Royal Mail
,
Chesterfield, Derbyshire
Information Security Advisor
|
Job Type: Full-time |
---|
Overview
Job reference number 119540 Information Security Advisor Full time Permanent Rowland Hill House We have an exciting new role for an Information Security Adviser based up in our Chesterfield office. Information Security Adviser – Cyber Security Job Purpose RMG Cyber Security Operations primary functions are to protect information assets and detect, analyse and respond to security information and events. In support of these objectives RMG Security Operations are looking to augment their existing team through the addition of an Information Security Adviser. Your role will be to support the Information Security Lead and provide credible information security advice and guidance to projects, suppliers and business stakeholders within RMG. You may also be required to support the development of security architectures and patterns, policies, standards and participation in governance and decision-making forums. As directed by Cybersecurity leadership, this may include: Providing cybersecurity advice and concurrence to IT projects Conducting threat modelling and security impact assessments Specifying high level and detailed security requirements Reviewing conceptual, logical and physical solution designs Requesting and supporting vulnerability assessments and risk remediation Supporting evaluation of technology products and proposals Key Accountabilities Strategic Focus . Support the Information Security Leads in providing the subject-matter knowledge and contribute to the delivery of projects and workstreams in support of business change projects and ensure that risks are identified and managed in line with the Board’s Risk appetite. Stakeholder management . Able to support the Information Security Leads in the engagement and influence of stakeholders across the business with the ability to explain complex issues in simple language, and to lead the adoption of secure technologies. When a Security Lead is not available the advisor may be expected to engage stakeholders directly. Support the provision of subject matter knowledge and advice to RMG stakeholders on updates to policy, standards, and processes for information security and protection, to align with organisational priorities and risk appetite. Supply chain assurance . Able to advise on and manage SaaS and PaaS contracts and to support the incorporation of these seamlessly into RMG’s own capabilities. The role holder will support the Information Security leads in the provision of key support to others’ procurement activities as part of change programmes or BAU. Effective Security Advice . The role holder will ensure that RMG projects and programmes receive timely, accurate and pragmatic security advice in support of the Information Security Lead that positions security as a business enabler not a compliance function. Ability to innovate. This role requires creative thinking that can lead the development of security solutions which leverage vendor, opensource and RMG developed technology applications and infrastructure. This needs to be done in sympathy with agreed budgets and timelines. Participate in the management of security technologies and processes in support of RMG risk management. Commercial awareness. The role holder must use their professional curiosity to build an understanding of RMG’s revenue generating business lines and their supporting functions and contribute to development and implementation of appropriate security in support of their business goals. Key dimensions Influencing Skills and judgement . Good influencing skills to build trust and confidence at all levels in the Group and using judgement to make risk-based recommendations and decisions within parameters, both to the Information Security Leads and at times direct to Business Units. Analytical Skills . Good analytical skills and the ability to see the big picture and apply the relevant detail to it. Ability to cut through the noise and provide clear and appropriate recommendations in support of business goals, both to the Information Security Leads and at times direct to Business Units. Communications Skills . Demonstrable ability to clearly represent the security implications of technology and its adoption to the business in both verbal, written, and presentational form and to make recommendations for action that enable Business Units to take good informed decisions Clear ability to innovate and tailor messaging and delivery methods for different audiences and to support the communications of the Information Security Lead. Commercial empathy . Able to understand the business and empathise with its objectives so that Security measures are reinforcing business aims and user experience, not running counter to them. The role holder must be able to do this without going native as they will be required to overcome inertia and resistance to change. Technical expertise . The role holder must be credible in terms of technical knowledge. This does not need to be deep technical or significant developer experience, but sufficient to engage in detailed discussions and coordinate the work of team members with greater specialist knowledge. The role holder must be able support RMG towards a SecDevOps environment in tandem with the CTO’s drive towards a greater DevOps capability. Key competencies: Good knowledge of Cybersecurity practices within a commercial environment. Good knowledge and understanding of technology procurement and vendor technologies. Sound understanding of Software development practices and Secure Development Lifecycle (SDLC). Demonstrable experience of providing security advice in complex business environment. Demonstrable understanding of current and emerging technologies and their security features, together with experience of securing legacy systems approaching end of life. Working knowledge of data management, data security and the demands of GDPR and the UK Data Protection Act. Willingness to learn and develop, together with the patience and resilience to overcome change inertia. The will to succeed in support of the business’ goals and to align potentially competing agendas to effectively manage Cybersecurity risk within the business risk appetite. Qualifications: Any recognized security related qualifications would be an advantage if already