Information Security Consultant

Horsforth
10 months ago
Applications closed

Related Jobs

View all jobs

Cyber Security Consultant

SecOps Engineer (SC + NPPV3 Cleared)

SecOps Engineer

CyberSecurity – Operations Engineer

Graduate Consultant

BIM Manager

Information Security Consultant

Location: Leeds (onsite)

Type: Perm

Overall Requirement

We are looking to recruit an Information Security Consultant to join our existing Information Security team.

Working with the Information Security team to provide advice and guidance on IT security and further develop IT policies and processes across a multi-region infrastructure consisting of 8300+ staff and 100+ sites.

As a member of the IT Security team, you will review all aspects of the IT environment and its components. This role shall be responsible for supporting and maintaining enterprise-wide solutions. The successful candidate will be required to proactively improve and provide advice and guidance on information security matters.

We believe this is an excellent opportunity for candidates who have a strong understanding of IT infrastructure and/or information security within a fast-paced environment.

SOX control responsibilities may be part of this role, which are to be adhered to where applicable.

Key Duties and Responsibilities

Assist with security incident management and response activities
General day-to-day support on managing and responding to security alerts from systems and end users
Perform daily, weekly, and monthly security checks, reconciliation and compliance checks and investigate exceptions
Completing client security requirement questionnaires and support the bidding process
Identify and raise awareness of security risks
Develop and enhance security policies, processes, procedures, and technical controls to strengthen security capabilities and resilience to cyber threats
Take a proactive role in identifying security risks, mitigations, and opportunities to strengthen resilience to cyber-attacks and security incidents
Participate in the design and implementation of systems and applications
Develop user and technical training guides
Maintain and manage the IT Risk register
Test DR plans and capabilities to ensure they work as designed, identifying gaps and lessons learnt and work with the business to drive continual development and enhancement

Technical Requirements

Two years hands-on experience of security and/or infrastructure within an enterprise environment
Exposure to enterprise information security standards including Cyber Essentials, ISO 27001, 27002 etc. Data Protection Act and the General Data Protection Regulation
Microsoft O365 Security solutions; Networking; Security operations; Vulnerability Management; Security Auditing
Good understanding of security testing principles, including experience of vulnerability scanning, identifying, resolving, and reporting risks
Experience of formal document creation, such as the creation of reports or procedures

Detailed knowledge of:

Microsoft O365 environment
Threat Intelligence analysis and best practice
Security Incident Response processes, procedures, and best practices
Disaster Recovery and Business Continuity principles
Event and log analysis

Core Behavioural Skills

Confident individual with the good interpersonal skills, able to deal with people at all levels and communicate to users in a clear, non-technical language
Team-player
Analytically minded, able to break down and understand information
Must be comfortable with working in a fast-moving, dynamic environment
Strongly customer-focused, used to providing support to demanding users
Good organisational skills, used to managing and prioritising own workload
Ability to report on progress, timescales, outstanding and completed activitiesECS Recruitment Group Ltd is acting as an Employment Agency in relation to this vacancy

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.