Senior Policy Administrator

City of London
3 weeks ago
Create job alert

The Role

We are transforming our Information Security program from a compliance-based checklist to a dynamic, risk-based operation. We are looking for a Senior Policy Administrator to lead the modernization of our governance framework.This is not a clerical role. You will not just be formatting Word documents. You will be a strategic partner to our Security Architecture and Engineering teams, translating complex technical controls (Cloud Security, Identity, Zero Trust) into clear, enforceable standards. You will serve as the bridge between "What the Framework says" (NIST/TPN) and "What the Architecture does."Key Responsibilities1. Governance Framework Architecture

Build the Engine: Design and maintain the comprehensive hierarchy of Information Security documents (Policy \toStandard \toProcedure \to Guideline). Ensure the framework is scalable, searchable, and mapped to the NIST CSF 2.0 and ISO 27001 controls.

Lifecycle Management: Move beyond "annual reviews." Implement a continuous review cycle triggered by architectural changes or emerging threats, ensuring our standards never drift from reality.

2. Security Architecture Collaboration (Critical)

Technical Translation: Work side-by-side with Principal Security Architects to extract technical specifications (e.g., encryption algorithms, IAM protocols, cloud hardening baselines) and codify them into formal Security Standards.

Reality Checks: Challenge the status quo. If a proposed policy cannot be technically enforced by the Architecture team, you are responsible for flagging the gap and negotiating a realistic control or a formal risk exception.

Baseline Management: Assist Engineering in defining and documenting "Golden Image" and secure configuration baselines (CIS Benchmarks) that underpin the broader policy statements.

3. LogicGate & Tooling Administration

Platform Architect: Serve as the primary architect for our LogicGate Risk Cloud Policy Module. You will design the metadata schema, automated workflows, and approval routing logic.

Automated Assurance: Configure the tool to link Policies directly to Risks and Controls. When a Standard is updated, the tool should automatically flag related Risks for re-evaluation.

4. Compliance & TPN Alignment

TPN "Gold Shield": Ensure all policies meet the strict physical and digital security requirements of the Trusted Partner Network (TPN). You will be the authority on whether a policy change jeopardizes our "Gold Shield" status.

Audit Defense: Maintain a "state of readiness" where policies are tagged with evidence requirements, allowing for rapid export during client or regulatory audits.

Qualifications

Required Experience:

Experience: 5-8+ years in Information Security, GRC, or Technical Writing in a highly regulated technical environment.

Frameworks: Expert-level knowledge of NIST CSF 2.0, ISO 27001, and NIST 800-53. Familiarity with TPN (MPA) or SOC 2 is highly preferred.

Technical Fluency: You do not need to be a coder, but you must understand core security concepts (e.g., SAML  Container Security, Network Segmentation) well enough to debate standards with Engineers.

Skills & Competencies:

LogicGate / GRC Tools: Proven experience configuring and managing enterprise GRC platforms (LogicGate, ServiceNow, Archer, OneTrust).

Strategic Autonomy: Ability to manage the entire document lifecycle without micromanagement. You can sit in an Architecture Review Board meeting and identify policy impacts in real-time.

Communication: Exceptional written communication skills with the ability to strip away "legalese" and write policies that developers can actually read and follow.

Nice-to-Have:

Certifications: CISA, CRISC, CISM, or CISSP.

Experience in the Video Game, Media, or Software Development industries.

Why This Role?

You will be the "Legislator" of our security state. Instead of chasing signatures, you will be defining the rules of the road for a global creative organization. If you are tired of "paper compliance" and want to build a governance framework that actually improves security posture, this is the role for you

Related Jobs

View all jobs

Azure System Administrator

It Support

Senior SOC Engineer

Cloud Infrastructure Manager

Cybersecurity Analyst/Engineer

Senior Analogue and Digital Electronic Design Engineer

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Penetration Tester Jobs in the UK: What Employers Actually Want in 2026

The demand for skilled professionals in cyber security has never been higher, and penetration testers sit at the very heart of this rapidly evolving industry. As organisations across the UK continue to digitise their operations, protect sensitive data, and defend against increasingly sophisticated threats, the need for ethical hackers has grown dramatically. If you are considering a career in this field—or looking to advance within it—it is essential to understand what employers are really looking for in 2026. This guide breaks down the current expectations, required skills, certifications, and practical experience that can help you stand out in a competitive job market.

SOC Analyst Jobs UK 2026: Salaries, Skills & How to Get Hired

Cyber security is one of the UK's fastest-growing career paths — and SOC analyst is where most people begin. It's in high demand, genuinely accessible, and you don't need a degree or years of experience to get started. But knowing what UK employers actually want in 2026 — what they pay, which certs matter, and how to stand out — is a different matter. This guide covers all of it.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.