At a Glance
- Tasks: Lead and manage key security programmes, focusing on risk management and data protection.
- Company: Join a dynamic insurance company that values passion, innovation, and teamwork.
- Benefits: Enjoy a permanent full-time role with opportunities for growth and development.
- Why this job: Be part of a leadership team shaping security strategy in a fun and collaborative environment.
- Qualifications: Proven leadership in information security with knowledge of regulatory frameworks is essential.
- Other info: Work closely with the CISO and contribute to a high-performing security team.
The predicted salary is between 72000 - 100000 £ per year.
As Head of Information Security, you will report directly into the Group CISO, and be responsible for leading and managing key pillars of our security programme, with a primary focus on Third-Party Security Risk Management, Data Loss Prevention (DLP), Policy Governance, Security Training & Awareness, and Identity & Access Management (IAM). You will work closely with the Group CISO to ensure consistent high standards in your areas of responsibility and ensure global adherence to security practices. The ideal candidate will have deep knowledge of regulatory frameworks such as NYDFS Cybersecurity Regulation, GDPR, and other European and Australian data protection laws, and will bring a proactive, risk-based approach to the governance and operationalisation of security controls.
Within this role, you will act as a member of the CISO's leadership team, contributing to security strategy, budgeting, and cross-functional planning. This involves supporting the CISO to build and manage a high-performing team aligned with the security program's objectives. Other key responsibilities include:
- Management of Cyber Incidents supporting the CISO and CISO team in the co-ordination of managing these events globally.
- Manage vendor relationships within your areas of responsibility, including responsibilities around renewals, negotiations, contract updates and regular touch points with the vendors.
- Working collaboratively with legal, procurement, and operational resilience teams to ensure Third Party Risk Management is being supported end-to-end and the correct due diligence is in place to monitor our supply chain, along with SLAs.
- Leading the assessment, onboarding, and continuous monitoring of third-party vendors.
- Implementing and refining risk-based frameworks and tools for evaluating vendor security posture with an aim of continuously monitoring and evaluating the CFC supply chain.
- Maintaining, updating, and socialising security policies, standards, and procedures to reflect evolving threats, technologies, and regulations.
- Overseeing DLP strategy to prevent unauthorised data access, use, or transfer involving continuously tuning DLP tooling, policies and rules to align with emerging threats and business needs and coordinating incident response activities related to DLP alerts.
- Develop a company-wide security awareness and training program including tailoring training to address emerging risks, regulatory obligations, and role-specific responsibilities and measuring/reporting on the effectiveness of this training.
- Directing the strategy and operations for IAM, including provisioning, access reviews, and privileged access management.
- Partnering with IT to integrate IAM best practices into enterprise systems and workflows.
- Working closely with the CISO to ensure security controls meet compliance obligations under NYDFS, GDPR, and relevant global financial regulations.
The ideal candidate for this role will come with proven leadership in information security governance within a regulated environment. We will also be looking for someone with a strong familiarity with UK and international regulatory frameworks in the US, Europe and Australia. Also, you will be:
- Adept at translating complex regulatory or technical requirements into practical business-aligned controls, policies and processes.
- Comfortable working with audit and compliance stakeholders during assessments, certifications, or investigations.
- From a strong background in information security frameworks, standards, and regulatory requirements including a strong understanding of enterprise IT and security architecture, cloud security, data protection, threat management, and incident response.
- Proficient in developing programme and project management reporting and documentation.
- Able to manage third-party vendors, MSSPs, and contract negotiations.
Core Values
- Love what you do: We show up each day ready to take on the world. Our passion and intensity set us apart and makes the difference to our colleagues, customers, brokers and carriers.
- Challenge everything: We're never afraid to question the way that things are done and we constantly challenge ourselves and others to make things better.
- Have fun, be good: Insurance is a serious business, but we don't take ourselves too seriously. We make it fun to work at CFC, we welcome all viewpoints, and we treat everyone how we would expect to be treated.
Contact Detail:
Job Traffic Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Head of Information Security | London, UK
✨Tip Number 1
Familiarise yourself with the specific regulatory frameworks mentioned in the job description, such as NYDFS and GDPR. Being able to discuss these regulations confidently during your interview will demonstrate your expertise and alignment with the role.
✨Tip Number 2
Network with professionals in the information security field, especially those who have experience in third-party risk management and data loss prevention. Engaging in conversations with industry peers can provide valuable insights and may even lead to referrals.
✨Tip Number 3
Prepare to showcase your leadership skills by gathering examples of how you've successfully managed teams or projects in the past. Highlighting your ability to lead a high-performing team will resonate well with the expectations of this role.
✨Tip Number 4
Stay updated on the latest trends and threats in information security. Being knowledgeable about emerging risks and technologies will not only help you in interviews but also show your commitment to continuous learning in this ever-evolving field.
We think you need these skills to ace Head of Information Security | London, UK
Some tips for your application 🫡
Understand the Role: Before applying, make sure you fully understand the responsibilities and requirements of the Head of Information Security position. Familiarise yourself with key areas such as Third-Party Security Risk Management, Data Loss Prevention, and regulatory frameworks like GDPR.
Tailor Your CV: Customise your CV to highlight relevant experience in information security governance, particularly within regulated environments. Emphasise your familiarity with UK and international regulatory frameworks and any leadership roles you've held.
Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for information security and your alignment with the company's core values. Mention specific examples of how you've challenged the status quo in previous roles and contributed to security strategies.
Highlight Relevant Skills: In your application, be sure to highlight skills that are crucial for this role, such as risk management, vendor relationship management, and incident response. Use concrete examples to demonstrate your proficiency in these areas.
How to prepare for a job interview at Job Traffic
✨Understand Regulatory Frameworks
Make sure you have a solid grasp of key regulatory frameworks like GDPR and NYDFS Cybersecurity Regulation. Be prepared to discuss how these regulations impact security practices and how you would ensure compliance within the organisation.
✨Showcase Leadership Experience
As a Head of Information Security, your leadership skills are crucial. Prepare examples of how you've successfully led teams in the past, particularly in high-pressure situations or during cyber incidents, to demonstrate your capability to manage and inspire a team.
✨Discuss Risk Management Strategies
Be ready to talk about your approach to risk management, especially regarding Third-Party Security Risk Management. Highlight any frameworks or tools you've implemented to assess and monitor vendor security posture effectively.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that test your problem-solving skills in real-world situations. Think about past experiences where you had to handle data loss prevention or incident response, and be ready to explain your thought process and actions taken.