Information & Cybersecurity Advisor - VR/30721

Oil And Gas People
Aberdeen
1 year ago
Applications closed

Related Jobs

View all jobs

Busines Development Exceutive

Cyber Advisory - Manager

Head of Security Architecture

Information Security Officer (Physical Security)

Vulnerability Manager

Cybersecurity manager

An opportunity has arisen for anInformation & Cybersecurity Advisorbased inAberdeen City Centre. This 100%office-basedrole can be undertaken on a permanent or contract basis. The position involves safeguarding information assets, ensuring compliance, and supporting IT security initiatives.

 

Overview

This multi-energy company is committed to a sustainable world with a forward-looking vision based on innovation, efficiency, respect, and value creation to drive progress in society. They are present across the entire value chain: exploration and production, transformation, development, and marketing of energy that is efficient, sustainable, and competitive for millions of people. With over 80 years of experience, they have been present in the entire oil and gas value chain in a sustainable and competitive way.

The Information & Cybersecurity Advisor is responsible for safeguarding information assets and ensures IT initiatives align with business objectives. Acting as a strategic partner, they develop and maintain a robust IT policy framework, manage the IT risk register, and identify emerging compliance requirements. By creating insightful KPIs, they track both IT service value and areas for improvement. The advisor collaborates with internal teams to deliver secure and compliant IT solutions, while also championing continuous improvement through effective communication and process reviews.

 

Duties and Responsibilities

  • Developing and maintaining an integrated and business-aligned IT policy framework, streamlining policy documentation and removing redundancies when necessary.
  • Developing and maintaining the IT risk register, coordinating IT risk assessments and monitoring mitigation progress.
  • Identifying emerging IT regulatory compliance obligations and ensuring visibility and awareness within relevant IT teams.
  • Developing insightful IT KPI criteria to track both service value and areas for further improvement.
  • Leveraging partnerships with the central team to gain expertise and implement in the ways of working for the team.
  • Being a strategic partner for the UK business following the philosophy and new standard of working.
  • Collaborating with the Information & Cybersecurity Lead to ensure IT services are implemented compliantly, mitigating risks and delivering high-quality solutions.
  • Providing expert advice on delivering robust and secure IT services and projects that meet both business needs and internal/regulatory compliance requirements.
  • Identifying, assessing, and advising on security gaps, recommending and planning security improvements.
  • Providing technical expertise on operational security tools (data loss prevention, third party supplier risk assessments, incident response, etc.).
  • Supporting the implementation of improvements for key security tools and processes (SIEM, Endpoint Security, DLP, etc.).
  • Facilitating the identification and assessment of Cybersecurity related risks.
  • Overseeing internal testing processes of IT controls and collaborate with stakeholders to address identified deficiencies.
  • Coordinating the delivery of external legal and security-related information.
  • Participating in periodic reviews of IT projects and initiative delivery lifecycles to ensure process compliance and recommend improvement actions.
  • Firmly understanding the threat of Cyber Attacks in IT and OT environments.

Skills, Qualifications and Experience

  • Extensive, proven experience of IT in offshore oil and gas industry, preferably in a service delivery role.
  • Experience in IT Project Management.
  • Experience of working on a variety of cybersecurity incidents is preferred.
  • Possesses good interpersonal skills and demonstrative customer focused experience.
  • Experience in cybersecurity projects involving risk analysis, vulnerability assessments and network security.
  • Foundation knowledge in Information Technology Infrastructure Library (ITIL) is preferred.
  • Possesses ability to work independently and unsupervised defining appropriate priorities and working to deadline.
  • The role may require travelling offshore for certain business requirements.

Educational Qualification and Certifications

  • Bachelor's or Master's degree in Cybersecurity, Information Technology, Computer Science, or related field.
  • Certified Information System Auditor (CISA) and Global Information Assurance Certification (GIAC) are amongst the preferred certifications.

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.