Information Security Consultant

Information Security Consultant

Full-Time 60000 - 80000 € / year (est.) Home office (partial)
Head Resourcing Ltd

At a Glance

  • Tasks: Advise on security during IT divestments and manage risks in transitional states.
  • Company: Join a leading financial services client in Edinburgh with a focus on security.
  • Benefits: Flexible working, inclusive culture, and opportunities for professional growth.
  • Other info: Work onsite 2 days a week in a dynamic and supportive environment.
  • Why this job: Make a real impact in the financial sector while enhancing your InfoSec skills.
  • Qualifications: Extensive experience in Information Security and IT divestment projects required.

The predicted salary is between 60000 - 80000 € per year.

Information Security Consultant needed for our Financial Services client in Edinburgh. The right candidate must have extensive demonstrable experience as a Senior Information Security Consultant or senior security SME within large enterprise environments along with previous experience supporting IT divestments, separation, carve-out or M&A activities from an Information Security & Risk standpoint. Candidates must engage via an FCSA accredited Umbrella company and will be required onsite approximately 2 days per week in Edinburgh.

In addition to prior InfoSec divestment experience, candidates should have a broad and deep understanding of:

  • Application segregation and separation
  • Identity and access management separation (including Active Directory / Entra ID separation)
  • Data management and information risk (including data classification and handling during migration, data transfer, duplication, decommissioning risks, and data leakage during transition)

The successful candidate will be responsible for:

  • Advising and guiding on a separation & divestment portfolio
  • Assessing & challenging technical designs
  • Translating technical security risk into clear advice for project teams
  • Identifying, detailing and prioritising real security risks in imperfect transitional states rather than aiming for theoretical target-state purity

Key Skills:

  • Proven experience operating as a hands-on Information Security Consultant or Senior Security SME within large enterprise environments
  • Proven experience supporting IT divestment, separation, carve-out or M&A programmes, with direct involvement in technical and architectural security decisions
  • Strong, practical understanding of application segregation and separation, including access control models, authentication and authorisation separation, data boundary definition, and transitional/shared service risks
  • Strong, practical understanding of identity and access management separation, including Active Directory / Entra ID separation, tenant and domain separation, and identity lifecycle and residual access risks
  • Strong understanding of data management and information risk, including data classification and handling during migration, data transfer, duplication, decommissioning risks, and data leakage during transition
  • Ability to assess and challenge technical designs produced by architects and engineers
  • Ability to identify, describe, and prioritise real security risks in imperfect transitional states
  • Ability to translate technical security risk into clear, actionable advice for programme and project teams
  • Strong analytical, communication, and problem-solving skills
  • Hands-on advisory experience across cloud environments, particularly AWS accounts, IAM, network and trust boundary separation, and shared services
  • Experience engaging directly with enterprise applications, including SaaS, on-prem, and hybrid solutions
  • Practical understanding of privileged access management in separation scenarios
  • Experience contributing to or drafting risk assessments, security positions, and exception recommendations
  • Ability to work constructively with delivery teams
  • Practical experience working within UK financial services environments, with awareness of FCA/PRA expectations and regulator-defensible security outcomes

If interested, able to work in Edinburgh 2 days per week and available, please Apply Immediately!

Head Resourcing is committed to being an inclusive business where diversity is valued and celebrated. We welcome enquiries and applications from everyone.

Information Security Consultant employer: Head Resourcing Ltd

Join a forward-thinking financial services firm in Edinburgh that prioritises employee growth and inclusivity. With a strong focus on professional development, our collaborative work culture encourages innovation and values diverse perspectives, making it an ideal environment for Information Security Consultants looking to make a meaningful impact. Enjoy the unique advantage of working in a vibrant city while engaging in critical security projects that shape the future of our industry.

Head Resourcing Ltd

Contact Detail:

Head Resourcing Ltd Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land Information Security Consultant

Tip Number 1

Network like a pro! Reach out to your connections in the financial services sector, especially those who have experience with IT divestments. A friendly chat can lead to insider info about job openings or even referrals.

Tip Number 2

Get ready for interviews by brushing up on your technical knowledge. Make sure you can confidently discuss application segregation, identity management, and data handling risks. We want you to shine when it comes to showcasing your expertise!

Tip Number 3

Don’t just apply anywhere; focus on roles that match your skills. Use our website to find positions that align with your experience in security consulting and M&A activities. Tailor your approach to show how you can add value to their team.

Tip Number 4

Prepare some questions for your potential employer. Show them you’re not just interested in the role but also in how they handle security risks during transitions. This will demonstrate your proactive mindset and genuine interest in their operations.

We think you need these skills to ace Information Security Consultant

Information Security Consulting
IT Divestment Experience
Application Segregation and Separation
Identity and Access Management Separation
Active Directory / Entra ID Separation
Data Management and Information Risk
Data Classification and Handling

Some tips for your application 🫡

Tailor Your CV:Make sure your CV is tailored to highlight your experience as a Senior Information Security Consultant. Focus on your hands-on experience with IT divestments and M&A activities, as this is key for us.

Showcase Your Skills:Don’t just list your skills; demonstrate them! Use specific examples from your past roles that showcase your understanding of application segregation, identity management, and data risk management.

Be Clear and Concise:When writing your cover letter, keep it clear and concise. We want to see how you can translate complex security risks into actionable advice, so make sure your communication shines through.

Apply Through Our Website:We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates during the process!

How to prepare for a job interview at Head Resourcing Ltd

Know Your Stuff

Make sure you brush up on your knowledge of information security, especially around IT divestments and M&A activities. Be ready to discuss your hands-on experience with application segregation, identity management, and data handling during transitions. The more specific examples you can provide, the better!

Speak Their Language

Familiarise yourself with the terminology used in the financial services sector, particularly around FCA/PRA expectations. When discussing technical designs or risks, use clear, concise language that shows you can translate complex security concepts into actionable advice for project teams.

Show Your Problem-Solving Skills

Prepare to demonstrate your analytical and problem-solving abilities. Think of scenarios where you've had to assess and challenge technical designs or prioritise security risks in transitional states. Be ready to share how you approached these challenges and what the outcomes were.

Engage with Confidence

Since this role involves direct engagement with enterprise applications, practice articulating your thoughts clearly and confidently. Whether it's about privileged access management or cloud environments, showing that you can communicate effectively with delivery teams will set you apart from other candidates.