulations (GDPR, CCPA), and information security certifications/attestations (SOC, ISO, PCI‑DSS, FedRAMP).
- Experience in coordinating technical integrations for security tooling and processes.
- Ability to review complex systems architectures to identify key security integration opportunities.
- Produce a comprehensive, written, security assessment of vendors security posture.
- Experience using security analytics tooling to produce operational metrics and dashboards.
- A strong understanding of the fundamental operations of servers, operating systems, cloud applications, and infrastructure.
- Core skills in Cybersecurity fundamentals and Third‑Party Risk Management.
- Familiarity with using Third Party Risk Management tools/processes such as One Trust, SIG or similar GRC platforms.
- Hands‑on experience in Azure, AWS Cloud environments and familiarity with core Cloud services and Cloud architecture.
- Familiarity with core security concepts of Single Sign‑on (e.g. PingFed, SAML), Identity and Access Administration (Active Directory, Azure AD, AWS IAM), Event Management (Splunk).
- Expert skills in using Microsoft Office suite, JIRA.
EEO STATEMENT
Creative Artists Agency ("CAA") is committed to promoting equal opportunities in employment and creating a workplace culture in which diversity and inclusion is valued and everyone is treated with dignity and respect. As part of our zero‑tolerance approach to discrimination in any form, you and any job applicants will receive equal treatment regardless of age, disability, gender reassignment, marital or civil partner status, pregnancy or maternity, race, colour, nationality, ethnic or national origin, religion or belief, sex or sexual orientation, or any other legally recognised protected basis under UK law.
Cybersecurity Risk Analyst employer: Caa Executive Search
Contact Detail:
Caa Executive Search Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cybersecurity Risk Analyst
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the cybersecurity field. Attend meetups, webinars, or even online forums. The more people you know, the better your chances of landing that dream job!
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your projects, assessments, or any relevant work you've done. This is your chance to demonstrate your expertise in cybersecurity risk management and make a lasting impression.
✨Tip Number 3
Prepare for interviews by brushing up on common cybersecurity scenarios. Be ready to discuss how you'd handle specific risks or threats. Practising your responses will help you feel more confident and articulate during the interview.
✨Tip Number 4
Don't forget to apply through our website! We love seeing candidates who are genuinely interested in joining our team. Plus, it gives you a chance to showcase your enthusiasm for the role and the company.
We think you need these skills to ace Cybersecurity Risk Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Cybersecurity Risk Analyst role. Highlight your relevant experience in cybersecurity, risk management, and any specific frameworks you've worked with. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to express your passion for cybersecurity and how you can contribute to our team. Share specific examples of your past work that relate to the responsibilities mentioned in the job description.
Showcase Your Analytical Skills: Since this role requires strong analytical skills, make sure to include examples of how you've conducted due diligence or assessed vendor risks in your application. We love seeing candidates who can think critically about security challenges!
Apply Through Our Website: Don't forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you're keen on joining our awesome team at StudySmarter!
How to prepare for a job interview at Caa Executive Search
✨Know Your Cybersecurity Frameworks
Familiarise yourself with key information security frameworks like NIST, ISO 27001, and CIS. Be ready to discuss how you've applied these in past roles, especially in risk management and vendor assessments.
✨Showcase Your Analytical Skills
Prepare examples that highlight your analytical skills in identifying and prioritising vendor risks. Think of specific situations where you conducted due diligence and the impact it had on your organisation's security posture.
✨Understand Cloud Security
Brush up on your knowledge of cloud environments, particularly Azure and AWS. Be prepared to discuss how you've integrated security measures in cloud applications and any challenges you've faced in doing so.
✨Communicate Clearly and Collaboratively
Since this role involves working closely with various teams, practice articulating your thoughts clearly. Prepare to discuss how you've collaborated with business groups to enhance security processes and workflows in previous positions.