Infra Control Analyst - 6 Months - Fully Remote

London
2 weeks ago
Create job alert

We require a suitably experience Infra Control Analyst for our client, a global bank.

This initial 6 month contract is fully remote.

Infra Control Analyst

Location: Fully Remote

Contract Length: 6 Months +

Day Rate: Negotiable Day Rate - Outside IR35

Overview of role:

Responsible for supporting all Infrastructure pillars in managing all IT Audit and Risk Control activities.

  • Responsible for analysing data, producing report packs, facilitating meetings and engaging with other control function to ensure Infrastructure meets it’s risk and control reporting requirements.

    Key Responsibilities:

    Responsible for supporting effective relationship between Infrastructure & IT Risk, 2LOD, 3LOD and Technology teams

    Responsible for tracking the remediation of existing issues and actions under Infrastructure ownership.

    Engage with IT Risk & Control, internal and external audit where applicable.

    Support the management of IT Infrastructure self-identified risk issues, supporting and underpinning the wider IT Risk Management Process.

    Responsible for collation and distribution of Infrastructure related KPI’s and KRI’s. Act as the first point of contact for all queries relating to these metrics.

    Responsible for Infrastructure input into management of compliance to policies, standards and procedures.

    Responsible for building strong relationships across the Bank and Securities, with other Bank and Securities functions and with business areas, underpinned by trust and the core values of the bank.

    Responsible for identifying service improvement opportunities within Bank and Securities.

    Skills and Experience:

    Functional / Technical Competencies:

    Essential

    Experience of working in or alongside a control function within a regulated environment, with an understanding of how these functions interact with Technology.

    Experience of working with internal and external audit -> including managing the flow of information between Technology and audit bodies, managing the collection of information and managing the submission of evidence to close out existing audit issues.

    Experience managing self-identified issues, including registering issues and actions and managing the lifecycle through to remediation -> managing the submission of issues for Infrastructure and managing discussions with SME teams to articulate the appropriate remediation response.

    Experience in producing risk related metrics around Key Risk Indicators and Key Performance Indicators.

    Experience supporting departmental risk and control self-assessments.

    Experience embedding risk and control awareness across Technology Basic understanding of IT Infrastructure, including various key technologies (Database, networks, servers & storage), and how Infrastructure supports applications and interacts with Information Security principles.

    Some knowledge of data security governance and regulations such as SOX, GDPR and FFIEC.

    Proficient in Microsoft Office; creating documentation, managing spreadsheets and creating reporting presentation

    Desirable:

    Good working knowledge of Service Now or similar service management tools.

    Good working knowledge of Information Security principles.

    Good working knowledge of Project Management principles.

    Good working knowledge of SharePoint, JIRA and Confluence

Related Jobs

View all jobs

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.

Which Cyber Security Career Path Suits You Best?

Discover Your Ideal Role in the World of Digital Defence Cyber threats grow more complex by the day—ranging from sophisticated nation-state attacks to persistent phishing scams. In response, cybersecurity has become one of the fastest-expanding and most in-demand fields. If you’re exploring a career in cybersecurity, you might wonder which specialised role aligns best with your skills and aspirations. This quiz will help you identify your ideal cybersecurity path, from penetration testing to threat intelligence and beyond.

The Ultimate Glossary of Cyber Security Terms: Your Comprehensive Guide to Protecting the Digital World

As our daily lives become increasingly entwined with digital technologies, cybersecurity has emerged as one of the most critical and rapidly evolving fields. From safeguarding personal data on social media to protecting vital infrastructure and corporate networks, cyber threats loom in every corner of our connected world. Whether you’re just entering the workforce, looking to pivot your career, or a seasoned professional sharpening your skill set, understanding core terminology is essential to thrive in this domain. That’s why we’ve prepared this comprehensive glossary of cybersecurity terms and optimised for your career development. We’ll walk through the building blocks of cybersecurity—covering fundamental concepts, advanced techniques, and the latest trends—so you can confidently navigate this complex landscape. If you’re keen to explore or advance your career, be sure to check www.cybersecurityjobs.tech for roles spanning penetration testing, incident response, threat intelligence, and more.