National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Information Security Analyst

Rentokil Initial
Crawley
1 month ago
Applications closed

Related Jobs

View all jobs

Information Security Analyst

Information Security Analyst

Information Security Analyst (London)

Information Security Analyst (University placement)

Senior Information Security Analyst, SOC (Manchester)

Senior Information Security Analyst

The Information Security Analyst will be responsible for assuring information security and managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes. They will be responsible for the collection, processing, preservation, analysis, and presentation of evidence in support of information security activities.

Main tasks:

 Maintains and improves information security solutions for organization systems and products that comply with all applicable security policies, standards, and regulatory framework

 Establishes, implements, and maintains information assurance programs, requirements, and standards based on the analysis of user, policy, regulatory, and resource demands

 Authors and updates security documentation to include, but not limited to, standards, policy, system security plans, contingency plans, standard operating procedures, and configuration management plans

 Analyzes information assurance-related technical problems and provides engineering and technical support for solving these problems

 Identifies, reports, and resolves security violations while also proactively seeks to uncover indicators of compromise

 Facilitates, performs analysis, and stores appropriate artifacts to respond to audits to comply with regulatory frameworks

 Ensures employees and third parties understand, acknowledge, and fulfill all applicable information security policies

 Conducts computer forensic analysis, data recovery, eDiscovery, and other IT investigative work while collaborating with fraud examiners, legal counsel, human resources (HR), and other IT technical personnel in investigations

 Compiles and analyzes data for management reporting and metrics

 Analyzes potential impact of new threats and communicates risks to relevant business units by monitoring information security related websites to stay up to date on current attacks and trends

Requirements:

1. Bachelor's degree or relevant professional certification with less than 1 year relevant work experience OR 1 year relevant work experience

2. Self-motivated and possessing of a high sense of urgency and personal integrity

3. Instinctive and creative with the highest ethical standards and values

4. Excellent investigative skills, problem-solving, insatiable curiosity, and an innate drive to win

5. Technical knowledge of system security vulnerabilities and remediation techniques for identity, authentication, authorization, data, and access controls

6. An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business

7. An ability to identify and assesses the severity and potential impact of risks and communicate to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance

8. Technical expertise in following industry best practices and standards in digital evidence acquisition, handling, and documentation

Benefits:

Competitive salary and bonus scheme Hybrid working Rentokil Initial Reward Scheme 23 days holiday, plus 8 bank holidays Employee Assistance Programme Death in service benefit Healthcare Free parking

At Rentokil Initial, our customers and colleagues represent diverse backgrounds and experiences. We take pride in being an equal opportunity employer, actively encouraging applications from individuals from all walks of life. Our belief is that everyone irrespective of age, gender, gender identity, gender expression, ethnicity, sexual orientation, disabilities, religion, or beliefs, has the potential to thrive and contribute.

We embrace the differences that make each of our colleagues unique, fostering an inclusive environment where everyone can be their authentic selves and feel a sense of belonging. To ensure that your journey with us is accessible if you have any individual requirements we invite you to communicate any specific needs or preferences you may have during any stage of the recruitment process. Our team is available to support you; feel free to reach out to () if you need anything


Be Yourself in Your Application! At Rentokil Initial, we value innovation, but we want to see the real you! While AI can help with structure and grammar, make sure your application shows your true passion and understanding of the role. A personal touch will help you stand out.

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs Employer Hotlist 2025: 50 UK Companies Actively Hiring Right Now

Bookmark this guide—refreshed every quarter—so you always know who’s really expanding their cyber security teams. Ransomware payouts broke records in 2024, the UK’s new Cyber Security Bill imposed mandatory breach disclosure, and the National Cyber Force’s move to Samlesbury has super‑charged the northern skills market. Result? Demand for security architects, SOC analysts, penetration testers, cloud‑security engineers, threat hunters & GRC specialists is at an all‑time high in 2025. Below you’ll find 50 organisations that have posted UK‑based cyber security vacancies or announced head‑count growth during the past eight weeks. They’re organised into five quick‑scan categories. For every employer you’ll see: Main UK hub Example live or recent vacancy Why it’s worth a look (tech stack, culture, mission) Search any company on CyberSecurityJobs.tech to view current ads, or set a free alert so fresh openings land straight in your inbox.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.