At a Glance
- Tasks: Lead security initiatives and ensure compliance with the UK Telecommunications (Security) Act.
- Company: Join iD Mobile, a leading mobile network operator with ambitious growth plans.
- Benefits: Hybrid working, ongoing training, and opportunities for career development.
- Why this job: Make a real impact on security in telecommunications while shaping your future.
- Qualifications: Extensive experience in telecoms, cyber security, and regulatory compliance required.
- Other info: Inclusive culture that values every voice and promotes diversity.
The predicted salary is between 48000 - 72000 ÂŁ per year.
We’re iD Mobile, one of the UK’s leading mobile virtual network operators. We launched in May 2015 and have over 2.4 million Pay Monthly customers. We offer everything from super-value Pay-as-you-go and SIM-only deals, right up to the latest smartphones from the big-name manufacturers. We’re delighted about our success so far and have very ambitious plans for the future. iD Mobile is part of Currys PLC, Europe's leading electrical and mobile retailer.
We’re looking to recruit a senior Information Security manager to act as the key interface between iD Mobile, Commercial, IT operations, and Currys information security & risk teams. The role is crucial to ensuring the security and resilience of iD Mobile’s systems, applications, and data and will also lead iD Mobile’s response to the UK Telecommunications (Security) Act (TSA). Knowledge and prior application of the TSA is essential, and a core responsibility will be delivering measurable improvements to iD Mobile’s risk posture against the TSA Security Measures across architecture, delivery, operations, supplier management, and contractual frameworks.
Alongside regulatory experience, the successful candidate will be highly attuned to developments in telecommunications security to ensure iD is always ahead of the game. The role must also have proficiency across a broad range of Information Security domains and act as the “go-to” security leader for all iD Mobile matters. This will include triaging security incidents, interpreting technical vulnerability data and prioritising remediation, assuring security-by-design, and ensuring TSA compliance & risk reduction are built into decision making across the business.
Formative understanding and acquisition of accurate inventories of all iD Mobile systems, architecture, people and processes will be paramount, aided by strong stakeholder management skills to influence steering groups and governance forums. There will also be opportunity to work with senior Currys Infosec colleagues in making operational improvements to security methodologies and drive future security strategy across iD Mobile and the wider Group.
Role overview:
- TSA Compliance & Governance: Lead the development and continuous improvement of the TSA compliance and control framework to improve iD Mobile’s risk posture. Embed TSA requirements & design checkpoints into Architecture Board, Portfolio governance, project teams and change processes. Provide structured TSA reporting, compliance insights, and risk updates to senior leadership and the Board. Deliver TSA-aligned supplier audits and contract uplifts to reduce supply-chain risk exposure. Establish a TSA Steering Forum with defined RACI, KPIs, and governance cadence.
- iD Mobile security leadership: Maintain an in-depth understanding of all iD systems, processes and people through hands-on operations. Act as the Information Security & TSA SME within governance forums. Produce monthly iD Mobile Cyber dashboards, reporting on iD project delivery & assurance, incidents and alerts.
- In conjunction with iD Operations teams: Regularly review IT asset inventories for accuracy and completeness in line with TSA compliance. Annotate inventories with installed security tooling and coverage. Compile a register of iD Mobile third party suppliers, their criticality level and associated risks and any regulatory frameworks (such as TSA) required of them. Maintain an audit-ready evidence repository. Provide security advisory input to Change Approval Board. Collaborate with technical leads, business analysts and project managers on a wide range of technology projects, including software development, package implementations and infrastructure upgrades/changes. Act as a Data Governance champion within iD Mobile ensuring data is classified and processed in an authorised manner.
