National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Information Assurance Specialist

Redhill
4 months ago
Applications closed

Related Jobs

View all jobs

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Information Assurance Specialist – Cybersecurity Expertise

Location: Surrey

Hudson Shribman Recruitment is seeking a highly skilled Information Assurance Specialist to lead the design and implementation of secure systems, ensuring the protection of critical data and infrastructure. This role is ideal for professionals experienced in cybersecurity, information assurance, and embedded systems, with a strong focus on FIPS compliance and advanced security measures across hardware and software platforms.

Key Responsibilities

Software Security:

Perform in-depth code reviews to identify and address security vulnerabilities.
Design and implement secure communication protocols for embedded systems.
Ensure encryption, secure boot mechanisms, and other cybersecurity measures are in place.
Monitor software systems for unauthorized access or malicious activity.

Hardware Security:

Embed security features, such as trusted platform modules (TPMs) and hardware encryption.
Test hardware for vulnerabilities, including side-channel attacks and backdoor exploits.
Ensure programmable logic devices are tamper-resistant.

Systems Architecture Security:

Define and document security requirements aligned with FIPS, NIST, and organizational goals.
Conduct risk assessments to mitigate potential threats to system architecture.
Integrate secure practices across software and hardware teams.
Proactively address emerging threats throughout the system lifecycle.

Risk Assessment and Incident Response:

Identify security risks across hardware, software, and systems architecture.
Develop and test incident response plans for breaches or system compromises.

Compliance and Standards:

Ensure compliance with FIPS, ISO 27001, NIST, and other relevant standards.
Maintain up-to-date knowledge of industry regulations across sectors like defense, aerospace, and critical infrastructure.

Security Testing and Validation:

Conduct penetration testing and vulnerability scanning across systems.
Validate security measures, including encryption, access controls, and COMSEC.

Experience & Skills Required

Technical Expertise:

Advanced knowledge of cybersecurity, cryptography, FIPS-140, embedded systems, and device security.
Expertise in tools for vulnerability scanning, penetration testing, and risk assessment.
Familiarity with SIP, AS-SIP, and assured communication services.

Collaboration and Leadership:

Proven ability to collaborate with software engineers, hardware designers, and systems architects.
Strong communication and leadership skills to drive secure design principles.

Qualifications:

Minimum of 5 years’ experience in information assurance, cybersecurity, or related roles.
Relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable
apply to (url removed)

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Find Hidden Cyber Security Jobs in the UK Using Professional Bodies like BCS, CIISec & More

The demand for skilled cyber security professionals in the UK has never been higher. With threats increasing in sophistication and frequency, organisations are urgently hiring ethical hackers, threat analysts, GRC specialists, and security architects. But many of the most valuable roles—particularly in government, defence, and critical infrastructure—are never publicly advertised. Instead, these jobs are shared behind the scenes through trusted networks, private communities, and professional bodies. In this article, we explore how to uncover hidden cyber security jobs in the UK using organisations like the BCS (The Chartered Institute for IT), CIISec (The Chartered Institute of Information Security), ISACA, and ISC² UK Chapter. We’ll show you how to use membership directories, special interest groups, CPD events and informal networks to gain early access to roles most people never see.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.