Engineer the Quantum RevolutionYour expertise can help us shape the future of quantum computing at Oxford Ionics.

View Open Roles

Information Security Analyst - Audit, Compliance & Cybersecurity

NICE
Southampton
2 months ago
Applications closed

Related Jobs

View all jobs

Information Security Analyst - Audit & Compliance

Information Security Analyst

Information Security Analyst

Information Security Analyst

Information Security Analyst

Information Security Analyst (GRC) - Engine by Starling

Information Security Analyst - Audit, Compliance & Cybersecurity

United Kingdom - Southampton

At NICE, we don’t limit our challenges. We challenge our limits. Always. We’re ambitious. We’re game changers. And we play to win. We set the highest standards and execute beyond them. And if you’re like us, we can offer you the ultimate career opportunity that will light a fire within you.

At NICE, we don’t limit our challenges. We challenge our limits. Always. We’re ambitious. We’re game changers. And we play to win. We set the highest standards and execute beyond them. And if you’re like us, we can offer you the ultimate career opportunity that will light a fire within you.

So, what’s the role all about?

The Information Security Analyst is primarily responsible for ensuring compliance with information security frameworks such as Cyber Essentials, Cyber Essentials Plus, ISO 27001, ISO 27701, ISO 42001, GDPR, and DORA. This role focuses on internal audits, regulatory compliance, and readiness for external audits while also contributing to Cybersecurity Operations Center (CSOC) activities, including incident monitoring and response.

How will you make an impact?

  • Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes.
  • Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits.
  • Gap Assessments: Facilitate and/or conduct internal gap assessments and audit readiness evaluations for frameworks such as ISO 27001, GDPR, and DORA.
  • Framework Tracking: Monitor updates to Cyber Essentials, ISO, and regulatory frameworks and ensure internal alignment.
  • Control Documentation: Develop and maintain control narratives, walkthroughs, and documentation of compliance processes.
  • Audit Findings: Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions.
  • Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings.
  • External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence.
  • Security Monitoring: Use tools such as Rapid7 InsightIDR or other SIEM solutions to assist with security monitoring and incident detection.
  • Incident Response Support: Participate in incident response efforts, documenting security incidents and assisting in containment and recovery actions.
  • Threat Identification: Contribute to analyzing cybersecurity threats and implementing recommendations to improve the security posture.
  • Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives.
  • Vulnerability Management: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams.

Have you got what it takes?

  • Strong expertise in audit and compliance frameworks, including ISO 27001, ISO 27701, ISO 42001, GDPR, DORA, Cyber Essentials, and Cyber Essentials Plus.
  • Familiarity with CSOC tools such as Rapid7 InsightIDR or other SIEM solutions.
  • Hands-on experience in internal and external audits, compliance assessments, and process improvement.
  • Basic understanding of incident response frameworks and cybersecurity best practices.
  • Exceptional analytical, organizational, and communication skills.
  • Commitment to continuous learning and professional development in audit, compliance, and security.

You will have an advantage if you also have:

  • A Master’s degree in Cybersecurity, Risk Management, or related fields is a plus.
  • Certifications (preferred or required):
  • Certified Information Systems Auditor (CISA)
  • Certified Information Security Manager (CISM)
  • Certified Information Systems Security Professional (CISSP)
  • ISO 27001 Lead Auditor or Implementer
  • GIAC certifications (e.g., GIAC Certified Incident Handler - GCIH or GIAC Security Essentials - GSEC)

What’s in it for you?

Join an ever-growing, market disrupting, global company where the teams – comprised of the best of the best – work in a fast-paced, collaborative, and creative environment! As the market leader, every day at NICE is a chance to learn and grow, and there are endless internal career opportunities across multiple roles, disciplines, domains, and locations. If you are passionate, innovative, and excited to constantly raise the bar, you may just be our next NICEr!

At NICE, we work according to the NICE-FLEX hybrid model, which enables maximum flexibility: 2 days working from the office and 3 days of remote work, each week. Naturally, office days focus on face-to-face meetings, where teamwork and collaborative thinking generate innovation, new ideas, and a vibrant, interactive atmosphere.

About NICE

NICELtd. (NASDAQ: NICE)software products are used by 25,000+ global businesses, including 85 of the Fortune 100 corporations, to deliver extraordinary customer experiences,fight financial crimeand ensure public safety.Every day, NICE software managesmore than120 million customer interactions and monitors3+billion financial transactions.

Known as an innovation powerhouse that excels in AI, cloud and digital, NICE is consistently recognized as the market leader in its domains, with over 8,500 employees across 30+ countries.

