National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Information Security Analyst

Cloud Decisions
Sheffield
4 weeks ago
Create job alert

InfoSec Assurance Analyst

Upto £57,500 + Enterprise Benefits (Life Ins/Medical/Pension)

Fully Remote (UK only)


***Please Note: NOT A CYBER SEC TECHNICAL ROLE***


Be part of their high growth Information Security plans as they build the team to x4


Cloud Decisions have partnered with one of the UK’s most exciting enterprise technology transformations: a £multi-billion, employee-owned group, one of the top 10 largest employee-owned business in the UK, and one of the largest global players in insurance across (100+ countries).


Following a wave of acquisitions and continued digital modernisation and compliance, they’re hiring an Information Security Assurance Analyst with who understands the Controls & Compliance with security regulations and standards and is able to work join a small, high-trust team and that can work autonomously while they build their InfoSec capability to ensures regulatory compliance, information security maturity, and readiness for the next audit, tender or risk review.


Control/Compliance Assessment Duties:

  • Schedule and Coordinate Assessments: Schedule and coordinate control assessments with control owners, asset custodians, and third parties.
  • Evaluate Controls: Assess the design and effectiveness of technical and non-technical security controls against internal policies, standards, and procedures.
  • Documentation Maintenance: Maintain up-to-date documentation of security control assessments and remediation activities.
  • Organise Control Evidence: Ensure all control evidence is well-organised and accessible.
  • Notify Deviations: Author notifications of business process and procedure deviations to inform the Information Security team and other relevant parties across the organisation.
  • Risk Analysis Reports: Author analysis reports that define the impact of control deficiencies or gaps on identified risks.
  • Communicate Findings: Communicate findings to Security leadership, clearly describing issues identified from analysis.
  • Dashboard and Reporting Input: Provide input to ensure dashboards and reporting databases are up to date with current details.
  • System Security Plans (SSPs):Provide support to data and/or process owners in formally documenting the security requirements for information systems, applications, and services. This includes assisting with the scoping, selection and documentation of appropriate cybersecurity and privacy controls, testing their design and implementation, following a formal authorisation process, and establishing mechanisms for ongoing monitoring and oversight of controls.


Compliance/Control Improvement Duties

  • Update Processes: Initiate and coordinate the process to update identified business process breaks/gaps.
  • Enhance Procedures: Assist in the documentation, design, and enhancement of procedures, and develop operating effectiveness tests with control owners.
  • Propose Enhancements: Propose enhancements to existing controls and procedures through a formal reporting structure.
  • Reporting Support: Assist in monthly and quarterly reporting on the status and outcomes of control assessment activities.


Audit/Assessment Duties:

  • Third-Party Due Diligence: Manage third-party due diligence requests from customers and insurers, ensuring accurate and timely responses. Document and report deficiencies and serve as the primary liaison to resolve actions within agreed timescales.
  • Audit Preparation and Support: Prepare for and assist with internal and external audits by collecting evidence, responding to audit requests, and addressing audit findings.


InfoSec effectiveness - collaboration/continuous improvement:

  • Continuous Improvement:Identify opportunities for process improvements and implement changes to enhance the efficiency and effectiveness of control assessments.
  • Training and Development:Assist in training team members and stakeholders on control assessment methodology and assessment best practices.
  • Vendor Management: Ensure critical vendors have robust BCDR plans and conduct regular assessments. Conduct regular assessments of vendor BCDR capabilities.


Any knowledge of the Information Security impact requirements of DORA, PCDSS, SARBOX are all of great interest but not essential.

Related Jobs

View all jobs

Information Security Analyst

Information Security Analyst

Information Security Analyst

Information Security Analyst

Information Security Analyst

Information Security Analyst

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

The Ultimate Assessment-Centre Survival Guide for Cyber Security Jobs in the UK

Assessment centres for cyber security positions in the UK are designed to mirror real-world threat landscapes and test both your technical acumen and soft skills under pressure. Across multiple stages—psychometric assessments, penetration testing exercises, incident response group tasks, case studies, interviews and even informal networking breaks—employers assess your ability to identify vulnerabilities, collaborate in high-stakes scenarios and communicate effectively. This guide walks you through each component, equipping you to stand out and secure your next role in cyber defence.

Top 10 Mistakes Candidates Make When Applying for Cyber Security Jobs—And How to Avoid Them

Avoid the most common pitfalls when applying for cyber security jobs in the UK. Discover the top 10 mistakes candidates make—plus practical fixes, insider tips and curated resources that will help you secure your next infosec role. Introduction Whether it’s a Security-Operations Centre (SOC) in Canary Wharf or a fast-growing threat-intelligence start-up in Manchester, demand for cyber security talent continues to surge. Yet hiring managers on CyberSecurityJobs.tech still reject the majority of applications long before interview—usually for mistakes that can be fixed in minutes. We analysed recent vacancies, spoke with in-house recruiters and combed through the most-read guides on our site. Below is a definitive list of the ten most expensive mistakes we see, each paired with an actionable tip and a trusted resource for deeper reading. Bookmark this page before you press Apply.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.