National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Senior Information Security Analyst

London
2 months ago
Applications closed

Related Jobs

View all jobs

Senior Information Security Analyst

Senior Information Security Analyst

IT Security Analyst

Senior Cyber Security Analyst

Senior Cyber Security Analyst

Senior IT Security Analyst (Tech SME)

We are currently supporting Nesta with their search for an Information Security Officer to join their IT function. In this crucial role, you'll be instrumental in ensuring they are compliant with their information security accreditations and our data, systems, and networks are protected from evolving cyber threats.

Nesta are a Charity and an innovation agency for social good. They design, test and scale new solutions to society's biggest problems, changing millions of lives for the better.

The role is hybrid and will require 2 days a week on site in London.

As the Group Information Security Analyst/Officer, you will:

Lead and maintain security accreditations: Successfully manage Cyber Essentials, Cyber Essentials Plus, and ISO 27001 certifications.
Deliver comprehensive training: Develop and deliver engaging training on ISO 27001, cybersecurity awareness, AI, and data protection.
Stay ahead of threats: Continuously monitor and adapt to emerging cybersecurity threats, ensuring robust governance and safeguarding measures.
Manage business continuity: Oversee Business Continuity Planning (BCP) and Disaster Recovery Plans.
Incident management: Act as the technology team's point of contact for legal matters related to information security incidents and actively triage and manage security incidents and breaches.
Risk assessment: Identify, assess, and mitigate information and cybersecurity risks, compliance issues, and vulnerabilities.
Policy development: Create, implement, and enforce information security policies, procedures, and guidelines.
Compliance and communication: Respond to security questionnaires, data protection queries, and liaise with third-party partners and suppliers.
Strategic leadership: Represent the Technology team in developing and implementing group-wide cybersecurity strategies.
Proactive monitoring: Continuously monitor the technology estate to ensure compliance and maintain a strong security posture.
ISMS management: Coordinate the improvement and maintenance of the Information Security Management System (ISMS) in line with ISO 27001 and Cyber Essentials.

Experience Required:

Information Security Management:
Extensive experience in implementing and maintaining ISMS and achieving ISO 27001 certification.
Proven track record managing security accreditations (Cyber Essentials, Cyber Essentials Plus).
Strong expertise in information security risk management, data protection, and compliance frameworks (GDPR).
Technical Expertise:
Solid understanding of IT architecture, organisational governance, and information security principles.
Proficiency in designing and managing control frameworks and using security monitoring tools.
Knowledge of current and emerging cybersecurity threats.
Training and Governance:
Experience delivering cybersecurity and data protection training.
Ability to ensure relevant and timely governance.
Skills:
Excellent problem-solving and communication skills (written and verbal).
Strong organisational and prioritisation abilities.
Ability to translate complex technical information.
Ability to work to tight deadlines

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.