NICE is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard torace, color, religion, national origin, age, sex, marital status, ancestry, neurotype, physical or mental disability, veteran status, gender identity, sexual orientation or any other category protected by law.

About NICE

NICELtd.(NASDAQ: NICE)software products are used by 25,000+ global businesses, including 85 of the Fortune 100 corporations, to deliver extraordinary customer experiences,fight financial crimeand ensure public safety.Every day, NICE software managesmore than120 million customer interactions and monitors3+billion financial transactions.

Known as an innovation powerhouse that excels in AI, cloud and digital, NICE is consistently recognized as the market leader in its domains, with over 8,500 employees across 30+ countries.

NICE is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard torace, color, religion, national origin, age, sex, marital status, ancestry, neurotype, physical or mental disability, veteran status, gender identity, sexual orientation or any other category protected by law.

Apply for this job

*

indicates a required field

First Name *

Last Name *

Email *

Phone *

Resume/CV

Enter manually

Accepted file types: pdf, doc, docx, txt, rtf

LinkedIn Profile

Do you have any first-degree relatives (spouse, parent, child, sibling) that are currently employed by NICE or any of its subsidiaries? * Select...

Have you ever worked at NICE or any of it's subsidiaries? * Select...

Do you now or in the future require visa sponsorship? * Select...

By checking this box, I agree to allow NICE to store and process my data for the purpose of considering my eligibility regarding my current application for employment. *

By checking this box, I agree to allow NICE to retain my data for future opportunities for employment for up to 365 days after the conclusion of consideration of my current application for employment.


#J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

The Future of Cybersecurity Jobs: Careers That Don’t Exist Yet

Cybersecurity has moved from a specialist concern to a national and global priority. Once seen as an IT issue, it is now a boardroom subject, a government responsibility, and a daily reality for individuals. With the increasing reliance on digital infrastructure, cloud platforms, and artificial intelligence, the risks posed by cyber threats have never been higher. The UK’s cybersecurity sector is thriving. It is home to thousands of companies offering defence services, penetration testing, encryption solutions, and critical infrastructure protection. Demand for cybersecurity skills continues to rise, with both the public and private sector investing heavily to defend against ransomware, nation-state cyber operations, and new forms of digital crime. Yet the industry is still at the beginning of its journey. The technologies that will define the next two decades—artificial intelligence, quantum computing, extended reality, and the Internet of Things—are only just starting to reshape cybersecurity. This means that many of the most important cybersecurity jobs of the future don’t even exist today. This article explores why new roles will emerge, what they might look like, how today’s jobs will evolve, why the UK is well-positioned to lead, and how professionals can prepare.

Seasonal Hiring Peaks for Cybersecurity Jobs: The Best Months to Apply & Why

The UK's cybersecurity sector has emerged as one of the most critical and lucrative technology markets, with roles spanning from security analysts to penetration testers and chief information security officers. With cybersecurity positions commanding salaries from £28,000 for junior security analysts to £140,000+ for senior security architects, understanding when organisations actively recruit can dramatically impact your career trajectory in this essential field. Unlike traditional IT sectors, cybersecurity hiring follows distinct patterns influenced by threat landscapes, regulatory compliance cycles, and incident response requirements. The sector's unique combination of perpetual threat evolution, regulatory pressures, and skills shortages creates predictable hiring windows that strategic professionals can leverage to advance their careers in protecting Britain's digital infrastructure. This comprehensive guide explores the optimal timing for cybersecurity job applications in the UK, examining how cyber threat cycles, compliance deadlines, and government initiatives influence recruitment patterns, and why strategic timing can determine whether you join a cutting-edge security consultancy or miss the opportunity to defend against tomorrow's cyber threats.

Pre-Employment Checks for Cyber Security Jobs: DBS, References & Right-to-Work and more Explained

The cyber security sector in the UK stands at the forefront of protecting national infrastructure, business operations, and personal data from increasingly sophisticated cyber threats. As organisations across all sectors recognise cyber security as a critical business function, employers are implementing the most rigorous pre-employment screening processes in the technology industry to ensure they recruit professionals capable of defending against advanced persistent threats and maintaining the highest standards of security and trustworthiness. Whether you're a penetration tester, security analyst, incident response specialist, or chief information security officer, understanding the comprehensive vetting requirements is essential for successfully advancing your career in this security-critical field. This detailed guide explores the extensive background checks and screening processes you'll encounter when applying for cyber security positions in the UK, from fundamental eligibility verification to the most stringent security clearance requirements and specialised threat intelligence assessments.