Business Information Security Officer

Kimberly-Clark
south east england, flexible, united kingdom
7 months ago
Create job alert

Description

You’re not the person who will settle for just any role. Neither are we. Because we’re out to create Better Care for a Better World, and that takes a certain kind of person and teams who care about making a difference. Here, you’ll bring your professional expertise, talent, and drive to building and managing our portfolio of iconic, ground-breaking brands. In this role, you’ll help us deliver better care for billions of people around the world.

It starts with YOU. 

The Business Information Security Officer (BISO) is the Information Security primary point of contact for the assigned region/business unit and supports the implementation of the cybersecurity program. The BISO is a security leader for their segment.As a trusted advisor, the BISO will collect business requirements, and will provide advice and oversight to ensure that Information Security policy is complied with for processes and systems

Key Responsibilities include:

Act as the primary local security contact / adviser for IT leadership and the IT Business Partners, IT Infrastructure, IT Architecture, HR, Finance, Legal and other local personnel

Partners with local Business, Compliance, Privacy, Legal, IT resources to achieve effective working relationships that can further the effectiveness of the Security program

Implements the Information Security Policies and Standards for assigned segment

Proactively identifies noncompliance and areas of potential improvement, and facilitates development and deployment of standard solutions

Drives risk remediation activities and suggest incremental controls or risk mitigation strategies

Collaborate with the Cyber Defense Operations and Cyber Security Engineering teams to develop segment technical roadmaps

Support internal and external audits

Provide escalation path for security issues, assisting with investigations as needed

About Us

Huggies®. Kleenex®. Cottonelle®. Scott®. Kotex®. Poise®. Depend®. Kimberly-Clark Professional®. You already know our legendary brands—and so does the rest of the world. In fact, millions of people use Kimberly-Clark products every day. We know these amazing Kimberly-Clark products wouldn’t exist without talented professionals, like you.

At Kimberly-Clark, you’ll be part of the best team committed to driving innovation, growth and impact. We’re founded on more than 150 years of market leadership, and we’re always looking for new and better ways to perform – so there’s your open door of opportunity. It’s all here for you at Kimberly-Clark. 

About You

You perform at the highest level possible, and you appreciate a performance culture fuelled by authentic caring. You want to be part of a company actively dedicated to sustainability, inclusion, wellbeing, and career development.
You’re driven to perform at the highest level with a passion for Business Information Security. As a person, you’re a self-driven and highly motivated, creative thinker inspired by doing things differently, someone who is always taking initiative to make things better.

You will also need the following qualifications:

Bachelor's degree required, preferably in computer science or information systems

Proven experience of Information Technology, with a background in Security and Compliance experience

Experience working in Agile or Waterfall methodology and a deep understanding of phased approaches to the Software Development Life Cycle

Ability to deliver influential written and verbal communications clearly and effectively with end users, technology/development and business partners

Strong relationship, team building and facilitation skills

Ability to translate technical/security issues to business

Service Level Management experience

CISSP, CISM or related certification preferred

ITILv3/ITSM certification preferred

Total Benefits

We offer competitive pay and benefits to employees and reward excellence and performance. Our belief in promoting a healthy work-life balance drives us to support our employees’ total well-being, offering comprehensive benefits not limited to gym memberships, private medical insurance, dental cover, employee assistance programme, cycle to work scheme, critical illness cover, travel insurance and a market leading defined contribution pension scheme. 

Certain benefits, such as flexible work schedules and parental leave, can be tailored to meet specific individual needs, giving our employees the flexibility to manage their commitments inside and outside of work. We are proud to be rated as a top 100 workplace for working mothers for two years in a row.

To Be Considered 
Click the Apply button and complete the online application process. A member of our recruiting team will review your application and follow up if you seem like a great fit for this role.

In the meantime, please check out the .

And finally, the fine print…. 

Primary Location

United Kingdom- Flexible Location - South East England

Additional Locations

Worker Type

Employee

Worker Sub-Type

Regular

Time Type

Full time

Related Jobs

View all jobs

Business Information Security Officer, Europe

Regional Chief Information Security Officer (CISO)

Regional Information Security Officer

Regional Information Security Officer

Chief Information Security Officer

Information Security Officer

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.