At a Glance
- Tasks: Join our team to protect data and systems from cyber threats while collaborating with IT.
- Company: Dynamic company focused on cybersecurity and innovation.
- Benefits: Competitive salary, flexible work options, and opportunities for professional growth.
- Other info: Fast-paced environment with a focus on cutting-edge technology and career advancement.
- Why this job: Make a real impact in cybersecurity and help shape a secure digital future.
- Qualifications: Experience in IT and cybersecurity risk management; analytical skills are a must.
The predicted salary is between 50000 - 60000 £ per year.
This is a hands-on security position working within the Information Security group and with the internal IT department at large. This position's core focus is to ensure consistent, measurable end-to-end delivery of security services. The successful candidate will work to develop and deploy capabilities, ensuring enterprise systems and data are protected with the security controls and tools required to meet policy and compliance requirements.
We are looking for candidates who have a passion for cybersecurity, threat detection, risk mitigation, and response. You will be a key part of our efforts to build and support a defensible environment where we are able to detect, contain and respond quickly to threats and compromises in ways that serve to enable the business needs of a highly collaborative organisation. The environment is fast-paced and commonly on the leading edge of technology, including early adoption of various cloud services along with the challenges of integrating those services into our security practice.
RESPONSIBILITIES
- Support a Technology Vendor Management program, ensuring technology risk reviews across multiple disciplines, and monitoring for renewals and savings opportunities.
- Participate in risk reviews of the IT control framework (NIST CSF, CIS, ITIL, ISO, etc.).
- Conduct thorough vendor, product and application security assessments partnering with systems owners to integrate security early during the project lifecycle.
- Partner with business groups to review workflows, producing output to enhance security processes in support of those workflows.
- Coordinate, across service owners, the implementation of core security integrations (SSO, Event Logs, Secrets, Alerting, Threat Model and Backup/Recovery) with applications developed in-house and externally/SaaS hosted environments.
- Ensure the security considerations identified are implemented and solutions are configured securely.
- Coordinate with IRM leadership to develop and deliver key security metrics to ensure technical security controls meet desired objectives; ensuring the measurable effectiveness of CAA's technical controls.
QUALIFICATIONS/REQUIREMENTS
- At least 3+ years' experience in Information Technology.
- At least 2 years' experience in cybersecurity risk management.
- A bachelor's or master's degree in a relevant field of work.
- Strong analytical skills in conducting due diligence to identify, assess and prioritise vendor risks.
- Familiarity with information security frameworks (NIST, ISO27001), data privacy regulations (GDPR, CCPA), and information security certifications/attestations (SOC, ISO, PCI-DSS, FedRAMP).
- Experience in coordinating technical integrations for security tooling and processes.
- Ability to review complex systems architectures to identify key security integration opportunities.
- Produce a comprehensive, written, security assessment of vendors' security posture.
- Experience using security analytics tooling to produce operational metrics and dashboards.
- A strong understanding of the fundamental operations of servers, operating systems, cloud applications, and infrastructure.
- Core skills in Cybersecurity fundamentals and Third-Party Risk Management.
- Familiarity with using Third Party Risk Management tools/processes such as One Trust, SIG or similar GRC platforms.
- Hands-on experience in Azure, AWS Cloud environments and familiarity with core Cloud services and Cloud architecture.
- Familiarity with core security concepts of Single Sign-on (e.g. PingFed, SAML), Identity and Access Administration (Active Directory, Azure AD, AWS IAM), Event Management (Splunk).
- Expert skills in using Microsoft Office suite, JIRA.
EEO STATEMENT
Creative Artists Agency (CAA) is committed to promoting equal opportunities in employment and creating a workplace culture in which diversity and inclusion is valued and everyone is treated with dignity and respect. As part of our zero-tolerance approach to discrimination in any form, you and any job applicants will receive equal treatment regardless of age, disability, gender reassignment, marital or civil partner status, pregnancy or maternity, race, colour, nationality, ethnic or national origin, religion or belief, sex or sexual orientation, or any other legally recognised protected basis under UK law.
Cybersecurity Risk Analyst in London employer: Caa Executive Search
Contact Detail:
Caa Executive Search Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cybersecurity Risk Analyst in London
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the cybersecurity field. Attend meetups, webinars, or even online forums. The more people you know, the better your chances of landing that dream job!
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your projects, assessments, or any relevant work you've done. This is your chance to demonstrate your hands-on experience and passion for cybersecurity.
✨Tip Number 3
Prepare for interviews by brushing up on common cybersecurity scenarios. Be ready to discuss how you'd handle risk assessments or vendor evaluations. Practice makes perfect, so get a friend to do mock interviews with you!
✨Tip Number 4
Don't forget to apply through our website! We love seeing candidates who are genuinely interested in joining our team. Plus, it’s a great way to ensure your application gets the attention it deserves.
We think you need these skills to ace Cybersecurity Risk Analyst in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Cybersecurity Risk Analyst role. Highlight your experience in cybersecurity, risk management, and any relevant frameworks you've worked with. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to express your passion for cybersecurity and how you can contribute to our team. Be specific about your experiences and how they relate to the responsibilities outlined in the job description.
Showcase Your Analytical Skills: Since this role requires strong analytical skills, make sure to include examples of how you've conducted risk assessments or managed vendor risks in the past. We love seeing concrete examples that demonstrate your expertise!
Apply Through Our Website: Don't forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you're keen on joining our team at StudySmarter!
How to prepare for a job interview at Caa Executive Search
✨Know Your Cybersecurity Frameworks
Familiarise yourself with key information security frameworks like NIST, ISO27001, and CIS. Be ready to discuss how these frameworks apply to the role and how you've used them in past experiences.
✨Showcase Your Analytical Skills
Prepare examples that highlight your analytical skills in risk management. Think of specific situations where you identified, assessed, and prioritised vendor risks, and be ready to explain your thought process.
✨Understand Cloud Security
Brush up on your knowledge of cloud environments, especially Azure and AWS. Be prepared to discuss how you would integrate security measures into these platforms and any hands-on experience you have with cloud services.
✨Prepare for Technical Questions
Expect technical questions related to security integrations, such as SSO and event management tools like Splunk. Review your past projects and be ready to explain how you implemented security controls effectively.