Third-Party Oversight and Information Security Specialist | Southampton, UK

Quilter
Southampton
4 days ago
Create job alert

Third-Party Oversight and Information Security Specialist

Fixed Term Contract Duration - 11 Months

About the Business
Quilter plc is a leading provider of financial advice, investments and wealth management, committed to being the UK's best wealth manager for clients and their advisers. Quilter oversees £116.2 billion in customer investments (as 30 September 2024). It has an adviser and customer offering spanning financial advice, investment platforms, multi-asset investment solutions, and discretionary fund management. The business is comprised of two segments: Affluent and High Net Worth.

Affluent encompasses the financial planning business, Quilter Financial Planning, the Quilter Investment Platform and Quilter Investors, the multi-asset investment solutions business. High Net Worth includes the discretionary fund management business, Quilter Cheviot, together with Quilter Cheviot Financial Planning. At Quilter we never stand still. Our foundations are rooted in our extraordinary expertise, which is trusted by hundreds of thousands of customers, but we have great ambitions to stay one step ahead and make an even greater difference to the people and communities we serve.

Our business is transforming, continually modernising, and becoming even more customer centric. So, if you want to be bold in the pursuit of your ambitions, bring new ideas, and challenge and evolve what we do, it's the perfect time to join us!

About the Role
Level:Level 4
Department:Procurement
Location:London/ Southampton
Contract type:12 month FTC
Helping Quilter to keep our customers', colleagues', and organisation's data secure, by ensuring our technology, business processes and controls are secure by default and design.

Responsible for assessing supplier due diligence responses and assurance information, the role plays a key part in ensuring data and information security risks are identified correctly and effectively, and assessed in line with Quilter's practices, policies and standards, to help Quilter effectively manage the risk profile of its supply chain.

You will predominantly focus on assessing data and information security risks as part of an accelerated due diligence programme for a designated cohort of our third parties, and additionally, activities will extend to include the application of expertise, production of assessments and recommendations, and taking the lead on driving subsequent actions for a broader range of third parties.

Key responsibilities will include:

  • Assess the information security profile of third parties, identifying and assessing potential threats, evaluating their security posture, and driving forward actions to help mitigate information security risks.
  • Lead information and data security due diligence reviews of suppliers and risk identification by assessing their associated policies, standards and controls.
  • Use the in-house defined third-party assurance framework to carry out proportionate assurance assessments for in-scope suppliers, depending on the service they are providing and the risk posed by a security controls failure.
  • Identify key controls to request and review evidence, form conclusions and recommendations in respect of the adequacy of the third party's controls, including their design, quality, effectiveness and resilience.
  • Lead meetings with third party stakeholders, to ensure evidence received is appropriate, to the required standards, understood, and applicable to the service provision. Identify alternative evidence requirements if needed.
  • Document and report acceptable controls, and highlight any potential exceptions identified. Communicate exceptions to key internal stakeholders, articulating the risk to the business and the potential impacts if these remain unremedied.
  • Make recommendations to stakeholders to ensure data and information security risks remain robustly managed, including identification of any compensating controls where exceptions have been identified.
  • Support additional activities, as required, to help the Third-Party Management team solve complex issues, drive audit actions or specific investigations, which may rely on risk domain subject matter expertise; provide technical input, specialist guidance and recommend effective solutions.
  • Work closely with the Information Security, Data and Technology teams to ensure frameworks, standards and processes are understood and consistently followed in the assessment of due diligence and assurance assessment outcomes.

About You

  • Demonstratable experience gained in a data and/or information security assurance or similar role.
  • Experience of evaluating the broader risks that could be borne through third-party suppliers.
  • Demonstratable experience leading data and information security due diligence assessments and formulating consistent conclusions.
  • Knowledge of the different types of controls that can be deployed to manage third-party security risks.
  • Knowledge of key assurance certifications and assurance reports used in Information Security (e.g. ISAE3402, ISO27001, SOC2 reports etc.).
  • A good understanding of Data Protection regulations and the broader third-party management lifecycle will be highly advantageous.
  • Strong communication and effective stakeholder management skills.
  • Excellent organisation and planning skills.
  • Prior experience in the financial services sector, particularly within wealth management or investment management, in a similar role, would be highly advantageous.

