<?xml version="1.0" encoding="utf-8"?><!--RSS Feed Generated by www.firefishsoftware.com - Tue, 28 Apr 2026 14:10:24 GMT.--><rss version="2.0" xmlns:ffAdvert="http://www.firefishsoftware.com/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Information Security Solutions Ltd - Latest Vacancies</title><link>https://www.informationsecuritysolutions.com/</link><atom:link href="https://www.informationsecuritysolutions.com/rss/adverts/latest.aspx" rel="self" type="application/rss+xml" /><description>All of the latest vacancies from Information Security Solutions Ltd.</description><copyright /><language>en-gb</language><pubDate>Tue, 28 Apr 2026 14:10:24 GMT</pubDate><generator>www.firefishsoftware.com</generator><item><title>Head of OT Security</title><description><![CDATA[<div>&nbsp;</div>

<div>
<table class="MsoTableGrid" style="border-collapse:collapse; border:none">
	<tbody>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Title:</span></span></div>
			</td>
			<td style="width:794px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Director of Operational Technology (OT) &amp; Manufacturing Security</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Reference No:</span></span></div>
			</td>
			<td style="width:794px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">2152</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Company:</span></span></div>
			</td>
			<td style="width:794px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">FTSE100</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Location:</span></span></div>
			</td>
			<td style="width:794px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">London &ndash; 3 days in the office (Tuesday -Thursday) plus if required for specific meetings on other 2 days</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Working pattern:</span></span></div>
			</td>
			<td style="width:794px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">This hybrid role is 37.5 hour week Monday &ndash; Friday</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Reports to:</span></span></div>
			</td>
			<td style="width:794px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Group CISO</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Salary:</span></span></div>
			</td>
			<td style="width:794px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&pound;130K - &pound;150K</span></span></div>
			</td>
		</tr>
	</tbody>
</table>
</div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">The Role</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Group Cyber Security Overview</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">The Group Cyber Security team are responsible for ensuring that the cyber risk is managed appropriately across the Group. &nbsp;The cyber strategy has been updated and there is a renewed focus recognising that cyber security needs to be part of the Groups culture and DNA.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">The Group operates a highly federated business model. &nbsp;The cyber strategy has considered the most effective way to build improved cyber capabilities while supporting the effectiveness of this operating model. &nbsp;</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">It&rsquo;s an exciting time to join the Group Cyber Security team &ndash; a time of significant investment. &nbsp;With the adoption of the new strategy, Group Cyber Security will be responsible for setting the cyber standard and measuring compliance to this standard for all businesses within the Group. &nbsp;A multi-year transformation programme has been established to build improved cyber capabilities. &nbsp;This is a diverse programme touching all areas of cyber security. &nbsp;This permanent role will play a key part in shaping and supporting the delivery of the transformation programme, before assuming responsibility for embedding, operating, and continually improving the new initiatives as they transition into business&#8209;as&#8209;usual</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Role Summary</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">As the strategic architect of Manufacturing and OT cyber security future, the Head of Manufacturing and OT Security develops and owns the OT cyber security strategy, shaping a resilient, forward-thinking environment where operational technology and manufacturing plants are safeguarded against evolving threats. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Reporting into the Group CISO, this role sets the strategic vision, defines the security technology roadmap, and establishes robust controls and governance frameworks that empower every division to operate securely and resiliently. &nbsp;By partnering with divisions to drive risk reduction and security improvements and championing regulatory excellence and continuous improvement, this leader will deliver step-change transformation across the global Manufacturing/OT landscape.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Through dynamic collaboration, expert guidance, and charismatic leadership, the Head of Manufacturing and OT Security will inspire teams and stakeholders to elevate security awareness, respond decisively to incidents, and build a legacy of operational resilience that enables the Group to thrive in a rapidly changing digital world.</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Role Responsibilities/Accountabilities</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Key Responsibilities:</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">1. Manufacturing / OT Security Assurance and Culture</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Develop and own the costed Manufacturing and OT cyber security strategy, laying out the vision for Manufacturing and OT resilience and improving the operational resilience of plants from cyber-attacks. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Define the technology roadmap for Manufacturing and OT security, ensuring alignment with business objectives and transformation goals. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Define and uphold standard controls and architecture blueprints for Manufacturing/OT security.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Define, develop, and continuously improve the Manufacturing/OT security operating model, including sourcing appropriate support services. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Manage and assure regulatory compliance with respect to Manufacturing/OT Cyber Security and coordinate the submission of NIS2 requirements, leveraging the GRC and Technical Assurance teams.