At a Glance
- Tasks: Lead the charge in protecting our digital assets and ensuring compliance with security policies.
- Company: Join Velonetic, a dynamic joint venture at the forefront of digital innovation in insurance.
- Benefits: Enjoy flexible working, competitive pay, and access to exclusive discounts and perks.
- Other info: Be part of a diverse team committed to equality and inclusion.
- Why this job: Make a real impact in cybersecurity while growing your skills in a supportive environment.
- Qualifications: Degree in IT or related field; security certifications are a plus.
The predicted salary is between 50000 - 65000 € per year.
Location: UK
Full-Time - Remote
Velonetic represents the joint ventures between DXC Technology, the International Underwriting Association (IUA), and Lloyd’s of London. We have been operating for over 20 years in the London Market, in both insurance and reinsurance business. Processing over £117 billion worth of premium and claims transactions today, we are building a new digital platform and services that will enable our customers to move transactions and money through the processing lifecycle with greater efficiency and speed.
As the Information Security Officer, you will be the Security point of contact for IT operations, responsible for supporting and communicating the importance of compliance and governance of the security strategy, roadmap and policies that are in alignment with the organization’s overall security objectives.
Responsibilities:
- Identify, assess, and prioritize security vulnerabilities, ensuring effective remediation plans are in place and executed.
- Lead investigations into information security breaches, ensuring proper reporting and communication with senior management during incidents.
- Work with the Security Incident Response Coordination Centre (SIRCC) to address and mitigate security incidents.
- Work closely with the CISO to ensure the security strategy aligns with broader organisational objectives.
- Monitor and review security policies, standards, and procedures focused on protecting information across all environments.
- Own and manage all information security risks, performing risk assessments specific to storage, processing, and transfer.
- Conduct periodic audits of information security controls to ensure compliance with internal policies and external regulations.
- Ensure that information security requirements are incorporated into all phases of technology systems.
- Coordinate with third-party security vendors to conduct vulnerability assessments, penetration tests, and security audits.
- Stay current on emerging information security trends, threats, and technologies.
- Establish and maintain a strong information security posture, continuously monitoring the effectiveness of controls and processes.
- Regularly evaluate the organization’s information security safeguards.
- Monitor software development teams to ensure secure information handling throughout the software development lifecycle (SDLC).
Qualifications & Experience:
- Ideally, a degree in computer science, Information Systems, Engineering, or a related field.
- Holding any of the following qualifications would be an added advantage: CISSP, CCSP, GIAC Cloud security certifications.
- Proven experience in a security management capacity, particularly in information-rich industries.
- Proven track record of securing cloud-based services.
- Expertise in a wide range of security domains.
- Experience in cloud computing architectures, common technologies.
- Good understanding of NIST security controls frameworks.
- Familiarity with service control frameworks such as SOC 1 and 2.
- Knowledge of threat modelling and risk management practices.
- Strong project management skills with experience leading cross-functional teams.
Investment In Training and Development:
We offer a comprehensive range of training and career development opportunities, a structured induction programme, tailored job training as well as mentoring and support for relevant sponsored professional qualifications.
Our Culture:
Here at Velonetic we support with care and compassion. We are constantly evolving our initiatives around equality, diversity, and inclusion.
Our Commitment to You:
DXC Technology is committed to building diverse teams. We actively encourage applications from women, underrepresented groups, and neurodivergent candidates.
Employee Benefits:
As part of our competitive remuneration package, flexible benefits are available.
DXC Recruitment Team will be engaging with all candidate applications on behalf of Velonetic.
At DXC Technology, we believe strong connections and community are key to our success.
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers.
Information Security Officer in England employer: DXC Technology Inc.
At Velonetic, we pride ourselves on being an exceptional employer, offering a supportive and inclusive work culture that prioritises employee growth and development. With flexible working arrangements and a commitment to diversity, we empower our team members to thrive in their careers while contributing to innovative projects in the dynamic London Market. Our comprehensive benefits package, including tailored training opportunities and wellness initiatives, ensures that every employee feels valued and engaged.
StudySmarter Expert Advice🤫
We think this is how you could land Information Security Officer in England
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend virtual meetups, and connect on LinkedIn. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Prepare for interviews by researching the company and its security practices. Show them you’re not just another candidate; demonstrate your passion for information security and how you can contribute to their goals.
✨Tip Number 3
Practice common interview questions related to information security. Think about scenarios where you've handled security breaches or implemented new policies. Being ready with real-life examples will set you apart!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, we love seeing candidates who take that extra step to engage with us directly.
We think you need these skills to ace Information Security Officer in England
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the Information Security Officer role. Highlight relevant experience and skills that match the job description, like your expertise in security management and risk assessment.
Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you're passionate about information security and how your background aligns with Velonetic's mission. Keep it concise but impactful!
Showcase Your Qualifications:If you have any certifications like CISSP or CCSP, make them stand out in your application. These qualifications can give you an edge, so don’t be shy about flaunting them!
Apply Through Our Website:We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it’s super easy!
How to prepare for a job interview at DXC Technology Inc.
✨Know Your Stuff
Make sure you brush up on the latest trends in information security, especially those relevant to cloud services and compliance regulations like GDPR. Being able to discuss recent breaches or advancements in security technology will show that you're not just knowledgeable but also passionate about the field.
✨Showcase Your Experience
Prepare specific examples from your past roles where you've successfully managed security incidents or implemented security measures. Use the STAR method (Situation, Task, Action, Result) to structure your answers, making it easy for the interviewer to see your impact.
✨Understand the Company’s Needs
Research Velonetic and its operations within the London Market. Understand their security challenges and be ready to discuss how your skills can help them achieve their security objectives. Tailoring your responses to align with their goals will demonstrate your genuine interest in the role.
✨Ask Smart Questions
Prepare thoughtful questions that reflect your understanding of the role and the company. Inquire about their current security strategies, how they handle incident response, or what tools they use for vulnerability assessments. This shows that you're engaged and thinking critically about how you can contribute.