Information Security Manager

Information Security Manager

Full-Time 72000 - 84000 £ / year (est.) No home office possible
J

At a Glance

  • Tasks: Lead the Security Operations Centre and protect customer data with cutting-edge security strategies.
  • Company: Join a forward-thinking company focused on cloud and IT security solutions.
  • Benefits: Enjoy competitive salary, professional development opportunities, and a dynamic work environment.
  • Why this job: Be at the forefront of cybersecurity, making a real impact in protecting vital information.
  • Qualifications: Degree educated with industry certifications; experience in IT security is essential.
  • Other info: Work closely with top executives and external agencies to enhance security measures.

The predicted salary is between 72000 - 84000 £ per year.

Information Security Manager (SOC Manager), Berkshire, Information Security, CCIE, Degree Educated. £90-100k, Berkshire, Cloud, SaaS, UcaaS, Contact Center. Degree and Professional Qualifications.

Overview: The Information Security Manager leads the Security Operations Centre (SOC) function and provides support to the CISO on technical security. Proposes and advocates on technical security strategies and implements policies and processes in support of internal IT systems, private cloud, and public cloud usage. Drives the technical functions within the business to protect customer and business data/systems at all times. This is a highly technical role working within the CISO function which manages information security, certifications, compliance, and quality. Degree qualified, and with Industry Certifications.

Key Responsibilities

Build, Develop & Maintain SOC function

  • Build a team, policies, technologies, and processes to develop a world-class security function.
  • Lead on all technical aspects of IT security for the commercial operations and internal systems.
  • Select, implement, maintain, and use security tools to provide relevant management information and protection. Responsible for the security incident response process ensuring that this process is annually tested and iteratively improved.

Technical Delivery

  • Provide high-quality IT Security guidance documentation and training in conjunction with the CISO to the internal technology teams (Internal IT, Operations, Application Development).
  • Carry out technical vulnerability assessments of IT systems and processes, identifying potential vulnerabilities to Platform(s) and Corporate systems and processes, making recommendations to the technology management and the CISO to minimize risks identified.
  • Liaise with external security agencies where required and ensure that any information requested is provided on a timely and secure basis.
  • Contribute to the architectural functions in each team to ensure that privacy and security by design are created with final compliance as a goal.
  • Responsible for ensuring any new vulnerabilities are resolved/mitigated in line with risk-based prioritization (business and technical).
  • Lead and act as a strategic and tactical partner in the operational and technical development of the SOC.
  • Liaise with other key functions within the business as required (CTO, CIO, CISO, Operations, Infrastructure Services, Support, Sales & Procurement).
  • Establish and maintain excellent relationships with all other technology groups.
  • Initiate review and suggest improvements to the products (through Product Management) and services provided.
  • Respond rapidly and effectively to IT security incidents, managing them in a professional manner, reporting to the CISO.
  • Assist in performing computer forensics for evidence gathering and preservation.
  • Contribute to the IT risk register and carry out assigned actions to mitigate risks identified.
  • Keep up to date with security trends, threats, and control measures.

#J-18808-Ljbffr

Information Security Manager employer: JAM IT Consultancy Ltd

As an Information Security Manager at our Berkshire location, you will be part of a dynamic and innovative team dedicated to safeguarding our customers' data and systems. We pride ourselves on fostering a collaborative work culture that encourages professional growth through continuous learning and development opportunities, alongside competitive remuneration and benefits. Join us to make a meaningful impact in the field of information security while enjoying the unique advantages of working in a vibrant area known for its technological advancements.
J

Contact Detail:

JAM IT Consultancy Ltd Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Information Security Manager

✨Tip Number 1

Network with professionals in the information security field, especially those who have experience in SOC management. Attend industry conferences or local meetups to connect with potential colleagues and learn about the latest trends and technologies.

✨Tip Number 2

Stay updated on the latest security threats and compliance regulations relevant to cloud and SaaS environments. This knowledge will not only help you in interviews but also demonstrate your commitment to the role and the industry.

✨Tip Number 3

Consider obtaining additional certifications that are highly regarded in the industry, such as CISSP or CISM. These qualifications can enhance your credibility and show your dedication to advancing your expertise in information security.

✨Tip Number 4

Prepare for technical interviews by practising common security scenarios and incident response strategies. Being able to articulate your thought process and solutions during these discussions can set you apart from other candidates.

We think you need these skills to ace Information Security Manager

Information Security Management
Security Operations Centre (SOC) Leadership
Technical Security Strategy Development
Cloud Security (Private and Public)
SaaS and UcaaS Security
Incident Response Management
Vulnerability Assessment
Risk Management
Compliance and Certification Knowledge
Technical Documentation and Training
Stakeholder Engagement
Computer Forensics
Relationship Management
Security Tools Implementation
Knowledge of Security Trends and Threats

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights relevant experience in information security, particularly in leading SOC functions. Include specific examples of your technical skills, certifications like CCIE, and any experience with cloud technologies.

Craft a Compelling Cover Letter: In your cover letter, express your passion for information security and detail how your background aligns with the responsibilities of the role. Mention your experience in building security teams and implementing security policies.

Highlight Technical Expertise: Clearly outline your technical skills related to IT security, such as vulnerability assessments, incident response, and familiarity with security tools. Use industry-specific terminology to demonstrate your knowledge.

Showcase Leadership Experience: Since this role involves leading a team, emphasise any previous leadership roles you've held. Discuss how you have successfully managed teams, developed policies, and improved security processes in past positions.

How to prepare for a job interview at JAM IT Consultancy Ltd

✨Showcase Your Technical Expertise

As an Information Security Manager, it's crucial to demonstrate your deep understanding of security protocols and technologies. Be prepared to discuss specific tools and methodologies you've used in previous roles, especially those related to SOC functions and incident response.

✨Highlight Leadership Experience

This role involves building and leading a team, so share examples of your leadership experience. Discuss how you've developed teams, implemented policies, and driven technical functions in past positions to protect data and systems.

✨Prepare for Scenario-Based Questions

Expect scenario-based questions that assess your problem-solving skills in real-world situations. Think about past incidents you've managed, the steps you took, and the outcomes. This will showcase your ability to respond effectively to security threats.

✨Stay Updated on Industry Trends

Being knowledgeable about the latest security trends and threats is essential. Research current issues in information security and be ready to discuss how they might impact the company. This shows your commitment to staying informed and proactive in your approach.

J
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>