Information Security Advisor - Outside Ir35

Birmingham
11 months ago
Applications closed

Related Jobs

View all jobs

Operational Technology Risk Manager

Information Security Technical Assurance Lead

Cyber Advisory - Senior Consultant

Security Manager

Security Consultant – GRC (Governance, Risk, Compliance)

Customer Service Advisor

Information Security Advisor

Rate - £550 (a day)

Duration - 6 Months (Initially)

Location - Birmingham

IR35 - Outside

Job Purpose

The Information Security Advisor plays a key role in protecting the organization's information assets by providing expert advice, implementing security policies, and ensuring compliance with regulatory requirements. They work closely with IT teams, business units, and external partners to strengthen the company's security posture.

Must have experience with ISO27001 Alignment and have experience with Training & Mentoring.

Key Responsibilities

Security Governance & Compliance

Develop, implement, and maintain information security policies, standards, and procedures.
Ensure compliance with relevant security frameworks (e.g., ISO 27001, NIST, CIS, GDPR).
Conduct security risk assessments and audits to identify vulnerabilities.
Provide security guidance for regulatory and legal compliance initiatives.Risk Management & Incident Response

Assess and manage cybersecurity risks across business functions.
Monitor and respond to security incidents, working with IT and external vendors to remediate threats.
Develop and maintain incident response plans and business continuity strategies.
Conduct security investigations and forensic analysis as required.Technical Security Advisory

Advise on secure system architectures, network security, and endpoint protection.
Support security implementation in IT projects, including cloud security and DevSecOps.
Evaluate and recommend security tools such as firewalls, SIEM, IDS/IPS, and endpoint protection.
Conduct penetration testing and vulnerability management assessments.Security Awareness & Training

Deliver security awareness training to employees to promote best practices.
Communicate security threats and mitigation strategies to non-technical stakeholders.
Act as a security advocate, promoting a culture of security within the organization.Third-Party & Vendor Security Management

Assess third-party security risks and ensure suppliers meet security requirements.
Review and negotiate security clauses in contracts with external partners.
Conduct security due diligence on new technology solutions and vendors.Essential Skills & Qualifications

Technical Skills

Strong understanding of cybersecurity principles, frameworks, and best practices.
Experience with security tools such as SIEM, firewalls, IDS/IPS, and endpoint protection.
Knowledge of cloud security (AWS, Azure, GCP) and DevSecOps practices.
Experience with security risk assessments, penetration testing, and vulnerability management.
Understanding of encryption, access control, and identity management solutions.Soft Skills

Excellent problem-solving and analytical skills.
Strong communication and stakeholder management abilities.
Ability to work independently and as part of a team.
Strong attention to detail and ability to manage multiple priorities.Qualifications & Experience

Bachelor's degree in Cybersecurity, Computer Science, or a related field (or equivalent experience).
Certifications such as CISSP, CISM, CISA, CEH, or equivalent are preferred.
Experience in an advisory or security management role within an enterprise environment.
Knowledge of regulatory and compliance requirements (e.g., GDPR, PCI DSS, HIPAA, SOX)

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

SOC Analyst Jobs UK 2026: Salaries, Skills & How to Get Hired

Cyber security is one of the UK's fastest-growing career paths — and SOC analyst is where most people begin. It's in high demand, genuinely accessible, and you don't need a degree or years of experience to get started. But knowing what UK employers actually want in 2026 — what they pay, which certs matter, and how to stand out — is a different matter. This guide covers all of it.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .