Chief Information Security Officer, Edinburgh

TN United Kingdom
Edinburgh
1 week ago
Create job alert

Social network you want to login/join with:

Chief Information Security Officer, EdinburghClient:

Motability Operations

Location:

Edinburgh, United Kingdom

Job Category:

Other

EU work permit required:

Yes

Job Reference:

5615cf41bd25

Job Views:

7

Posted:

03.03.2025

Expiry Date:

17.04.2025

Job Description:

About The Role
The Chief Information Security Officer (CISO) is a senior leader responsible for establishing and maintaining the organisation's vision, strategy, and programs related to information security. The CISO plays a crucial role in safeguarding the organisation's sensitive data, intellectual property, and information systems from potential threats and cyberattacks.

The CISO collaborates with various departments, including IT, legal, business risk, and business units, to ensure the implementation of effective security measures and adherence to industry best practices and regulatory requirements. As CISO, you will be responsible for:

Information Security Strategy:

  1. Develop and communicate a comprehensive information security strategy that aligns with the overall business goals and objectives.
  2. Ensure adherence to this strategy across the entire technology estate.

Risk Management:

  1. Identify, assess, and prioritise security risks, considering potential impact on the organisation's operations, reputation, and finances.
  2. Implement security risk mitigation measures and ensure the development of an information security risk-aware organisational culture.

Security Governance:

  1. Work with the Data Protection team to establish and maintain the organisation's information security governance framework and ensure appropriate technical guardrails are in place, including policies, standards, and procedures.
  2. Ensure compliance with applicable laws, regulations, and industry standards (e.g., GDPR, ISO 27001, NIST Cybersecurity Framework).

Incident Response:

  1. Oversee the development and testing of technology incident response plans.
  2. Coordinate with relevant stakeholders to promptly respond to and resolve cybersecurity incidents, minimising damage and potential downtime.

IT Continuity:

  1. Ensure DR testing takes place and provide support to the Business Risk division to manage IT continuity risks.
  2. Represent IT continuity in the Business Risk and DR committee.

Security Architecture:

  1. Collaborate with IT teams to design, implement, and maintain secure IT infrastructure, applications, and networks.
  2. Working with the IT Architecture team, ensure that security controls are built into technology solutions from the outset.

Vendor and Third-Party Risk Management:

  1. Implement a robust process to assess and monitor the security posture of third-party vendors and service providers with access to the organisation's systems or data.

Security Compliance and Auditing:

  1. Regularly review security measures and support internal audits to assess the effectiveness of security controls. Address any findings and ensure timely remediation.

Security Incident Reporting:

  1. Report to leadership on the organisation's security posture, potential risks, and ongoing security initiatives.
  2. Communicate effectively to raise awareness and support for information security initiatives.
  3. Chair and/or act as an active member of Security Governance forums, including the Risk Management Committee.

Industry Knowledge and Innovation:

  1. Stay abreast of the latest cybersecurity threats, trends, and technologies.
  2. Evaluate and introduce innovative security solutions to enhance the organisation's overall security posture.

Budgeting, Supplier and Cost Control:

  1. Prepare and manage the Information Security department budget, controlling expenses, and optimising spending while maintaining high standards of service delivery.
  2. Manage department suppliers appropriately ensuring value for money, and the timely delivery of services, aligning to the technology and company procurement and supplier strategy requirements.

Team Leadership:

  1. Lead, mentor, and inspire the Information Security team, ensuring team members have the necessary resources and support to excel in their roles.
  2. Foster a culture of innovation, accountability and collaboration within the Information Security team and across departments.
  3. Define ways of working and standards for Information Security in MO technology.
  4. Work with key partners in the business to define ways of working and build up a consistent approach to Information Security.
  5. Build new capabilities where there are gaps in the existing organisation.

About You
Minimum Criteria

  1. Proven significant experience in information security, and in a leadership role.
  2. Strong knowledge of cybersecurity principles, best practices, and industry standards.
  3. In-depth understanding of regulatory requirements related to data protection and privacy.
  4. Strong leadership skills with the ability to motivate and inspire a diverse team.
  5. Excellent communication and interpersonal skills, with the ability to communicate complex technical concepts to non-technical stakeholders.
  6. Strategic thinker with the ability to align security initiatives with business goals.
  7. Analytical and problem-solving skills to assess risks and devise effective solutions.
  8. Experience in budgeting and resource management for security initiatives.
  9. Leadership qualities, including strategic thinking, influencing, decision-making, and problem-solving abilities.
  10. Relevant certifications such as CISSP, CISM, or CISA.

About The Company
Motability Operations is a unique organisation, virtually one of a kind. We combine a strong sense of purpose with a real commercial edge to ensure we provide the best possible worry-free mobility solutions to over 630,000 customers and their families across the UK. Customers exchange their higher rate mobility allowance to lease a range of affordable vehicles (cars, wheelchair accessible vehicles, scooters, and powered wheelchairs) with insurance, maintenance and breakdown assistance included. We are the largest car fleet operator in the UK (purchasing around 10% of all the new cars sold in the UK) and work with a network of around 5,000 car dealers and all the major manufacturers. We pride ourselves on delivering outstanding customer service, achieving an independently verified customer satisfaction rating of 9.8 out of 10.

Our values are at the heart of everything we do. They represent ambition, and we look for our people to live and breathe them every day:

  1. We find solutions
  2. We drive change
  3. We care

As a Motability Operations team member, the benefits you can expect are:

  1. Competitive reward package including an annual discretionary bonus
  2. 15% non-contributory pension (9% non-contributory pension during probation period)
  3. 28 days annual leave with option to purchase and sell days
  4. 1 day for volunteering
  5. Funded Private Medical Insurance cover
  6. Electric/Hybrid Car Salary Sacrifice Scheme and Cycle to Work Scheme
  7. Life assurance at 4 times your basic salary to give you peace of mind that your loved ones will receive some financial help
  8. Funded health screening for over 50s
  9. Voluntary benefits: charitable giving, critical illness insurance, dental insurance, health and cancer screenings for you and your partner, discounted gym memberships and season ticket loans
  10. Employee Discount Scheme with an app to save on the go
  11. Free access to healthcare apps such as Peppy, Unmind, Aviva Digital GP and volunteering app on Hand for all employees
  12. Generous family leave policies

At Motability Operations, we believe in building a diverse workforce, where our people are empowered to attend work as their true selves, and we encourage people from all backgrounds to apply. We want to sustain a culture that nurtures, where employees are free to flourish and where they’re rewarded equally, regardless of race, nationality or ethnic origin, sexual orientation, age, disability, or gender.

We pride ourselves on being an inclusive employer and as such, all our offices provide first rate disability access. With our hybrid working environment, we do our best to accommodate part-time and flexible working requests where possible, building on our culture of trust, empowerment, and flexibility.

#J-18808-Ljbffr

Related Jobs

View all jobs

Cloud Security Engineer (VM Compliance)

Chief Information Security Officer

Chief Information Security Officer

Virtual Chief Information Security Officer (vCISO)

Regional Information Security Officer

Regional Information Security Officer

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

10 Must-Read Cyber Security Books for UK Professionals: Boost Your Career and Stay Ahead of Threats

With rapid advancements in digital infrastructure, cloud computing, and the Internet of Things (IoT), cyber threats continue to evolve at lightning speed. For organisations across the UK—and globally—robust cyber security is no longer optional: It’s a strategic imperative. From healthcare and finance to government agencies and tech start-ups, every sector needs skilled professionals to safeguard critical data and protect users. If you’re looking to break into or advance within the cyber security industry, staying updated on the latest techniques, threat landscapes, and defence strategies is paramount. One of the best ways to build and sharpen your expertise is by reading authoritative, high-quality books that combine foundational knowledge with cutting-edge insights. In this guide, we’ve compiled a list of ten books that cater to various skill levels, spanning ethical hacking and threat intelligence to secure software development and cryptography. By diving into these resources, you’ll fortify your understanding of cyber security fundamentals, explore hands-on techniques for defending systems, and gain the strategic perspective needed to excel in roles throughout the UK’s thriving cyber security landscape.

Navigating Cybersecurity Career Fairs Like a Pro: Preparing Your Pitch, Questions to Ask, and Follow-Up Strategies to Stand Out

In a world where digital threats are escalating and online infrastructure underpins nearly every aspect of our personal and professional lives, cybersecurity has swiftly become one of the most sought-after career fields. Demand for skilled cybersecurity professionals outstrips supply, both in the UK and globally. From ethical hackers and penetration testers to governance, risk, and compliance (GRC) specialists, the opportunities are extensive—and lucrative. Amidst this surge in demand, cybersecurity career fairs provide an invaluable chance to meet potential employers face-to-face, gain industry insights, and make connections that can accelerate your career trajectory. Unlike applying to countless jobs online, these events bring companies, security leaders, and aspiring candidates together under one roof. When approached with the right strategy, a single conversation at a cybersecurity fair can open the door to your dream job. In this comprehensive guide, we’ll explore how to prepare thoroughly, engage confidently, and follow up effectively after a cybersecurity career fair. By incorporating these insights into your approach, you’ll stand out from the crowd and maximise your chances of securing the perfect role in this fast-growing field.

Common Pitfalls Cyber Security Job Seekers Face and How to Avoid Them

The cyber security industry in the UK and worldwide is experiencing rapid growth. With cyber attacks growing in sophistication and frequency, organisations are investing more resources than ever into defending their digital assets. From penetration testers and threat analysts to security architects and compliance officers, cyber security professionals are in high demand across a variety of sectors—including finance, healthcare, government, and retail. Yet, in spite of this high demand, the process of landing a cyber security role can be more challenging than many candidates anticipate. The stakes are high: prospective employers entrust cyber professionals with their most sensitive data, their compliance posture, and often their core business operations. Therefore, they’re looking for candidates who can demonstrate not just technical know-how, but also excellent communication, adaptability, and an awareness of the broader business context. In this article, we’ll explore the most common pitfalls that cyber security job seekers face, especially in the UK market, and how to avoid them. Whether you’re a recent graduate, a professional transitioning from a different field, or an experienced practitioner aiming for a senior role, these insights will help you stand out and secure the opportunities that fit your skill set and career goals.