Information Security Analyst

Remote job

Applications have closed

Trilateral Research

Ethical AI solutions to address child exploitation, human security, human trafficking, air quality monitoring, community safeguarding, crisis management, sustainability, information security, ESG, public health and public safety.

View company page

Trilateral Research have a fantastic opportunity for an Information Security Analyst who will be responsible for the operational management, support, maintenance and implementation of all information security policies and procedures for the organisation, both technical and policy-driven.


The preferred candidate must have hands-on experience with security technologies and solutions, have experience performing daily investigations of security incidents, security assessments and audits, have at least 2 years’ experience in cybersecurity, and will be currently serving in a similar position.


They will also have expertise in identity and access management, document management solutions (e.g., SharePoint) and endpoint management solutions, and will preferably have experience with penetration testing and vulnerability assessments.


Our company and what we do

At Trilateral Research we provide ethical AI solutions for tackling complex social issues, from human trafficking and child exploitation, citizen security in crisis to pollution and climate change. We transform research into innovation and sustainable impact​, focusing our efforts where we can enhance societal wellbeing.


We apply rigorous, cutting-edge research when developing and accessing new technologies to ensure they achieve sustainable innovation and measurable impact. Our teams include humanities specialists, social scientists, data scientists, ethical, legal and human rights experts who work across the technology-social disciplinary divide.


What are your responsibilities?

  • Working with stakeholders to identify information security gaps across the organisation
  • Evaluating and proposing appropriate software where required to support the company’s IS stance and implementing against planned timescales and budgets
  • Prioritising requirements with the assistance of the IS board.
  • Working with outsourced IT helpdesk to ensure that all technical requirements are delivered in a timely fashion
  • Collaborate with technical teams to deliver secure, stable and scalable solutions for product growth
  • Evolving and monitoring the Information Security Management System to secure our information system estate.
  • Identifying vulnerabilities within our network infrastructure
  • Performing vulnerability scanning and penetration testing to identity flaws
  • Ensure that organisational assets, including staff devices are protected against security threats.
  • Documenting any security breaches and assessing remedial actions
  • Assisting with investigations into any incidents or breaches and supporting with any associated legal and or disciplinary matters
  • Collaborating with the IS Management Board and ICT support infrastructure to improve security and risk management within the company
  • Contributing to and implementing a business-aligned company Information and Cyber Security operating model
  • Identifying relevant IS standards to complement the business strategy
  • Creating and implementing plans to secure relevant certifications, e.g. Cyber Essentials Plus, Cyber Assured, ISO/IEC:27001 including gap analysis, control selection actions and project management of audits
  • Working with external experts to ensure we are aligning our practices correctly with the relevant frameworks and following best practice at all times
  • Educating colleagues through training interventions about company practice and best practice across the IS framework, throughout the employee life cycle
  • Keeping up to date with IT Security threats and providing advice and guidance to the business as required.
  • Develop appropriate metrics that are designed and utilised to ensure the IS function is meeting business needs as well as the highest standards of quality, legal and regulatory compliance and corporate governance

Requirements

What skills and experience you will bring to the role:

Interpersonal Skills:

  • Strong verbal and written communication and presentation skills, including an ability to effectively communicate with stakeholders across the organisation.
  • Excellent problem-solving and analytical skills.
  • Ability to educate a non-technical audience about various security measures.
  • Strong relationship-building and influencing skills
  • Strong organisational skills


General Knowledge and Technical Skills:

Essential:

  • Project management experience or training
  • Good analytical skills and data driven thinking
  • Excellent attention to detail
  • Experience of working with, configuring and managing SharePoint.
  • Experience of working with and managing security controls for Mac OSX, Windows/Linux.


Desirable:

  • Management of Identity and Access Management solutions (e.g. Active Directory)
  • Configuration and monitoring of Endpoint Management solutions
  • Knowledge and experience with networking concepts, protocols and services.


Education and Experience:

Essential :

  • Bachelor’s degree in information technology, IT systems security or a related field.
  • Professional information security certification.
  • Experience in an Information Security role for 2 years
  • Demonstrable experience in aligning to information security frameworks such as Cyber Essential Plus, CyberAssured or ISO/IEC 27001.


Desirable:

  • Demonstrable knowledge of various information security frameworks.
  • CISSP, CISA, CISM, or similar certification
  • Experience in penetration testing and vulnerability assessments


About us

Our culture is based on delivering high-quality outputs, through our commitment and passion for what we do. We work in an open and collaborative environment where the team culture provides support amongst peers and colleagues. We believe in the strength of a diverse, gender-balanced environment with positive work-life balance, and value the passion and talents of our team.


Find out about our people and culture and see how our mission drives the research projects we take on, the key data protection services we provide, and the technology products and supplementary services we develop, by visiting our website Trilateral Research.


What else do I need to know?
Our compensation package includes:

  • Competitive salary
  • Enhanced holiday entitlement increasing with service
  • Company sick pay and family friendly pay
  • Flexible working hours
  • Remote working/working from home options
  • Enhanced pension scheme based on service
  • Continuous career development


Location: This position is open only to candidates based in the UK or Ireland

Salary: Commensurate with experience

Hours: Full Time (40hrs p/w)

Contract Type: Permanent


How to apply

Please submit both your CV and a cover letter, linking your experience to our requirements in order to have your application considered. References will be required prior to appointment and candidates must be eligible to work in the UK or Ireland.


We are an Equal Opportunities employer and positively encourage applications from suitably qualified and eligible candidates, regardless of their age, sex, race, disability, sexual orientation, gender reassignment, religion or belief, marital/civil partnership status, or pregnancy and maternity. We are a Disability Confident committed and Living Wage employer.


At Trilateral Research, we value privacy and data protection rights. We have a longstanding data protection culture and promote robust ethical standards in data management and research ethics. Please read our Recruitment Privacy Notice in relation to our recruitment activities before submitting your application to work with us.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Active Directory Audits CISA CISM CISSP Compliance Governance IAM Linux Monitoring Pentesting Privacy Risk management Security assessment SharePoint Strategy Vulnerabilities Windows

Perks/benefits: Career development Competitive pay Flex hours Flex vacation Startup environment Team events

Region: Remote/Anywhere
Job stats:  95  15  1
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.