Information Security Consultant

Mortimer Spinks
London (Greater)
10 Jan 2018
08 Feb 2018
Contract Type
Full Time

My client is a one of the largest Global shipping and logisitcs companies in the world. Join their IT Security Team developing and implementing the organisation's comprehensive information security program. The Security Analyst will work with the IT department to select and deploy technical controls to meet specific security requirements and define processes and standards to ensure that security configurations are maintained.

The successful candidate will need at least 2 years IT security experience developing, documenting and maintaining security policies, processes, procedures and standards as well as a strong knowledge of network infrastructure, including routers, switches, firewalls, and the associated network protocols and concepts. You will also need:

Demonstrable experience of organisational skills and team coordination

Some appropriate technical certification such as CESG Certified Professional (CCP), CompTIA Security+ Certification, ISC2 Systems Certified Information Systems Security Professional (CISSP), ISACA Certified Information Security Manager (CISM) or Cisco Cyber Security Specialist

In-depth knowledge and understanding of information risk concepts and principles, as a means of relating business needs to security controls.

Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project plans.

Experience with common information security management frameworks, such as [International Organization for Standardization (ISO) 2700x and the ITIL, COBIT and National Institute of Standards and Technology (NIST)] frameworks.

Knowledge of the fundamentals of project management.

In-depth knowledge of risk assessment methods and technologies.

Proficiency in performing risk, business impact, control and vulnerability assessments.

4 to 6 years of combined IT and security work experience with a broad range of exposure to systems analysis, application development, database design and administration.

The main requirement for the successful applicant is that you can demonstrate a knowledge and appreciation of the current IT threats and security measures available. This will require a combination of good business awareness and technical IT knowledge or experience.

Immediate Interviews
This job was originally posted as