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Maintain a register of Manufacturing/OT projects relevant to Manufacturing/OT security and assure that security processes are followed and reviewed with system owners.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Establish and run appropriate governance boards for OT and Manufacturing cyber security. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Champion Manufacturing/OT Security Governance within the business area, including risk management, internal governance boards, compliance frameworks, and supply chain. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Champion education and awareness about Manufacturing/OT cyber risks.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Support and champion the Manufacturing/OT step change improvements that are delivered through the GCS Transformation programme.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Collaborate across verticals with the GCS Leadership Team.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">2. Risk Management</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Coordinate and assure delivery of Manufacturing/OT cyber security risk reduction activities, providing assurance to manufacturing security owners that risks are effectively managed. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Review risk assessments for security concerns to ensure quality and identify common gaps.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Partner with divisions to drive risk reduction and security improvements.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Assure Manufacturing/OT security vulnerability intelligence is reviewed, with appropriate responses communicated to stakeholders. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">3. Third Party Management</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ensure relationships with Manufacturing and OT third-party suppliers are managed, with secure connectivity, alignment with the Group security standards, and appropriate risk management in coordination with System Owners.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enable third-party risk and assurance, including supplier assessments, contractual compliance, and secure third-party connectivity. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">4. Incident Response</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Assuring Manufacturing/OT Security Incident Response plans are in place and tested, and the appropriate business division representatives are included in Manufacturing/OT Incident Response Teams.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Be a key member of the Cyber Incident Management Team, assisting in coordination for incident response and ensuring Manufacturing/OT incident response plans are in place, tested, and inclusive of relevant business/division representatives.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">5. Awareness, Training &amp; Leadership</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Raise awareness of Manufacturing/OT security risks and partner with divisions to provide training and build a culture of security.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Champion education and awareness about Manufacturing/OT cyber risks across the group.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Lead and manage the Manufacturing/OT security team, setting clear objectives and fostering a culture of continuous improvement.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Act as a subject matter expert (SME) and trusted advisor to system owners, divisions, and senior stakeholders.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Demonstrate charismatic, all-round leadership to drive change and inspire teams.</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Experience, Knowledge, Skills &amp; Attributes</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 7+ years&rsquo; experience in Manufacturing/OT cyber security within a large, complex organisation.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Deep understanding of OT environments (SCADA, ICS, PLCs, DCS), securing industrial control systems and critical infrastructure, knowledge of OT-specific protocols (Modbus, OPC, DNP3, etc.) and risk assessment and threat modelling for OT systems.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Strong knowledge of cyber security frameworks (ISO 27001, NIST, CIS Controls) and OT security standards such as IEC62443 and NIST 800-82.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Expertise in relevant regulatory compliance such as NIS2 and H&amp;S regulations.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Proven experience developing and implementing enterprise-wide cyber risk management processes.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Professional certifications such as CISSP, CISM, GICSP or ISA/IEC 62443 certificates.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Excellent leadership, communication, and influencing skills.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Excellent collaboration skills with cross-functional teams.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ability to drive cultural change and embed security awareness.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Desirable</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Experience operating within a federated business model.</span></span></div>
]]></description><link>https://www.informationsecuritysolutions.com/job/head-of-ot-security-189.aspx</link><guid>https://www.informationsecuritysolutions.com/job/head-of-ot-security-189.aspx</guid><applyUrl>https://www.informationsecuritysolutions.com/job/head-of-ot-security-189/apply.aspx</applyUrl><pubDate>Mon, 27 Apr 2026 08:15:55 GMT</pubDate><ffAdvert:applyUrl>https://www.informationsecuritysolutions.com/job/head-of-ot-security-189/apply.aspx</ffAdvert:applyUrl><ffAdvert:ReferenceNumber>189</ffAdvert:ReferenceNumber><ffAdvert:Title>Head of OT Security</ffAdvert:Title><ffAdvert:CompanyReferenceNumber>338</ffAdvert:CompanyReferenceNumber><ffAdvert:JobType>Permanent</ffAdvert:JobType><ffAdvert:Discipline>OT Security</ffAdvert:Discipline><ffAdvert:Role>Head of OT Security</ffAdvert:Role><ffAdvert:LocationArea>London</ffAdvert:LocationArea><ffAdvert:Location></ffAdvert:Location><ffAdvert:PostedDate>Mon, 27 Apr 2026 08:15:55 GMT</ffAdvert:PostedDate><ffAdvert:ClosingDate>Mon, 11 May 2026 08:15:55 GMT</ffAdvert:ClosingDate><ffAdvert:Remuneration></ffAdvert:Remuneration><ffAdvert:PostedBy>Iain Sutherland</ffAdvert:PostedBy><ffAdvert:RecruiterEmail>iain@informationsecuritysolutions.com</ffAdvert:RecruiterEmail><ffAdvert:RecruiterDirectDial>020 7887 6090</ffAdvert:RecruiterDirectDial><ffAdvert:MinimumPayment>130000.00</ffAdvert:MinimumPayment><ffAdvert:MaximumPayment>150000.00</ffAdvert:MaximumPayment><ffAdvert:PaymentRate>Per Year</ffAdvert:PaymentRate><ffAdvert:Currency>GBP</ffAdvert:Currency><ffAdvert:Country>UK</ffAdvert:Country></item><item><title>Head of Cyber Security Governance, Risk and Compliance</title><description><![CDATA[<table class="MsoTableGrid" style="border-collapse:collapse; border:none">
