Be at the heart of actionFly remote-controlled drones into enemy territory to gather vital information.

Apply Now

ISMS Consultant

Avance Consulting
Lincoln
8 months ago
Applications closed

Related Jobs

View all jobs

Information Security Assurance Analyst

Information Security Management Specialist

Information Security Management Specialist

Information Security Analyst (Hybrid / Hatfield)

Lead / Senior Information Security Analyst

Data Protection Officer

Required Skills

Functional | Cybersecurity Operations management | Managed Cybersecurity

Technology | Cybersecurity | Vulnerability Management

Behavioral | Aptitude | Communication

Certification Mandatory / Desirable :

Technology | IT Security Certifications | ISC2 | ISC2 Certified Information Systems Security Professional CISSP

Details:

1. Achievement of the Unit / account margin goals for the year

2. Achievement of the margin goals through various optimization initiatives for the account

3. Monthly Accounts profitability Reports published by finance

4. Revenue Goals

5. Achievement of the Unit / account revenue goals for the year

6. Formal documented succession plan for the critical roles in the program

7. Talent management and Improvement

8. Succession plan - formal documented plan for all critical roles / people

9. WMG, HR LD Dashboard

10. Achievement of SLAs / KPIs for programs - All green status - Zero defect delivery

11. Achievement of formal published GO for the program as agreed and tracked through customer governance

12. Any misses to have a formal RCA based fix or a formal SIP initiative associated

13. Productivity and Service Excellence

14. Devise implement continuous improvement initiatives aimed at achieving key objectives - published and

documented for outcome / benefits

15. Left shift resulting in positive movement on CPP / RPP and pyramid mix as against the annual baseline

16. Ensure tracking of productivity in a systematic manner and take measure to improve productivity

17. Formal internal reviews for published plans vs actuals

18. QMS / IMS Goals

19. Ensure account maintains 100% compliance to service security management processes defined.

20. 100% adherence implementation to QMS processes defined by organization in accounts.

21. Zero Major NC in Internal and External Audit

22. Share at-least one Best practices within account to SEPG team for taking it across the organization as

applicable.

23. Value based delivery:

24. Identify and execute initiatives classified as Value for customer

25. Demonstrate to customer on the Value delivered to customer through these initiatives

26. Ensure documentation of the projects and share the same with SEPG team

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Recruitment Trends 2025 (UK): What Job Seekers Must Know About Today’s Hiring Process

Summary: UK cyber security hiring has shifted from title‑led CV screens to capability‑driven assessments that emphasise incident readiness, cloud & identity security, detection engineering, governance/risk/compliance (GRC), measurable MTTR/coverage gains & secure‑by‑default engineering. This guide explains what’s changed, what to expect in interviews, & how to prepare—especially for SOC analysts, detection engineers, blue/purple teamers, penetration testers, cloud security engineers, DFIR, AppSec, GRC & security architecture. Who this is for: SOC & detection engineers, security operations leads, DFIR analysts, penetration testers/red teamers, purple teamers, AppSec/DevSecOps engineers, security architects, cloud security engineers, identity/IAM engineers, vulnerability managers, GRC/compliance specialists, product security & security programme managers targeting roles in the UK.

Why Cyber Security Careers in the UK Are Becoming More Multidisciplinary

Cyber security used to be viewed primarily as a technical discipline: firewalls, encryption, intrusion detection, penetration testing. In the UK today, it’s far broader. Organisations now face complex legal frameworks, ethical dilemmas, human-behaviour risks, communication challenges & usability hurdles. This shift means cyber security careers are becoming more multidisciplinary. From protecting NHS patient records to defending financial services, securing supply chains & safeguarding national infrastructure, cyber security now touches every sector. Employers increasingly want professionals who understand law, ethics, psychology, linguistics & design alongside traditional technical skills. In this article, we’ll explore why UK cyber security careers are expanding in this way, how these five disciplines shape the profession, and what job-seekers & employers need to know to thrive in this new landscape.

Cyber Security Team Structures Explained: Who Does What in a Modern Cyber Security Department

Cyber security has become a top priority for UK organisations of all sizes. From small businesses to financial institutions, healthcare providers, and government bodies, the risk of cyber attack is now a constant concern. Threats are more sophisticated, regulations more demanding, and customers more aware of data privacy than ever before. But defending against cyber threats isn’t simply about having the right tools — it’s about having the right team. A modern cyber security department relies on clearly defined roles and responsibilities to ensure that defences are proactive, incidents are managed swiftly, and compliance is maintained. This article explains the structure of a modern cyber security team, the roles you’ll typically find within it, how they collaborate, and what skills, qualifications, and salaries are expected in the UK job market.