Chief Information Security Officer

Chief Information Security Officer United Kingdom

UTMOST WEALTH SOLUTIONS
Full Time United Kingdom 10.56 - 12.04 GBP Today
Job description

Job Title Chief Information Security

Officer (CISO)

Reports to Chief Technology Officer

Operating Group Information Security Location Isle of Man, Guernsey, Ireland

(Dublin / Navan), UK (Southampton),

home based

Job Purpose

The Chief Information Security Officer (CISO) is responsible for the long-term strategic management of

Utmost’s information security technology and governance according to the Information Security

Management System (ISMS) framework. The CISO is expected to define, develop, and maintain a

business-aligned Information and Cyber Security strategy and operating model for the ongoing

protection of computer networks and information.

You will be a strategic and lateral thinker with exceptional leadership credentials and a sophisticated

approach to stakeholder and supplier management (ideally within the finance sector).

The role requires:

a good overall understanding of the business and the jurisdictions in which we operate; the applicable

legal and regulatory obligations (in particular data protection requirements); a thorough understanding

of the technology underpinning Utmost’s IT systems; and a broad, up-to-date knowledge of information

security frameworks, vulnerability management, incident management and response, secure

development techniques and approaches, Cyber Security engineering and operations, and

management and governance of Cyber risk and Cyber Security.

Key Responsibilities include: 

Information Security Strategic leadership 

Governance & standard development and monitoring 

Security Incident Management 

Cyber Risk management 

Driving Information Security awareness

Main tasks and responsibilities Key Performance Indicators

Security incident Management 

Ownership and management of the Information Security

Incident Management Process. Manage incidents and

their follow-up actions, agreeing the required actions and

ensuring that all required actions are carried out as

required. 

Manage the documentation of policies, procedures,

security guidelines and runbooks to assist in the timely

resolution of Security Incidents. 

Assist with development of relevant BCP plans for IT and

business from a security perspective. 

Ensure that the business

process documentation

created as part of the ISMS

creation is maintained as and

when processes change. 

Security Incidents managed

and closed out as required 

Escalation of incidents within

agreed timeframes 

Adequate and robust testing

of BCP plans 

Ensure all new

implementations are included

in BCP plans/solution

Cyber Risk 

Oversight, management, and reporting on all risks

pertaining to information security, including all forms of

cyber risk and all risks relating to the protection of personal

data throughout the businesses in all locations. 

Developing and monitoring Key Risk Indicators (KRI) and

Key Performance Indicators (KPI), relating to the information

security controls of the businesses. 

Assist in the ongoing assessment of risk to the security of

information, assets, and personnel. 

Assist in management of cyber risk including risk reviews and

mitigation planning. 

Risk assessments carried out to

standard, to agreed schedule,

and as required. 

Ensure complete and

accurate risk register in place

and monitored

Governance / Standards 

Assist with the initial certification and ongoing adoption of

NIST framework. 

Develop and maintain information security documentation

to agreed standards. 

Facilitation of external information security audits,

management reviews and internal information security

audits. 

Define and manage the monitoring of key measures of ISMS

performance. 

NIST alignment and

accreditation 

Documentation that meets

standards and drives

processes. 

Audits progressed smoothly

and with least disruption to the

business as possible. 

All agreed security KPIs

(Including security controls)

monitored and reported as

required.

Information Security Strategic leadership 

Drive and coordinate the management of security through

the sharing of ideas between key security players; the

monitoring of threats and subsequent identification of

opportunities for improvement; and the on-going

monitoring of security activity (e.g., penetration testing

actions) to meet targets; and drive and manage the

development of information security to ensure approaches,

techniques and tools continue to meet needs. 

Ensure that the team become an active part of projects at

an early stage to ensure that all projects take information

security into account; and to carry out - or oversee -

information security risk assessments and ensure that the

results are acted upon. 

Provide training, coaching and internal consultancy to the

business at all levels in relation to the Information Security

Management System, the NIST framework and a wide

variety of IT controls and information security controls, and

in respect of new and evolving IT standards, cyber risks, and

information security issues. 

Authorise the release of system changes into production

environments according to agreed parameters and

processes. 

Provide information security guidance to IT team as part of

project and software development lifecycles. 

Perform regular internal and external security audits and

testing including penetration testing. 

Sharing of security ideas

actively promoted. 

Audit actions (inc. penetration

tests) managed and followed-

up in a timely fashion. 

Applicable threats identified

and actioned within agreed

timescales. 

Ongoing measurable

improvements to approaches

implemented to ensure

information security is

maintained long term. 

Guidance in security risk

assessments provided and

carried out as required. 

Corrective changes

documented and agreed

based on risk assessments and

carried out to plan. 

