Engineer the Quantum RevolutionYour expertise can help us shape the future of quantum computing at Oxford Ionics.

View Open Roles

Information Security Officer

Trace Solutions Ltd
Sunderland
1 week ago
Create job alert

The Information Security Officer will lead the organisation's cybersecurity strategy and operations, protecting digital assets, data, and infrastructure. This position combines strategic security planning with hands-on implementation of security controls, threat monitoring, and incident response. The role ensures compliance with data protection regulations whilst maintaining robust protection against cyber threats.

Key Responsibilities

  • Security Strategy Development - Create and maintain comprehensive information security policies, standards, and procedures aligned with industry frameworks (Cyber Essentials, ISO 27001).
  • Risk Management - Conduct regular security risk assessments, vulnerability analyses, and maintain the information security management system (ISMS).
  • Threat Detection & Monitoring - Implement and monitor SIEM systems, develop threat intelligence capabilities and threat hunting programmes.
  • Incident Response Leadership - Lead response activities for security breaches, conduct forensic analysis, and coordinate with external agencies when required.
  • Infrastructure Security - Oversee firewalls, intrusion detection systems, endpoint protection, and identity/access management systems.
  • Cloud & Network Security - Ensure secure configuration of cloud services, hybrid environments, and implement encryption standards.
  • DevSecOps Integration - Coordinate with DevOps teams to implement secure CI/CD pipelines and development practices.
  • Disaster Recovery Planning - Develop and maintain DR/business continuity plans, conduct testing, and manage backup strategies.
  • GDPR & Data Protection Compliance - Ensure compliance with GDPR, UK Data Protection Act, conduct Privacy Impact Assessments.
  • Third-Party Risk Management - Conduct security due diligence for vendors, manage risk assessments and vendor monitoring.
  • Physical Security Coordination - Monitor CCTV systems, coordinate access control, and manage visitor/contractor procedures.
  • Security Training & Awareness - Deliver cybersecurity training, conduct phishing simulations, and create security documentation.
  • Business Development Support - Provide security expertise for tenders, respond to client security questions, and support pre-sales.
  • Budget & Performance Management - Manage security budgets, develop KPIs, and provide cost-benefit analyses for investments.
  • Stakeholder Reporting - Prepare security reports for senior management, present to board committees, and manage vendor relationships.

Qualifications and Experience

  • Minimum 5 years' experience in cybersecurity, information security, or related field.
  • Professional security certification (CISSP, CISM, CISA, or equivalent).
  • Understanding of network security, firewalls, and intrusion detection systems.
  • Experience with security monitoring tools, SIEM platforms, and incident response.
  • Knowledge of cloud security (AWS, Azure, or Google Cloud).
  • Understanding of data protection regulations (GDPR, UK DPA 2018).
  • Demonstrated experience in security risk assessment and management.

Key Skills and Competencies

Technical Skills

  • Proficiency with security tools (firewalls, SIEM, IDS/IPS, endpoint protection).
  • Understanding of operating systems security (Windows, Linux, macOS).
  • Knowledge of network protocols, encryption, and PKI.
  • Experience with cloud security controls and configurations.
  • Database security and application security principles.
  • Risk assessment and threat modelling methodologies.

Analytical and Communication Skills

  • Strong problem-solving and analytical thinking abilities.
  • Attention to detail and ability to identify security weaknesses.
  • Capability to analyse complex security incidents and data.
  • Excellent communication skills for technical and non-technical audiences.
  • Ability to present to senior management and board-level stakeholders.
  • Project management and vendor relationship management experience.

Don't tick every box? No problem – if you believe your skills and experience would make you a valuable addition to our team, we'd still love to hear from you.

Seniority level

  • Seniority levelExecutive

Employment type

  • Employment typeFull-time

Job function

  • Job functionInformation Technology

Referrals increase your chances of interviewing at Trace Solutions Ltd by 2x

Get notified about new Information Security Officer jobs in Farringdon, England, United Kingdom.

Exeter, England, United Kingdom 1 week ago

East Devon, England, United Kingdom 1 day ago

High Performance Computing (HPC) Systems Administrator

Beer, England, United Kingdom 5 months ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.


#J-18808-Ljbffr

Related Jobs

View all jobs

Information Security Officer

Information Security Officer

Information Security Officer

Information Security Officer

Information Security Officer

Information Security Officer

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Pre-Employment Checks for Cyber Security Jobs: DBS, References & Right-to-Work and more Explained

The cyber security sector in the UK stands at the forefront of protecting national infrastructure, business operations, and personal data from increasingly sophisticated cyber threats. As organisations across all sectors recognise cyber security as a critical business function, employers are implementing the most rigorous pre-employment screening processes in the technology industry to ensure they recruit professionals capable of defending against advanced persistent threats and maintaining the highest standards of security and trustworthiness. Whether you're a penetration tester, security analyst, incident response specialist, or chief information security officer, understanding the comprehensive vetting requirements is essential for successfully advancing your career in this security-critical field. This detailed guide explores the extensive background checks and screening processes you'll encounter when applying for cyber security positions in the UK, from fundamental eligibility verification to the most stringent security clearance requirements and specialised threat intelligence assessments.

Why Now Is the Perfect Time to Launch Your Career in Cyber Security: The UK's Digital Defence Revolution

The United Kingdom faces an unprecedented cyber security challenge that presents an extraordinary career opportunity. With cyber attacks increasing by 300% year-on-year and the average cost of a data breach reaching £4.24 million, Britain urgently needs skilled cyber security professionals to defend its digital infrastructure, protect citizens' data, and maintain national security in an increasingly connected world. If you've been considering a career change or seeking to future-proof your professional trajectory, cyber security represents one of the most secure, well-compensated, and socially impactful career choices available. The convergence of escalating threats, skills shortage, government investment, and regulatory requirements has created a perfect storm of opportunity that shows no signs of abating.

Automate Your Cyber Security Jobs Search: Using ChatGPT, RSS & Alerts to Save Hours Each Week

Cyber roles drop across consultancies, MSSPs, hyperscalers, banks, gov & start-ups every day—often buried in ATS portals or duplicated across boards. The fix is simple: put discovery on autopilot with keyword-rich alerts, RSS feeds & a reusable ChatGPT workflow that triages listings, ranks fit, & tailors your CV in minutes. This copy-paste playbook is built for www.cybersecurityjobs.tech readers. It’s UK-centric, practical, & designed to save you hours each week. What You’ll Have Working In 30 Minutes A role & keyword map spanning SecOps/Detection, DFIR, AppSec, Cloud Security, GRC, Red Team, Threat Intel, IAM/PAM, OT/ICS & Vulnerability Management. Shareable Boolean search strings for Google & job boards to cut noise fast. Always-on alerts & RSS feeds delivering fresh roles to your inbox/reader. A ChatGPT “Cyber Job Scout” prompt that deduplicates, scores fit & outputs tailored actions. A simple pipeline tracker so deadlines & follow-ups never slip.