National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

ISMS Consultant

Avance Consulting
Lincoln
5 months ago
Applications closed

Related Jobs

View all jobs

Senior Information Assurance consultant

Cyber Security Consultant - GRC

Cyber Security Consultant - GRC

Senior Cyber Security Consultant

Senior OT Security Consultant

Head of GRC - Cybersecurity

Required Skills

Functional | Cybersecurity Operations management | Managed Cybersecurity

Technology | Cybersecurity | Vulnerability Management

Behavioral | Aptitude | Communication

Certification Mandatory / Desirable :

Technology | IT Security Certifications | ISC2 | ISC2 Certified Information Systems Security Professional CISSP

Details:

1. Achievement of the Unit / account margin goals for the year

2. Achievement of the margin goals through various optimization initiatives for the account

3. Monthly Accounts profitability Reports published by finance

4. Revenue Goals

5. Achievement of the Unit / account revenue goals for the year

6. Formal documented succession plan for the critical roles in the program

7. Talent management and Improvement

8. Succession plan - formal documented plan for all critical roles / people

9. WMG, HR LD Dashboard

10. Achievement of SLAs / KPIs for programs - All green status - Zero defect delivery

11. Achievement of formal published GO for the program as agreed and tracked through customer governance

12. Any misses to have a formal RCA based fix or a formal SIP initiative associated

13. Productivity and Service Excellence

14. Devise implement continuous improvement initiatives aimed at achieving key objectives - published and

documented for outcome / benefits

15. Left shift resulting in positive movement on CPP / RPP and pyramid mix as against the annual baseline

16. Ensure tracking of productivity in a systematic manner and take measure to improve productivity

17. Formal internal reviews for published plans vs actuals

18. QMS / IMS Goals

19. Ensure account maintains 100% compliance to service security management processes defined.

20. 100% adherence implementation to QMS processes defined by organization in accounts.

21. Zero Major NC in Internal and External Audit

22. Share at-least one Best practices within account to SEPG team for taking it across the organization as

applicable.

23. Value based delivery:

24. Identify and execute initiatives classified as Value for customer

25. Demonstrate to customer on the Value delivered to customer through these initiatives

26. Ensure documentation of the projects and share the same with SEPG team

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.