Change releases checked

and authorised as required

and in a timely manner. 

Project Security Risk

Assessments carried out as

required.

Information Security Awareness 

Assist in the development and delivery of training,

education, and initiatives to promote security awareness

throughout the businesses. 

Broad and effective staff

security awareness delivered

through various media and

judged to be effective.

Cyber Risk Management

Preparation, management, and reporting of the

Information Security Risk Assessment in conjunction with the

overall Business Operational Risk Assessment. 

Reporting on Key Risk Indicators and Key Performance

Indicators. 

Provide IT and information security control risk input into

projects from inception.  

Contributing to the creation

of a culture of risk awareness

and the highest standards of

corporate governance.

Preparation, management,

and reporting of the

Information Security Risk

Assessment in conjunction

with the overall Business

Operational Risk Assessment. 

Assess operational risks

associated with day-to-day

activities and implement risk

mitigation controls as

necessary. 

Ensure operational risk events

are reported on a timely

basis and risk event actions

are completed within

agreed timelines.

Customer Management  Maintain effective relations

with all key stakeholders

across company. 

Commits to exceeding expectations and needs to

internal/external customers, possesses “customer first” mind

set. 

Ensures that work is accurate and well presented, that

customer care is given priority above all else and that effort

is made to exceed the minimum standard required in all

areas. 

Shows concern for detail no matter how small. 

Takes a pride in doing a job well.  

Quality and timeliness of

communication updates to

all relevant parties.

Appropriate service is

delivered at all times, across

all business lines and

feedback is sought from key

stakeholders to fully assess

the service quality.

Culture 

Is a role model in

demonstrating the

behaviours and culture

across the organization. 

Represents company

strategy and commercial

decisions in a proactive and

positive manner. 

Leads by example, to

motivate and assist with

managing change across

the organization

Knowledge, Skills, and Behaviours

Essential or Desirable

Knowledge    

, Experience or qualifications

At least 8 years’ experience in Information Security, and

experience in people and IT management.

Experience in security tools, technology, and

architecture.

Management experience that encompasses information systems

or information security experience.

Relevant certification is preferred (ISO27001 or NIST lead auditor,

CISSP, CISM, CRISC, CCRO) along with following experience: 

NIST implementation 

Internal audit knowledge 

Risk analysis – systems/projects/changes 

Security technical knowledge / skills 

Information Systems such as Active

Directory, VMware, Firewalls, Network,

Storage, QRadar/SIEM 

IT hardware, software, process appreciation

Essential

Essential

Essential

Preferred

Skills    

Process mapping and data analysis skills.

Analytical skills – Interprets quantitative and qualitative

information to achieve objective and produces effective

solutions to problems.

Ability to work within tight deadlines and deliver solutions within

defined time periods.

Experience working in a complex operational environment.

Essential

Essential

Essential

Essential

Effective verbal and written communication skills and strong

interpersonal skills, good at reporting.

Behaviours 

Cooperative, flexible, adaptable, and persistent. 

Diligence - Being careful about detail and thorough in completing

work 

Integrity - Being honest and ethical 

Must be willing to travel occasionally between offices in all Utmost

territories where required (infrequent)

Essential

Essential

Essential

If you would like to apply for this role, please send your cover letter and CV to

[email protected]

Utmost Group is an equal opportunities employer

Chief Information Security Officer
UTMOST WEALTH SOLUTIONS

utmostgroup.co.uk
London, United Kingdom
Paul Thompson
Unknown / Non-Applicable
Unknown
Company - Private
Insurance Carriers
Insurance
Related Jobs

All Related Listed jobs

Repair Engineering Apprentice- Sheffield / Doncaster / Rotherham
Cadent Gas Sheffield, England 21028 GBP ANNUAL Today

Hold a valid full UK car driving licence or be willing to obtain one by the start of programme. 2 paid volunteering days per year.

Assembly Operative
gap personnel Thorne, England 10 GBP HOURLY Today

Working at within this busy manufacturing supplier of bespoke items, you will be assembling products working on a three-shift rotational shift pattern.

Night Receptionist
Cotswold Lodge Hotel Oxford, England 23400 GBP Today

Duties will include but not limited to some reception duties, serving in the bar, preparing and delivering any room service orders and light cleaning as

Executive Assistant/Operations Manager
Joss Search London, England 50000 - 70000 GBP ANNUAL Today

Organising international travel and coordinating calls with clients/investors. Drafting emails on Founders behalf. Connect Managing Partner to Board members.

Manual Turner
Precision 2000 Ltd Gateshead, England 14 - 16.5 GBP HOURLY Today

Company Benefits: Company Pension Scheme, 25 Days Holiday + Public Bank Holidays, overtime paid at an enhanced rate and a yearly bonus.