Information Security Officer

Hays
Cardiff
1 week ago
Applications closed

Related Jobs

View all jobs

Information Security Officer

Information Security Officer

Regional Information Security Officer

Regional Information Security Officer

Business Information Security Officer, Europe

Chief Information Security Officer

Information Security Officer – GRC focusedPermanent – £50k to £55kLocation: Hybrid – Cardiff

Your newpany

You will play a key role at a local private sector organisation, who are looking to recruit an Information Security Officer on a permanent basis.
This role is crucial for ensuring IT operations align with regulatory standards and organisational goals. Key areas will include strategic planning, incident response and integratingpliance frameworks ( GDPR, ISO 27001) to protect critical systems.

Your new role

You will act as the Information Security SME on all things GRC and InfoSec. This role is crucial to thepany’s plans to improve and mature the InfoSec practices within the organisation, and they are looking for someone toe in with ideas and expertise on how to improve and protect their IT and InfoSec estate. You will be responsible for developing risk management processes, crisis plans and vendor oversight, whilst collaborating with stakeholders to implement security measures and enhancepliance. You will have a good level of autonomy and will be the owner of the GRC elements for the organisation. Risk &pliance: Develop IT risk frameworks, perform assessments, and ensure regulatorypliance.Incident Response: Maintain an Incident Response Plan and coordinate rapid incident resolution (, cybersecurity breaches, data loss).Vendor Risk: Establish a Vendor Risk Management program to assess third-partypliance.Security Leadership: Oversee security measures, incident responses, and network security enhancements, including Fortinet solutions.

What you'll need to succeed

You will need to have performed a similar role previously. This could be a good fit for someone who has worked in a larger organisation, who is looking to take ownership of InfoSec policies and procedures, or someone who’s currently leading in a similar role but would like a new challenge or environment. Certifications such as CRISC, CISA, CISM, ISO 27001 Lead Auditor, or equivalent will be beneficial, but not essential. However, the experience of having performed a similar role will be essential. Strong knowledge of regulatory requirements ( GDPR, ISO 27001, Data Protection Act 2018), including Data Protection Impact Assessments (DPIAs) and familiarity with frameworks such as Cyber Essentials or ISO 27005.Proficiency with MS 365, Intune, VMWare and Fortinet technologies

What you'll get in return

As well as strong autonomy and the support needed to make a difference in the role, you will get an annual salary of £50,000 - £55,000. The role will be on a hybrid basis, with it most likely being 3 days on site in Cardiff, but this could be flexible. However, it cannot be fully remote, nor can thepany offer sponsorship.
28 days annual leave + bank holidays.Industry-leading trainingEmployee Assistance Program - free 24/7 confidential helpline (domestic, financial, legal, health support etc)High street retail discount scheme

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.