IT Security Manager

CarieraNoua
Somerset
6 months ago
Applications closed

Related Jobs

View all jobs

IT Security Engineer (Infosec)

IT Security Analyst

Security Architect - Data

Microsoft Cloud Security Engineer

Microsoft Cloud Security Engineer

IT Security Incident Manager

Job Title: IT Security Manager

Location: Bristol - Hybrid Working 3 days per week onsite

Salary: £60, - £65, + benefits

Are you an experienced IT Security Manager looking for your next challenge? If so, this could be the ideal opportunity for you. My client, a specialist retail business with an excellent reputation, is currently investing within their IT Security team. As part of this investment, they are looking to hire an IT Security Manager to head up their IT Security function.

Working closely with the Head of IT you will have responsibility for all things IT Security within the business. You will be responsible for scoping, implementing, monitoring, and maintaining IT security systems, you will be able to ensure compliance standards, strategy and reporting is carried out across all parts of the group. You will be supporting the IT team and the business by being a trusted advisor in all aspects of IT security and IT compliance. Responsible for delivery of pragmatic, high quality, secure, cost-effective security solutions.

Key responsibilities

Ensure IT Security meets the standards required by the business. Ensure IT Security systems are secure and fit for purpose. In Conjunction with the Head of Technology, set objectives, establish priorities and develop plans. Prepare and present proposals and benefits cases as working documents for senior management review on a monthly ongoing basis within an annual planning horizon. Implement approved proposals, managing functional input, where appropriate. Scope, implement, monitor and maintain IT Security systems. Support the wider IT team, and the business, by being a trusted advisor for all IT security and IT compliance matters. Perform due diligence and sign-off for all IT Security and Compliance related matters. IT Security patching strategy, reporting and compliance. Ensure IT Security and compliance systems are developed and maintained to the highest possible level. Adherence to, and liaison with Group Internal and External Audit requirements and standards. Maintain external IT Security certifications as required by the business. Define the IT Security strategy. Implement and maintain information security policies and procedures. Complete regular vulnerability scanning and required remedial actions. Ownership of the phishing strategy, campaigns, communications and remedial actions. Create and maintain appropriate documentation and standards. Maintain third-party vendor, hardware and software relationships related to IT Security. Ensure quality standards are adhered to by self and fellow members of the team.

Skills and Experience required

Proven background within a similar stand-alone IT Security Management or Lead role. Excellent IT security knowledge. (CISM, NIST, etc) Working knowledge of GDPR and PCI-DSS. Hands-on approach. Excellent team leadership skills (communication, prioritisation, delegation, planning, etc.) Quality of work - Demonstrates a high degree of attention to detail, thoroughness and a methodical approach to work. Works at a pace that matches the requirements of the business and recognises the importance of timely completion of tasks. Communication & interpersonal skills - Ability to listen and understand information. Presents information in a clear and concise manner to both technical and non-technical people. Knows appropriate way of communicating with customers, peers and line managers. Demonstrates respect for all individuals in all forms of communication. Treat people fairly and courteously regardless of background or culture Initiative - Monitors and manages own time to ensure daily, and long-term objectives are met. Develops and improves procedures in agreement with line manager. Accepts additional challenges and responsibilities willingly and assists others. Self-reliance. Captures cross departmental analysis and detailed feedback from the Management team for review. Planning & organisation - Adapts to changes and uses resources effectively. Able to prioritise and execute competing activities and prioritise and delegate effectively. Budgetary competence. Demonstrable knowledge of the operational ITIL Service Management framework. Experience developing solutions based on best of breed products. Key vendor and/or relevant industry standard qualifications eg CISSP, CISM, Comptia Security (desirable)

For more information or to apply please send a copy of your CV to (see below)

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.