At a Glance
- Tasks: Join a dynamic team to enforce security policies and support incident response.
- Company: A city-based commodities business focused on robust cyber security.
- Benefits: Engage in professional development and obtain certifications while enjoying a collaborative work environment.
- Why this job: Make a real impact in cyber security while working with diverse teams and cutting-edge technology.
- Qualifications: Bachelor’s degree in Information Security or related field; 5+ years in enterprise cybersecurity required.
- Other info: Experience with Microsoft Defender, Sentinel, and financial services information security preferred.
The predicted salary is between 48000 - 72000 £ per year.
Our client, a city-based commodities business is seeking a Cyber Security Specialist to join this fantastic team. The role reports into the Information Security Manager (ISM).
Responsibilities include:
- Enforce policies, support procedures, ensure regulatory compliance, and collaborate with various departments on security-related initiatives.
- Support Cyber Security Operations, Incident Response and Investigations.
- Analyse security data using Excel, Python, and PowerBI.
- Conduct IT security risk assessments and basic security analysis.
- Collaborate with IT, legal, and compliance teams.
- Develop and deliver security training programs.
- Provide security updates to IT Risk Committee.
- Engage in professional development and obtain certifications.
- Maintain the ICT Risk Management Framework.
- Create findings within the risk register, and track to resolution.
Qualifications:
- Bachelor’s degree in Information Security, Computer Science, or related field.
- Experience in Cyber Security Operations with a track record in Incident Response and Investigations.
- Experience with Microsoft Defender and Sentinel.
- Knowledge of security analysis and incident response.
- Preferred experience in financial services information security.
- Proficiency in Excel, Python, PowerBI, PowerPoint, Confluence & Jira.
- 5+ years in enterprise cybersecurity IT, with Cloud and On-premise experience.
- Microsoft Security certifications or equivalent (MS365 / Azure).
- Knowledge of modern operating systems, networking protocols, and cyber risks.
- Ability to manage multiple projects and maintain confidentiality.
- Proficiency in MS Office and data visualisation tools like Power BI.
- Continual professional development and certifications (CISSP, GIAC, CISA, CISM) desirable.
IT Security specialist/Information Security/IT Data Security employer: dnevo Partners
Contact Detail:
dnevo Partners Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land IT Security specialist/Information Security/IT Data Security
✨Tip Number 1
Familiarise yourself with the specific tools mentioned in the job description, such as Microsoft Defender and Sentinel. Having hands-on experience or even completing relevant online courses can give you a significant edge during interviews.
✨Tip Number 2
Network with professionals in the cybersecurity field, especially those who work in financial services. Attend industry events or join online forums to gain insights and potentially get referrals that could help you land the job.
✨Tip Number 3
Stay updated on the latest trends and threats in cybersecurity. Being able to discuss current events or recent incidents during your interview will demonstrate your passion and commitment to the field.
✨Tip Number 4
Prepare to showcase your analytical skills, particularly with Excel, Python, and PowerBI. Consider creating a small project or case study that highlights your ability to analyse security data effectively, which you can present during your interview.
We think you need these skills to ace IT Security specialist/Information Security/IT Data Security
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in cyber security operations, incident response, and the specific tools mentioned in the job description, such as Microsoft Defender and PowerBI. Use keywords from the job listing to ensure your application stands out.
Craft a Compelling Cover Letter: In your cover letter, express your passion for information security and detail how your background aligns with the responsibilities of the role. Mention specific projects or experiences that demonstrate your expertise in cyber incident response and collaboration with various departments.
Showcase Technical Skills: Highlight your proficiency in Excel, Python, and PowerBI within your application. Consider including examples of how you've used these tools in past roles to analyse security data or conduct risk assessments.
Emphasise Continuous Learning: Mention any relevant certifications you hold or are pursuing, such as CISSP or CISM. This shows your commitment to professional development and staying current in the ever-evolving field of cyber security.
How to prepare for a job interview at dnevo Partners
✨Showcase Your Technical Expertise
Be prepared to discuss your technical skills in cyber incident response and analysis. Highlight specific experiences where you've successfully managed incidents or conducted investigations, as this will demonstrate your capability to handle the responsibilities of the role.
✨Familiarise Yourself with Relevant Tools
Since the role requires proficiency in tools like Microsoft Defender, Sentinel, Excel, Python, and PowerBI, make sure you can speak confidently about your experience with these technologies. Consider preparing examples of how you've used them in past roles to solve security issues.
✨Understand Regulatory Compliance
Research the regulatory frameworks relevant to the commodities sector and be ready to discuss how you have enforced compliance in previous positions. This shows that you understand the importance of regulations in maintaining security standards.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your problem-solving skills in real-world situations. Think through potential security incidents and how you would respond, as well as how you would collaborate with IT, legal, and compliance teams during such events.