Bid Administrator

Rodley
1 week ago
Create job alert

Role: Bid Administrator (Information Technology)
Location: Leeds, West Yorkshire
Salary: £30,000 - £35,000 Plus 25 Days Holiday, Private Pension, Vendor Certifications and more!
About the Company:
Our client, a global leader in Sustainability Consulting, is seeking an IT Bid Administrator to join their dynamic team. This role will involve providing crucial IT and information security support for client requests for information, ensuring all responses are accurate, comprehensive, and aligned with client requirements. The successful candidate will work in a fast-paced environment, assisting in the preparation of bid documents and responding to security and IT-related questionnaires.
Position Overview:
The IT Bid Administrator will work closely with the Information Security and IT teams to provide comprehensive support for client bids. You will ensure that all client requirements regarding IT and information security are met by reviewing and responding to client documentation, identifying potential risks, and highlighting exceptions. The ideal candidate will be detail-oriented, possess strong analytical skills, and have the ability to thrive in a fast-moving environment.
Key Responsibilities:

  • Review client requirements and ensure that Information Security and IT requirements are accurately addressed in bid documents, including questionnaires, RFIs, and contracts.
  • Highlight potential risks and exceptions in bid documents using standard responses and established processes.
  • Manage and maintain the Information Security & IT responses template to ensure consistency and accuracy across submissions.
  • Assist in supporting the IT and Information Security teams with any additional tasks or queries related to client requests or documents.
  • Where applicable, adhere to SOX control responsibilities as part of the bid process.
  • Support the overall bid process by reviewing and providing input into contracts, policies, handbooks, and other related documents.
    Essential Skills & Experience:
  • Strong background in legal, document review, or computer science, ideally with experience in reviewing IT-related documents.
  • Ability to interpret and respond to client RFIs, questionnaires, and other bid documents, ensuring technical requirements are met.
  • Solid understanding of information security principles and IT technical requirements.
  • Previous experience working with SOX control responsibilities is beneficial.
  • Strong analytical and problem-solving skills with an attention to detail
    How to Apply:
    If you're a Bid Administrator looking for a role that combines IT, information security, and document review, apply now.
    Keywords: IT Bid Administrator, Bid Administrator, IT Bid Support, Information Security Consultant, RFI Response, IT Questionnaire, SOX Compliance, Document Review Jobs, IT and Security Bids, Legal and IT Background, Sustainability Consulting Careers, Bid Management Jobs, IT Proposal Support

Related Jobs

View all jobs

Chief Technology Officer (CTO)

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.

Which Cyber Security Career Path Suits You Best?

Discover Your Ideal Role in the World of Digital Defence Cyber threats grow more complex by the day—ranging from sophisticated nation-state attacks to persistent phishing scams. In response, cybersecurity has become one of the fastest-expanding and most in-demand fields. If you’re exploring a career in cybersecurity, you might wonder which specialised role aligns best with your skills and aspirations. This quiz will help you identify your ideal cybersecurity path, from penetration testing to threat intelligence and beyond.

The Ultimate Glossary of Cyber Security Terms: Your Comprehensive Guide to Protecting the Digital World

As our daily lives become increasingly entwined with digital technologies, cybersecurity has emerged as one of the most critical and rapidly evolving fields. From safeguarding personal data on social media to protecting vital infrastructure and corporate networks, cyber threats loom in every corner of our connected world. Whether you’re just entering the workforce, looking to pivot your career, or a seasoned professional sharpening your skill set, understanding core terminology is essential to thrive in this domain. That’s why we’ve prepared this comprehensive glossary of cybersecurity terms and optimised for your career development. We’ll walk through the building blocks of cybersecurity—covering fundamental concepts, advanced techniques, and the latest trends—so you can confidently navigate this complex landscape. If you’re keen to explore or advance your career, be sure to check www.cybersecurityjobs.tech for roles spanning penetration testing, incident response, threat intelligence, and more.