National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Information Security Analyst

JCB
Staffordshire
4 months ago
Create job alert

for our Careers & Life at JCB pages

About the role:


The Information Security team is responsible for ensuring that JCB has the correct level of security integrity to protect our systems, information, personal data and people from cyber-attacks and unauthorised access.


You will work with the Information Security Team, IT colleagues, internal stakeholders and third parties to ensure that all JCB information and systems are secure, fit for purpose and protected to an optimal level.


You will play a crucial role as a security lead. You will be the sign-off for security assessments and new projects as well as business as usual in this varied role. This role gives the opportunity for exposure on a global scale.


 You will be responsible for driving the security scrutiny, culture, awareness and adoption across the JCB organisation.

What does this role involve day to day?


· Day-to-day running and monitoring of Information Security systems - analyse and interpret outputs to identify security weaknesses and recommend continuous improvements.


· Be a key participant in or leader of large IT and business projects.


· Respond to Security Incidents, reports and alerts ensuring prompt containment and recovery.


· Plan and oversee regular security penetration testing against new and existing services to identify weaknesses and formulate plans and processes to minimise current and future risk.


· Conduct regular security risk reviews and manage security remediation activity, internally on new IT/Business projects and with third parties.


· Be the technical sign-off for all BAU Change Requests.


· Promote culture of ‘secure by design’ and facilitate appropriate activities to support and improve Information Security Awareness.


· Articulate risk in technical and non-technical terminology so that it can be interpreted by Group IT and business stakeholders.


· Seek out and exploit opportunities for improvement to the group’s overall security posture.


· Passionate about cyber security and keeping up with the latest trends, threats and mitigations.

This will be suited to you if


· You are adaptable – whilst this role requires some use of Security Toolsets and a Technical Mindset, you’re not expected or required to be an expert in all areas but expected to have a solid understanding and grounding in security principals to adapt to the varied requirements.


· You have the ability to manage and use a wide variety of security software, systems, services and toolsets such as E-mail Security, EDR, NAC, IT/OT Segmentation, 365 etc along with an understanding of malware prevention, emerging threats, attacks and vulnerability management.


· Understanding of Information Security best practice for elements including workstations, servers, cloud, networking, architecture, common protocols and application security.


· You have the ability to confidently perform security audits, both internal and external (e.g., third party and supplier assurance) and ensure recommendations are followed for continuous improvement.


· You have strong Project Management skills - able to independently manage multiple projects, manage own workload, prioritise and meet tight deadlines.


· Strong Incident Response Management skills including threat and vulnerability analysis.


· The ability to communicate business and technical risk to all levels of audience.


· Understanding of IT Service Management principles ideally ITIL.

What happens next?


Ordinarily, our Resourcing Team reviews and shortlists CVs. If shortlisted, you’ll speak to one of our Recruiters to discuss the role further. Our interview process usually consists of an initial teams interview followed by an in-person interview. We’ll keep in touch throughout the process but if you have any questions, please get in touch at

What’s in it for you?


This is your chance to join a company that values expertise not only in rewards but also in real employee care. At JCB you don’t just get a competitive salary, 33 days’ holiday and access to our company pension—you can also use our onsite gym, in-house doctor, dentist and visiting optician. We have an ULEV car scheme available for our employees too. Then there’s the JCB Rewards Hub, which gives you discounts with high street retailers. Feel like biking to work? There’s our Cycle to Work Scheme.


We value diversity and welcome applications from candidates from all backgrounds.


We’re committed to ensuring our recruitment process is fair and inclusive. If you face any accessibility challenges with your online application and require additional support, you have the option of speaking to a member of our Recruitment Team who can support you to complete an application in an alternative format. If you would benefit from this support, please email recruitment@, and a member of the team will be in touch.

Recruitment Agencies: JCB does not accept any speculative approaches to present candidates for advertised vacancies. 

Related Jobs

View all jobs

Information Security Analyst

Information Security Analyst

Information Security Analyst

Information Security Analyst

Information Security Analyst

Information Security Analyst

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.