Cyber Security Consultant - GRC

Sword Group
scotland, united kingdom
9 months ago
Applications closed

Related Jobs

View all jobs

Cyber Security Consultant - Pre-Sales

Information Security Consultant

Cyber Security Consultant / SME

Cloud Security Pre-Sales Consultant - AWS, Azure

Recruitment Consultant - Cyber Security | Cheltenham | Contract

Senior Red Team Security Consultant - CBEST, CCSAS

Sword is a leading provider of business technology solutions within the Energy, Public and Finance Sectors, driving transformational change within our clients. We use proven technology, specialist teams and domain expertise to build solid technical foundations across platforms, data, and business applications. We have a passion for using technology to solve business problems, working in partnership with our clients to help in achieving their goals.

About the role:

  • Risk Assessment:Assist in identifying, assessing, and prioritising risks across the organisation. Conduct risk assessments to evaluate the likelihood and potential impact of risks on business operations and objectives.
  • Compliance Monitoring:Monitor regulatory developments and changes in laws, regulations, and industry standards. Assess the organisation's compliance with applicable regulations, standards, and internal policies.
  • Resilience Planning:Support the Senior Resilience BCP/DR Advisor in the development and maintenance of IT resilience and business continuity plans to ensure the organisation's ability to respond to and recover from IT disruptions.
  • Incident Response and Management:Provide support in DR related incident response activities, including investigating IT security incidents, breaches, and disruptions.
  • Issue Identification:Identify and document control deficiencies, compliance gaps, and areas for improvement. Collaborate with stakeholders to develop actionable recommendations and corrective action plans to address identified issues.
  • Documentation and Reporting:Maintain accurate documentation of risk assessments, compliance reviews, control testing activities, and remediation efforts. Prepare regular reports for management and stakeholders on the status of risk, compliance, and control activities.
  • Policy and Procedure Development:Assist in the development and maintenance of risk management, compliance, and control-related policies, procedures, and guidelines. Ensure alignment with regulatory requirements and industry best practices in alignment with the Global IS Governance Lead.
  • Vendor Risk Management Support:Assist in assessing and managing risks associated with third-party vendors and service providers. Evaluate vendor controls and adherence to contractual obligations.
  • Continuous Improvement:Identify opportunities for enhancing risk management, compliance, and control processes. Recommend and implement improvements to strengthen the organisation's risk and control environment.
  • Project Work:Contribute to project activities as required to ensure GRC requirements are understood and addressed. Roles and Responsibilities: Areas of Accountability, Responsibility and Competence Level:
  • Works with the Global Risk & Compliance Senior Manager to support IS in the delivery of governance, compliance, and risk activities, whilst supporting the Integration project.
  • Supports the execution of the security, audit, and compliance activities.
  • Supports the Global Risk & Compliance Senior Manager by ensuring the successful delivery of initiatives and projects within the Risk and Compliance environment.
  • Supports the Global Risk & Compliance Senior Manager in any required activities which support improvements in assurance, compliance, and audit activities.
  • Addresses findings from identified risks or audits.
  • Ensures the ISMS contains an accurate record of risks, events, and issues.
  • Supports the internal and external audit investigations.
  • Ensures that the audit tests, self-certifications, and audit reviews are relevant, consistent, and conducted in accordance with professionally accepted auditing standards.
  • Works with minimal supervision, using clearly defined processes and procedures.
  • Facilitates the use of performance metrics to improve output.
  • May be required to provide out of hours support via an on-call rota.


Requirements

Here are the key skills and experience relevant to this role:

  • Excellent written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate compliance and risk related concepts to technical and non-technical audiences.
  • Substantial relevant experience in control management for governance, compliance, IT audits, IS assurance and risk management programmes.
  • CISA, CISM or equivalent preferred.
  • BSc or equivalent qualification in IT based degree preferred.
  • Proven ability to communicate with technical teams to elicit information and requirements.
  • Understanding of regulatory requirements, including cross-industry regulations (e.g., GDPR, Data Protection Act) and industry-specific regulations.
  • Skilled in implementing compliance and control frameworks.
  • Proficient in IT governance and quality standards.
  • Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT as well as those from NIST, including 800-53 and Cybersecurity Framework.
  • Excellent stakeholder management skills.
  • High level of personal integrity, as well as the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity.
  • Knowledge of OneTrust risk management toolset or similar preferred.


Benefits

At Sword, our core values and culture are based on caring about our people, investing in training and career development, and building inclusive teams where we are all encouraged to contribute to achieve success.

We offer comprehensive benefits designed to support your professional development and enhance your overall quality of life.

In addition to aCompetitive Salary, here's what you can expect as part of our benefits package:

Personalised Career Development:We create a development plan customised to your goals and aspirations, with a range of learning and development opportunities within a culture that encourages growth.

Flexible working:Flexible work arrangements to support your work-life balance. We can't promise to always be able to meet every request, however, are keen to discuss your individual preferences to make it work where we can.

A Fantastic Benefits Package:This includes generous annual leave allowance, enhanced family friendly benefits, pension scheme, access to private health, well-being, and insurance schemes.

At Sword we are dedicated to fostering a diverse and inclusive workplace and are proud to be an equal opportunities employer, ensuring that all applicants receive fair and equal consideration for employment, regardless of whether they meet every requirement. If you don't tick all the boxes but feel you have some of the relevant skills and experience we're looking for, please do consider applying and highlight your transferable skills and experience. We embrace diversity in all its forms, valuing individuals regardless of age, disability, gender identity or reassignment, marital or civil partner status, pregnancy or maternity status, race, colour, nationality, ethnic or national origin, religion or belief, sex, or sexual orientation. Your perspective and potential are important to us.

If we can do anything to help make the hiring process more accessible, please let our talent acquisition team know when you apply so we can support any adjustments.#J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.