Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Information Security Consultant

Job Title: Information Security Consultant
Contract Type: Permanent
Location: City of London, London
Industry:
Salary: £50000 - £60000 per annum + benefits
REF: AG3_1410851453
Contact Name: Ana Gaffney
Contact Email: anag@montash.com
Job Published: about 3 years ago

Job Description

Montash are currently working with a multinational financial services organisation based in London who are looking to bring in an Information Security Consultant to join their growing Information Security team. The organisation are going through a transformation within their security function and are therefore seeking an individual from a GRC/Risk background to assist with their compliance and policy piece.

Responsibilities:

  • Enforce Information Security Controls and work on processes and policy.
  • Coordinate security policies, which will be submitted to the CSO.
  • Support GRC processes and involvement in internal audit.
  • Perform IT Risk and Security Assessments.
  • Identify potential risks and support methods of mitigation.
  • Provide security advice to different units within the organisation.
  • Assist with the process of becoming ISO 27001 certified.

Skills Required:

  • 5+ years within information security and experience in risk.
  • Degree educated in Computer Science or related field.
  • Certifications in CISSP, CISM, CRISC.
  • ISO27001 experience, Lead Auditor would be beneficial.
  • Experience in a consultancy or a large organisation.
  • Fluent English
  • Ability to liaise with different business units of the business in regards to information security and understand their needs.

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...