National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Information Security Specialist

Groupe Crédit Agricole
Greater London
1 month ago
Applications closed

Related Jobs

View all jobs

Information Security Specialist

Information Security Specialist

Cyber Security Specialist

Security Specialist (Cyber)

Security Specialist (Third Party)

Cyber Security Specialist

Job description

Business type

Types of Jobs - IT, Digital et Data

Job title

Information Security Specialist

Contract type

Permanent Contract

Management position

No

Job summary

We are seeking a proactive Information Security Specialist skilled in security operations, threat intelligence, and risk management. This role is crucial for maintaining robust security protocols, identifying vulnerabilities, and ensuring compliance with security standards. The ideal candidate will have a strong background in IT infrastructure security, preferably within financial institutions, experience with network infrastructure components, solid analytical and problem solving skills, and a deep understanding of threat [CI(C1] intelligence and incident response.

Having CISSP or other relevant certifications (e.g., Network+, Security+, MCSP, CAN) would be beneficial to have to perform this role. [CI(C2] 

Day-to-Day of the Role:

Security Operations and Infrastructure

Assist in identifying, analysing, and following up on security vulnerabilities in IT systems. Help maintain accurate IT asset inventory across various security platforms (e.g., CMDB, AV, SIEM). Participate in regular security reviews, vulnerability assessments, and help ensure compliance with established security standards. Monitor user access and permissions, identifying and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security controls. Participate in regular AD security assessments and remediation efforts.


Threat Intelligence and Incident Response

Monitor and analyse phishing campaigns and assist in managing the organizational phishing response program. Review and distribute threat intelligence alerts to relevant stakeholders, helping assess potential impacts on organizational assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malware analysis and threat hunting. Collaborate with the CERT team in maintaining an up-to-date threat landscape and contributing to the incident response playbooks.


Security Risk Management and Compliance

Support the maintenance of the IT security risk register and assist with internal and external security audits. Contribute to security reporting and tracking security risk indicators.


Position location

Geographical area

Europe, United Kingdom

City

London

Candidate criteria

Minimal education level

Bachelor Degree / BSc Degree or equivalent

Academic qualification / Speciality

CISSP or other relevant certifications (e.g., Network+, Security+, MCSP, CNA).


Experience

Proven experience in an information security role is essential.


Required skills

Dynamic, creative, and proactive. Committed to continuous learning and staying updated with the latest technologies. Ability to work independently and achieve results. Strong timekeeping and time management skills. Ability to prioritize and meet tight deadlines Hands-on approach with a willingness to go the extra mile.


Languages

English

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.