- In conjunction with Currys Information Security teams: Provide second-line challenge for iD Mobile security incidents, crisis management and resilience planning. Lead post-incident lessons learned reviews and enact improvements in incident playbooks and operational processes to reduce risk. Liaise with Security Operations to identify trending threat patterns, security tool uptime and SLAs. Design and schedule an annual programme of penetration testing / red teaming (TBEST aligned) for relevant iD Mobile environments. Review penetration test, vulnerability scans and exposure management tool output and determine appropriate risk scores and remedial activities. Assist Capex delivery within iD Mobile through provision of non-functional security requirements, RFP scoring, architectural review and presentation to the Data & Security Approval Board. Regularly review the ID Mobile risk register, drive risk closure and management, monitor for ongoing non-compliance, escalating where necessary. Lead the response to regulatory and business-to-business audits and security reviews of iD Mobile operations.
Experience:
- Extensive experience in telecoms, cyber security, operational risk, or regulatory compliance.
- Deep knowledge of the UK Telecommunications (Security) Act and Ofcom Security Measures.
- Strong track record influencing senior governance forums and decision-making bodies.
- Hands-on experience with supplier assurance, third-party risk management, and security audits.
- Ability to drive improvements that strengthen organisational risk posture.
- Certifications such as CISSP, CISM, CRISC, ISO 27001 Lead Auditor.
- Knowledge of MNO/MVNO network environments and telecom operational processes.
- Experience in second-line assurance or internal audit functions.
Join our team and we’ll be with you every step of the way, helping you develop the career you want with new opportunities, on-going training and skills for life. Not only can you shape your own future, but you can help take charge of ours too. As the biggest recycler and repairer of tech in the UK, we’re in a position to make a real impact on people and the planet. Every voice has a space at our table and we’re committed to making inclusion and diversity part of everything we do, including how we strengthen our workforce. We want to make sure you have a fair opportunity to show us your talents during our application process, so if you need any additional assistance with your application please email careers@currys.co.uk and we’ll do our best to help.
Senior Information Security Manager employer: Dixons Carphone
Contact Detail:
Dixons Carphone Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Information Security Manager
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the industry. Attend events, join online forums, or even hit up LinkedIn. The more people you know, the better your chances of landing that dream job.
✨Tip Number 2
Prepare for interviews by researching the company and its culture. Understand their values and how they align with yours. This will help you tailor your responses and show them you're the perfect fit for the team.
✨Tip Number 3
Practice makes perfect! Do mock interviews with friends or use online tools to get comfortable with common questions. The more you practice, the more confident you'll feel when it’s time to shine.
✨Tip Number 4
Don’t forget to follow up after your interview! A quick thank-you email can go a long way in showing your enthusiasm for the role. Plus, it keeps you on their radar as they make their decision.
We think you need these skills to ace Senior Information Security Manager
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Senior Information Security Manager role. Highlight your experience with the UK Telecommunications (Security) Act and any relevant certifications. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about information security and how you can contribute to iD Mobile's mission. Be sure to mention specific experiences that relate to the job description.
Showcase Your Achievements: When detailing your past roles, focus on measurable achievements. Did you improve security compliance or reduce risk? We love numbers and results, so make sure to include them to grab our attention!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you're serious about joining our team at iD Mobile!
How to prepare for a job interview at Dixons Carphone
✨Know Your TSA Inside Out
Make sure you have a solid understanding of the UK Telecommunications (Security) Act and its implications for iD Mobile. Brush up on the key security measures and be ready to discuss how you've applied them in previous roles. This will show that you're not just familiar with the regulations, but that you can actively contribute to improving the company's risk posture.
✨Showcase Your Stakeholder Management Skills
As a Senior Information Security Manager, you'll need to influence various teams and governance forums. Prepare examples of how you've successfully managed stakeholders in the past, particularly in high-pressure situations. Highlight your ability to communicate complex security concepts to non-technical audiences, as this will be crucial in your role.
✨Demonstrate Hands-On Experience
Be ready to discuss your hands-on experience with security audits, supplier assurance, and incident management. Share specific examples of how you've triaged security incidents or improved operational processes. This will help the interviewers see that you’re not just a theoretical expert, but someone who can roll up their sleeves and get things done.
✨Prepare for Technical Questions
Expect technical questions related to information security domains, vulnerability management, and risk assessment. Brush up on your knowledge of security tools and methodologies relevant to telecommunications. Practising answers to common technical scenarios can help you feel more confident and articulate during the interview.