Tech&Security Oversight Manager

Syncron
Birmingham
3 weeks ago
Applications closed

Related Jobs

View all jobs

TRE (Trusted Research Environment) Information Governance Manager

Information Security Officer

Compliance Officer

security architecture & engineering director

Security Architect

Senior Product Security Engineer - Systematic Hedge Fund - £250k

Syncronis a leading SaaS company with over 20 years of experience, specializing in aftermarket solutions. Our Service Lifecycle Management Platform offers domain-fit solutions for:

  • Supply Chain optimization,
  • Pricing strategy,
  • Service Fulfillment (e.g. warranty management, field service management, service parts management, knowledge management).

Our company has aglobal presencewith offices in US, UK, Germany, France, Italy, Japan, Poland, India and group headquarters in Sweden.

We build upon the belief that our greatest strength is our People. Our uniquecompany culturehas beenappreciated by our Employees.

With this we arewinning the hearts and minds of world-leading organizations, such as JCB, Kubota, Electrolux, Toyota, Renault and Hitachi.

About the role

Syncron is looking for a highly motivated and experiencedTech&Security Oversight Manager with a focus onInformation Security. In this role, you will be responsible for conducting independent reviews of our information security management processes, ensuring compliance, and driving continuous improvement in our security practices. This function is envisioned to work synergistically with the existing Information Security team, and periodically provide feedback and suggestions for improvement of ongoing information security initiatives.  

This is atemporary, 6-month part-time position(approximately 25 hours per week), offering flexibility while providing valuable experience.

What would you do?

  • Conduct Internal Audits:Lead periodic audits of Syncron’s information security policies, processes, and technologies to assess effectiveness and compliance.
  • Evaluate & Improve Controls:Review existing security controls and recommend enhancements to meet regulatory and business requirements.
  • Drive Corrective Actions:Identify non-conformities in the ISMS and propose corrective measures.
  • Support External Audits:Collaborate with external auditors, provide documentation, and ensure comprehensive audit coverage.
  • Enhance Security Practices:Continuously monitor, review, and improve the ISMS to align with industry standards.
  • Report Findings:Present audit results and recommendations to management and the Information Security team.
  • Stay Informed:Keep up with evolving audit methodologies, cybersecurity trends, and regulatory changes.
  • Maintain Audit Documentation:Ensure clear, organized, and accessible audit records.
  • Collaborate Across Teams:Partner with key departments to assess technology, business processes, and security measures.

What we expect:

  • Experience: 3+ years of internal auditing experience, with a focus on information security, preferably in an international environment. Prior experience in auditing complex information security systems and frameworks (e.g., ISO 27001, NIST, SOC) is essential. 
  • Education: Bachelor’s degree in Information Technology, Cybersecurity, or a related field. Relevant certifications (e.g., CISA, CISSP, ISO 27001 Lead Auditor) are highly appreciated. 
  • Knowledge: Deep understanding and ability to critically review the implementation of general Information Security Standards such as NIST and ISO 27001, and ideally industry-specific Security Standards (e.g. TISAX, DCSO CVA). Knowledge of fundamental concepts and principles related to security in cloud-native environments. 
  • Independence: Proven track record of conducting independent audits, with an understanding of the need for objectivity and integrity in reporting. 
  • Analytical Skills: Strong ability to assess risks, identify control weaknesses, and propose effective solutions. 
  • Communication: Ability to develop strong relationships and trust with stakeholders and other team members. Excellent verbal and written communication skills in English. Multilingual proficiency is meritorious, if you also speak Swedish, it is an asset but not a requirement. 

We offer:

As this role is open across the Europe region, perks and benefits may vary depending on location. More information will be provided during your initial call with the Talent Acquisition Partner.

Unsureif you meet all the job requirements but passionate about the role?Apply anyway!Syncron values diversity and welcomes all Candidates,eventhose with non-traditional backgrounds. We believe in transferable skills and a shared passion for success!

#LI-SYNCRON
#LI-Remote

#Mid-Snr

#Temp

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

10 Must-Read Cyber Security Books for UK Professionals: Boost Your Career and Stay Ahead of Threats

With rapid advancements in digital infrastructure, cloud computing, and the Internet of Things (IoT), cyber threats continue to evolve at lightning speed. For organisations across the UK—and globally—robust cyber security is no longer optional: It’s a strategic imperative. From healthcare and finance to government agencies and tech start-ups, every sector needs skilled professionals to safeguard critical data and protect users. If you’re looking to break into or advance within the cyber security industry, staying updated on the latest techniques, threat landscapes, and defence strategies is paramount. One of the best ways to build and sharpen your expertise is by reading authoritative, high-quality books that combine foundational knowledge with cutting-edge insights. In this guide, we’ve compiled a list of ten books that cater to various skill levels, spanning ethical hacking and threat intelligence to secure software development and cryptography. By diving into these resources, you’ll fortify your understanding of cyber security fundamentals, explore hands-on techniques for defending systems, and gain the strategic perspective needed to excel in roles throughout the UK’s thriving cyber security landscape.

Navigating Cybersecurity Career Fairs Like a Pro: Preparing Your Pitch, Questions to Ask, and Follow-Up Strategies to Stand Out

In a world where digital threats are escalating and online infrastructure underpins nearly every aspect of our personal and professional lives, cybersecurity has swiftly become one of the most sought-after career fields. Demand for skilled cybersecurity professionals outstrips supply, both in the UK and globally. From ethical hackers and penetration testers to governance, risk, and compliance (GRC) specialists, the opportunities are extensive—and lucrative. Amidst this surge in demand, cybersecurity career fairs provide an invaluable chance to meet potential employers face-to-face, gain industry insights, and make connections that can accelerate your career trajectory. Unlike applying to countless jobs online, these events bring companies, security leaders, and aspiring candidates together under one roof. When approached with the right strategy, a single conversation at a cybersecurity fair can open the door to your dream job. In this comprehensive guide, we’ll explore how to prepare thoroughly, engage confidently, and follow up effectively after a cybersecurity career fair. By incorporating these insights into your approach, you’ll stand out from the crowd and maximise your chances of securing the perfect role in this fast-growing field.

Common Pitfalls Cyber Security Job Seekers Face and How to Avoid Them

The cyber security industry in the UK and worldwide is experiencing rapid growth. With cyber attacks growing in sophistication and frequency, organisations are investing more resources than ever into defending their digital assets. From penetration testers and threat analysts to security architects and compliance officers, cyber security professionals are in high demand across a variety of sectors—including finance, healthcare, government, and retail. Yet, in spite of this high demand, the process of landing a cyber security role can be more challenging than many candidates anticipate. The stakes are high: prospective employers entrust cyber professionals with their most sensitive data, their compliance posture, and often their core business operations. Therefore, they’re looking for candidates who can demonstrate not just technical know-how, but also excellent communication, adaptability, and an awareness of the broader business context. In this article, we’ll explore the most common pitfalls that cyber security job seekers face, especially in the UK market, and how to avoid them. Whether you’re a recent graduate, a professional transitioning from a different field, or an experienced practitioner aiming for a senior role, these insights will help you stand out and secure the opportunities that fit your skill set and career goals.