	<tbody>
		<tr>
			<td style="width:179px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Title:</span></span></div>
			</td>
			<td style="width:926px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Head of Cyber Security Governance, Risk and Compliance</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:179px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Reference No:</span></span></div>
			</td>
			<td style="width:926px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">2154</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:179px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Company:</span></span></div>
			</td>
			<td style="width:926px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">FTSE100</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:179px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Location:</span></span></div>
			</td>
			<td style="width:926px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">London &ndash; 3 days in the office (Tuesday -Thursday) plus if required for specific meetings on other 2 days</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:179px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Working pattern:</span></span></div>
			</td>
			<td style="width:926px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">This hybrid role is 37.5 hour week Monday &ndash; Friday</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:179px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Reports to:</span></span></div>
			</td>
			<td style="width:926px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Group CISO</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:179px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Salary:</span></span></div>
			</td>
			<td style="width:926px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&pound;110K - &pound;120K</span></span></div>
			</td>
		</tr>
	</tbody>
</table>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">The Role</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Group Cyber Security Overview</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">The Group Cyber Security team are responsible for ensuring that the cyber risk is managed appropriately across the Group.&nbsp; The cyber strategy has been updated and there is a renewed focus recognising that cyber security needs to be part of the Groups culture and DNA.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">The Group operates a highly federated business model.&nbsp; The cyber strategy has considered the most effective way to build improved cyber capabilities while supporting the effectiveness of this operating model.&nbsp; </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">It&rsquo;s an exciting time to join the Group Cyber Security team &ndash; a time of significant investment.&nbsp; With the adoption of the new strategy, Group Cyber Security will be responsible for setting the cyber standard and measuring compliance to this standard for all businesses within the Group.&nbsp; A multi-year transformation programme has been established to build improved cyber capabilities.&nbsp; This is a diverse programme touching all areas of cyber security.&nbsp; This permanent role will play a key part in shaping and supporting the delivery of the transformation programme, before assuming responsibility for embedding, operating, and continually improving the new initiatives as they transition into business&#8209;as&#8209;usual</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Role Summary</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">The Head of Cyber Security Governance, Risk &amp; Compliance (GRC) serves as the driving force behind the Groups vision for world-class cyber resilience and is accountable for defining and advancing the enterprise cyber risk and assurance strategy. This role champions a culture of proactive risk management, robust governance, and unwavering compliance, ensuring that the Group not only meets, but sets the standard for information security across a complex, global business landscape. </span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Through the cultivation of strong partnerships across divisions and leadership, the Head of GRC empowers the organisation to anticipate emerging threats, adapt to regulatory change, and embed security at the core of every decision, enabling the Group to achieve its objectives securely in a rapidly evolving digital world.</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Role Responsibilities/Accountabilities</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Key Responsibilities: </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">1. Governance</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Define and maintain the cyber security governance framework, policies, and standards.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Lead the liaison with divisional GRC roles, supporting the development and maintenance of the GRC operating model and framework. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ensure alignment with the&nbsp; Cyber Standard and global regulatory requirements (e.g., NIS2, GDPR).</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Provide direction on cyber security tooling relating to governance and assurance objectives.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Collaborate with the Technical Assurance team to define and implement metrics and reporting standards for divisions. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Chair governance forums and provide regular reporting to senior leadership and audit committees.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Plan, coordinate and facilitate Security Working Group (SWG) meetings. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Assist in the preparation of board papers and materials for annual reporting and Group level risk management.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">2. Risk Management</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Develop and implement enterprise-wide cyber risk management processes.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Lead risk quantification initiatives by implementing risk quantification methodologies and developing metrics to measure and communicate risk reduction.