National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

IT Information Security Analyst

Birmingham Water Works
West Midlands
1 month ago
Create job alert

General Responsibilities


Responsible for constantly detecting and preventing cyber threats to the company computing environment. Identify weaknesses of the company computing infrastructure (software, hardware, networks) and find creative ways to protect it. Plan, implement, upgrade, or monitor security measures to protect computer networks and information. Ensure appropriate security controls are in place to safeguard digital files and vital electronic infrastructure. Serves as an internal company lead for responding to business-impacting computer security breaches and viruses. Night and weekend hours as needed.


Essential Job Functions

Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated. Plan, implement and upgrade security measures and controls. Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and destruction. Maintain data and monitor security access. Perform vulnerability testing, risk analyses and security assessments. Perform risk assessments and execute tests of the data processing system to ensure the functioning of data processing activities and security measures. Conduct internal security audits.

Essential Job Functions Con't

Anticipate security alerts, incidents, and disasters and reduce their likelihood. Collaborate technically with the infrastructure team to manage the network, intrusion detection, prevention systems and encryption measures. Analyze security breaches to determine the root cause. Recommend and install appropriate tools and countermeasures. Define, implement, and maintain corporate security policies. Collaborate with the appropriate BWW areas to train fellow employees in security awareness and procedures. Coordinate security plans with outside vendors.

Essential Job Functions Con't

Respond to eDiscovery, data collection queries, and digital forensics requests. Work an on-call rotating schedule outside the regular schedule on a rotating basis. Maintain and protect sensitive and private information by keeping employee records confidential in accordance with HIPAA, local, state and federal laws and regulations. Ensures that PHI/ePHI of employees, plan participants, patients, and other assigned individuals are maintained and transmitted securely and legally. Perform all work safely in accordance with established safety policies and procedures. Comply with all safety and health standards and guidelines issued by management. Perform other duties as assigned.

Education


Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or related field required.


Experience


Five (5) years of experience, specifically in a security analyst job required.

Penetration testing and vulnerability testing & remediation Anti-virus and anti-malware TCP/IP, computer networking, routing and switching Firewalls, proxies, IDS, IPS, and security appliances Windows and Linux operating systems Network protocols and packet analysis tools Comprehension of development & scripting languages (C#, VB, Python, C, .NET) Cloud computing

Certificates, Licenses, Registrations:

Valid driver’s license required The following certifications are highly preferred: CEH Certified Ethical Hacker ECSA EC-Council Certified Security Analyst

Supervision


NONE


Physical Demands

Ability to stand, walk or sit for extended periods Reaching by excreting hand(s) or arms(s) in any direction Finger dexterity is required to manipulate objects with fingers rather than with whole hand(s) or arm(s), for example, using a keyboard Communication skills using the spoken word Ability to see within normal parameters Ability to hear within normal parameters Ability to move about

Ability to lift 25 pounds


Work Enviroment

Moderate noise (business office) Night and weekend hours as needed Exposed to cold temperatures in the data center Occasionally visit job sites, in plants and outdoors, exposed to extreme hot/cold/wet weather conditions

Related Jobs

View all jobs

Network Security Analyst

Cyber Security Analyst – Pen Testing, Info Sec, Risk

Information Security Analyst

Information Security Analyst

Senior IT Security Analyst (Tech SME)

IT Security Analyst

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.