Information Security Consultant

Camberley
1 month ago
Applications closed

Related Jobs

View all jobs

Senior Information & Cyber Security Consultant

Cyber Security Consultant

Security Consultant – GRC (Governance, Risk, Compliance)

Info Sec & Cyber Security Consultant

Senior or Principal Security Consultant (Risk Management)

Lecturer in Networking and Cyber Security (HE)

Overview

North builds stronger networks and creates smarter places. Our intelligent technology solutions and robust network infrastructures transform the way people, places, and organisations work. And we focus our expertise on working in three specialist sectors: public services, enterprise & data centres, and defence & justice.

North is looking to appoint a customer facing Information Security Consultant.

The successful candidate will be responsible for ensuring the cyber & info security integrity of North’s customer deployments and for working with North’s major customers to assess and, where required, improve the cyber-security robustness where their IT and OT deployments are converging onto common networks and platforms – particularly where these are adjacent to North’s solution deployments.

This role requires a cyber security subject matter expert with a deep understanding of current and emerging cybersecurity threats and how to mitigate them – particularly in the arena of Operational Technologies – through the application of technology, process and risk assessment.

In addition, the candidate should have understanding, and experience, in the application of NCSC best practice and UK government accreditation frameworks including Cyber Assessment Framework and Secure by Design.

Finally, the candidate must have excellent consulting, stakeholder management and communication skills, with demonstrable experience of applying these skills internally and in customer facing environments

Qualifications

This new role will involve working with the product team and other technical leaders and experts, developing and implementing a cyber security strategy and framework against which North’s portfolio of services and solutions can be developed and deployed. The role will support North’s three sectors: Defence & Justice; Public Services; Datacentre & Enterprise.

The successful candidate will have 4 main responsibilities

  • Develop, and continually enhance, North’s customer-facing cyber security framework which will be compatible with “Secure by Design” and CAF (Cyber Assessment Framework) principles, and any other relevant regulations and industry standards, namely



* Clear responsibility for cyber security risk

* Source secure technology products

* Adopt a risk-driven approach

* Design usable security controls

* Build in detect and respond security

* Design flexible architectures

* Minimise the attack surface

* Defend in depth

* Embed continuous assurance

* Make changes securely

* Ensure and assure that North’s customer deployments comply with North’s cyber security framework, with industry regulations and with any customer security accreditations & requirements – including GDPR, ISO27001 and Cyber Essentials plus

* With particular focus where North’s solutions integrate with North’s IT systems, supplier IT systems, customer IT systems & corporate networks

* Lead customer-facing cyber-security audit &/or assurance exercises together with any follow-up programmes

* These will typically focus on the deployment of customer Operational Technology solutions &/or IT or OT that is adjacent to North’s solutions

* Work as a core pre-sales member of selective large &/or strategic bids ensuring that customers’ tender requirements relating to cyber-security are fully understood and addressed, and that customers’ fully appreciate the focus and importance that North places on cyber-security

To succeed in the role, the following skills, knowledge and attributes are key:

* Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field

* Professional certifications such as CISSP, CISM,NCSC CCP or CCISO are highly desirable

* Extensive experience in information & cyber security with demonstrable experience working with Operational Technology + Information Technology

* Strong knowledge of cybersecurity frameworks, standards, and best practices: experience applying Secure by Design &/or Cyber Assessment Framework is highly desirable

* A strong & demonstrable understanding of how to combine technology, policy & process, risk management and user education in order to minimise cyber-security risks

* Excellent problem-solving, analytical, and process focused skills set.

* Strong communication, interpersonal and senior stakeholder management skills

North rewards employees with a competitive market salary and an excellent benefits package and offers fantastic opportunities for progression throughout the company. Further details of package on offer will be discussed at application stage. North is an equals opportunity employer, we celebrate diversity and are committed to creating an inclusive environment for all employees

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.