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Provide assurance that cyber risks are identified, assessed, and mitigated across all divisions.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Maintain and update risk registers, ensuring Group risks are accurately captured, assessed, and managed. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Conduct and oversee risk assessments at Group level in support of all divisions and business units. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Track and manage deviations from policy, including the documentation and approval of exceptions.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Conduct horizon scanning for regulatory changes and emerging cyber security requirements, ensuring the risk landscape is proactively managed.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">3. Compliance &amp; Assurance</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Build and lead the non-automated second line assurance capability to monitor compliance to the Groups cyber standard.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Oversee readiness for internal audits and external regulatory reviews, liaising with internal audit and external bodies to support audit activities, address findings, and drive remediation.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Report monthly on GRC and assurance activities to senior management and divisional stakeholders. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Respond to ad-hoc reporting requests from divisions, business units, and senior management.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">4.&nbsp; Third Party Security </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Develop the strategy for third party cyber security.&nbsp;&nbsp; Deliver a step change in third party security capabilities through the Third Party Management workstream of the cyber transformation programme.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Manage cyber security third-party risk and assurance, at point of contract and through ongoing assurance.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Deliver a demonstrable and measurable reduction in third party cyber security risk.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">5. Strategic Leadership</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Lead the Group Cyber Security GRC function, establishing a robust second line of defence and embedding risk-based decision-making. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Provide strategic direction on GRC initiatives, ensuring continuous improvement and alignment with business objectives whilst supporting the delivery of the cyber transformation programme.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Act as a trusted advisor to the CISO and senior stakeholders on governance and compliance matters.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Influence organisational culture to embed security awareness and risk-based thinking.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Work in partnership and collaborate across verticals with the GCS Leadership Team.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">6. Stakeholder Engagement</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Collaborate with divisional GRC functions, BISOs, legal, finance, and operational teams to ensure integrated risk management.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Represent the Group in external forums and regulatory engagements.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Build and maintain trusted relationships with senior stakeholders, demonstrating a personable and collaborative approach. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ensure positive engagement and communication with all internal and external stakeholders.</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Experience, Knowledge, Skills &amp; Attributes</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Essential</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 7+ yrs experience in governance, risk, and compliance within a large, complex organisation.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Strong knowledge of cyber security frameworks (ISO 27001, NIST, CIS Controls).</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Expertise in regulatory compliance (GDPR, NIS2, SOX).</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Excellent leadership, communication, and influencing skills.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Professional certifications such as CISSP, CISM, CRISC.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Proven experience developing and implementing enterprise-wide cyber risk management processes</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Excellent collaboration skills with cross-functional teams</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Strong relationship-building and communication skills, with a personable and credible approach</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Desirable</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Experience in a federated business model.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Familiarity with risk quantification tools and methodologies.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ability to drive cultural change and embed security awareness.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Experience building a strong relationship with internal audit.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Experience implementing an effective third party security risk management service.</span></span></div>
]]></description><link>https://www.informationsecuritysolutions.com/job/head-of-cyber-security-governance,-risk-and-compliance-191.aspx</link><guid>https://www.informationsecuritysolutions.com/job/head-of-cyber-security-governance,-risk-and-compliance-191.aspx</guid><applyUrl>https://www.informationsecuritysolutions.com/job/head-of-cyber-security-governance,-risk-and-compliance-191/apply.aspx</applyUrl><pubDate>Mon, 27 Apr 2026 08:15:55 GMT</pubDate><ffAdvert:applyUrl>https://www.informationsecuritysolutions.com/job/head-of-cyber-security-governance,-risk-and-compliance-191/apply.aspx</ffAdvert:applyUrl><ffAdvert:ReferenceNumber>191</ffAdvert:ReferenceNumber><ffAdvert:Title>Head of Cyber Security Governance, Risk and Compliance</ffAdvert:Title><ffAdvert:CompanyReferenceNumber>338</ffAdvert:CompanyReferenceNumber><ffAdvert:JobType>Permanent</ffAdvert:JobType><ffAdvert:Discipline>IT/Information/Cyber Security</ffAdvert:Discipline><ffAdvert:Role>Head of GRC</ffAdvert:Role><ffAdvert:LocationArea>London</ffAdvert:LocationArea><ffAdvert:Location></ffAdvert:Location><ffAdvert:PostedDate>Mon, 27 Apr 2026 08:15:55 GMT</ffAdvert:PostedDate><ffAdvert:ClosingDate>Mon, 11 May 2026 08:15:55 GMT</ffAdvert:ClosingDate><ffAdvert:Remuneration></ffAdvert:Remuneration><ffAdvert:PostedBy>Iain Sutherland</ffAdvert:PostedBy><ffAdvert:RecruiterEmail>iain@informationsecuritysolutions.com</ffAdvert:RecruiterEmail><ffAdvert:RecruiterDirectDial>020 7887 6090</ffAdvert:RecruiterDirectDial><ffAdvert:MinimumPayment>110000.00</ffAdvert:MinimumPayment><ffAdvert:MaximumPayment>120000.00</ffAdvert:MaximumPayment><ffAdvert:PaymentRate>Per Year</ffAdvert:PaymentRate><ffAdvert:Currency>GBP</ffAdvert:Currency><ffAdvert:Country>UK</ffAdvert:Country></item><item><title>Director of Group Cyber Security Services</title><description><![CDATA[<div>&nbsp;</div>