Inclusion & Diversity
We value diversity and strive to promote inclusivity in all aspects of our culture. We believe in equal opportunities for all, ensuring that no applicant encounters less favourable treatment based on anything but their skills, qualifications, experience, and potential. We celebrate the unique contributions of a diverse workforce and create a respectful, nurturing environment where every colleague can thrive.

Values

Do the right thing:We act with integrity and are proudly committed to going above and beyond in service of our clients and the support we provide our communities.
Always curious:We continuously seek new ideas and knowledge so we're one step ahead of our clients' needs. We look for inspiration everywhere and encourage experimentation, recognising that this is how we create brilliant solutions for brighter futures.
Embrace challenge:We aim high to transform our potential into meaningful outcomes. With ambition as our driving force and a steadfast commitment to growth, we succeed for the good of every generation.
Stronger together:Combining our diverse talents, we accomplish more collectively than we ever could do alone. We speak openly, actively listen, and support each other, and constructively challenge and embrace new ideas. We seek empowerment and demonstrate ownership and trust, with the confidence to make impactful decisions.

Core Benefits

Holiday:182 hours (26 days)
Quilter Incentive Scheme:All employees are eligible to participate in incentive scheme, to incentivise business performance and their contribution.
Pension Scheme:A non-contributory company pension scheme that can be boosted through personal contributions.
Healthcare Cash Plan:Jersey employees only.
Benefit Allowance:A cash benefit allowance is payable in lieu of some of our core benefits.
In addition to our core benefits, we offer a range of flexible benefits to UK employees that you can choose from and pay for conveniently via a salary deduction.

#J-18808-Ljbffr

Related Jobs

View all jobs

Service Engineering Team Lead

Operational Technology Engineer - Cybersecurity

Head of IT

Senior Solutions Architect

IT Director

IT Director

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.

Cyber Security Programming Languages for Job Seekers: Which Should You Learn First to Launch Your Security Career?

Cyber security has become a top priority for companies of all sizes, public institutions, and governments. As cyber threats evolve—from sophisticated ransomware attacks to large-scale data breaches—employers are eager to recruit talent with the skills to detect, prevent, and respond to security incidents. If you’re exploring roles on www.cybersecurityjobs.tech, a key question inevitably arises: Which programming language should you learn first for a career in cybersecurity? Cyber security is a multifaceted domain encompassing network security, application security, reverse engineering, digital forensics, ethical hacking (penetration testing), and more. Each niche may have unique language preferences—like Python for scripting tasks, C/C++ for exploit development, or Rust for building secure low-level tools. In this article, we’ll: Highlight the top programming languages used across cyber security. Break down pros, cons, and key use cases for each language. Present a simple beginner’s project for hands-on learning. Share essential resources and tips, so you can stand out in the competitive cybersecurity job market.

UK Visa & Work Permits Explained: Your Essential Guide for International Cyber Security Talent

Cyber security is one of the fastest-growing fields in today’s digital age. As cyber threats proliferate—ranging from data breaches and ransomware attacks to sophisticated nation-state incursions—organisations worldwide are investing more than ever to protect their systems, networks, and customer data. The United Kingdom, in particular, is emerging as a hub for advanced cyber defence, AI-driven threat detection, and compliance consulting. For international cyber security professionals, the UK offers a wealth of career opportunities, spanning financial services, government contracts, tech start-ups, and global corporations. However, stepping into the UK’s cyber security job market requires a clear understanding of the country’s visa and work permit processes. If you are an international candidate with expertise in areas like intrusion detection, penetration testing, or security architecture, navigating these immigration pathways can be daunting. This article aims to demystify the visa process—highlighting key routes, eligibility criteria, and practical tips—to help you seamlessly transition into the British cyber security ecosystem.