<table class="MsoTableGrid" style="border-collapse:collapse; border:none">
	<tbody>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Title:</span></span></div>
			</td>
			<td style="width:822px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Director of Group Cyber Security Services</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Reference No:</span></span></div>
			</td>
			<td style="width:822px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">2153</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Company:</span></span></div>
			</td>
			<td style="width:822px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">FTSE100</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Location:</span></span></div>
			</td>
			<td style="width:822px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">London &ndash; 3 days in the office (Tuesday -Thursday) plus if required for specific meetings on other 2 days</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Working pattern:</span></span></div>
			</td>
			<td style="width:822px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">This hybrid role is 37.5 hour week Monday &ndash; Friday</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Reports to</span></span></div>
			</td>
			<td style="width:822px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Group CISO</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:151px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Salary:</span></span></div>
			</td>
			<td style="width:822px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&pound;140K - &pound;160K</span></span></div>
			</td>
		</tr>
	</tbody>
</table>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">The Role</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Role Summary</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">As the strategic architect of the Group&rsquo;s security services, the Head of Security Services shapes and delivers a unified vision for cyber security across a global, federated enterprise and 85+ businesses grouped into 10 divisions. Reporting into the Group Chief Information Security Officer (CISO), this leader is responsible for overseeing day-to-day operational cyber security capabilities, ensuring robust, efficient, and coordinated first and second line security operations that protect the Group&rsquo;s people, systems, and data from cyber-attacks.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">By setting the direction for security services, championing the adoption of centralised capabilities, and driving continuous innovation, this role ensures that the security operations are robust, adaptive, and future-ready. With oversight of daily technical security functions and a relentless focus on operational excellence, the Head of Security Services builds and empowers high-performing teams to deliver 24/7 threat detection, rapid incident response, and proactive risk management. This includes ownership of security controls, security testing, tech assurance and vulnerability and threat management, and incident response across the organisation.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Collaboration is at the heart of this position. By working across the GCS Leadership Team, with business and technology stakeholders, and with industry experts to align strategy, share intelligence, and drive a single, cohesive approach to security services, this leader ensures the Group not only meets but sets the benchmark for security services in a dynamic digital world. </span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Role Responsibilities/Accountabilities</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Key Responsibilities: </span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Strategic Leadership &amp; Vision</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Establish a costed strategic vision for security services across the Group&rsquo;s global, federated enterprise.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Evangelist for adoption of central services and drives alignment to a single security services vision.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Define, maintain, and regularly review the security services service catalogue and SLAs, clearly articulating what &ldquo;good&rdquo; looks like.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Integrates AI and modernises security operations using latest technologies.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ensure security operations support organisational resilience and disaster recovery objectives.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Collaborate across verticals with the GCS Leadership Team.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Operations &amp; Service Delivery</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Oversee daily operations of technical security functions, working collaboratively with the SOCs to provide 24/7 visibility and threat detection ensuring services are resilient, risk-aware, and aligned with business needs.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Regularly review and modernise SOC processes, technologies, and talent.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Partner with MSSPs and build solid vendor relationships to deliver the security strategy.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Define and collect metrics/KPIs, regularly reporting to leadership on SOC events/incidents and overall effectiveness.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Review metrics at a group level and adjust services strategy accordingly.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Management of the security technology stack and continuous improvement of services.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Incident Response &amp; Threat Management</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Serve as incident commander (including on-call), leading cyber incident response activities.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Lead on cyber incident response activities and contributing to incident management activities by advising on incident identification, assessment, classification, escalation, investigation, mitigation, monitoring and reporting to help ensure cyber incidents are managed in a timely and effectively manner to limit impact.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Drive the development of threat management, threat modelling and identification of new threat vectors by keeping up to date with industry activity and methodology, to help ensure key assets are protected. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Lead threat hunts to proactively discover potential compromises.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Lead and coordinate red teaming, penetration testing, and exercising to assess and enhance the quality of services delivered by SOCs.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Red/purple teaming to ensure standard of services&mdash;testing quality of services delivered by various SOCs.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Exercise incident response capabilities.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Threat Intelligence &amp; Tech Assurance and Vulnerability Management</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Drive the development of threat management, threat modelling, and identification of new threat vectors.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Maintain up-to-date awareness of cyber threat intelligence and emerging attack vectors, always evaluating the materiality of the threat.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Liaise with industry experts and update strategy in line with the threat landscape.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Lead a threat-led, risk-based vulnerability management programme, ensuring timely remediation in collaboration with IT.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Own insider threat and data loss prevention (DLP) initiatives.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Lead the emergency patching vulnerability management programme ensuring threat-led and risk-based prioritisation, along with collaboration with IT for timely remediation.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Own and manage key security controls ensuring they are deployed, tuned, and monitored effectively across cloud and on-premise assets, along with managing the vendors that are responsible for supporting the Group.</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Team Leadership &amp; Performance</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Lead a high-performing team of cyber and project professionals, driving strategy, innovation, and continuous improvement across protection capabilities including SOC, Security Engineering, Technical Assurance and Vulnerability Management.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Manage team performance and cost base, making informed financial decisions and supporting portfolio-level investment planning.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Provide technical leadership and act as a subject matter expert on information security best practices.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Collaboration &amp; Stakeholder Engagement</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Collaborate across the GCS Leadership Team and with cross-functional stakeholders.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Work with Head of Manufacturing / OT security to align security operations elements in manufacturing.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Collaborate with cross-functional stakeholders to assess and mitigate risk, while maintaining a forward-looking roadmap for cyber capabilities.</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Experience, Knowledge, Skills &amp; Attributes</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Essential</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A certification such as CISSP CISM, GIAC, or equivalent. University Degree qualified in an engineering discipline ideally with Cyber Security Engineering, Computer Science, Information Technology, or Computer and Electronics engineering.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Prior experience of building security teams and a global delivery operations support model.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Demonstrable experience of building and running a technical assurance function.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Demonstrable knowledge of industry standards such as NIST and ISO27001. Knowledge of relevant regulations such as GDPR, NIS2, and EU AI.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Exceptional analytical and decision-making abilities during BAU and incidents.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Experience in leading cybersecurity incidents, implementing response procedures, and driving continuous improvements, and optimising security tools and technologies to enhance operational efficiency. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Hands-on experience in threat detection and prevention, including expertise in SIEM, EDR, firewall management, or similar security technologies. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ability to build relationships and engage with all levels of management, communicating complex technical issues to a range of audiences.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Experience of managing service level agreements, commercial engagements, and supporting procurement with contract negotiations.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Demonstrable experience in designing, enhancing, and implementing security processes and policies.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Strong project management and leadership skills with the ability to prioritise both operational and project demands.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Desirable</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Experience of operating within federated environments or within an IT Service Management Provider / Consultancy</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Experience managing external supplier relationships to secure the best value and service</span></span></div>
]]></description><link>https://www.informationsecuritysolutions.com/job/director-of-group-cyber-security-services-190.aspx</link><guid>https://www.informationsecuritysolutions.com/job/director-of-group-cyber-security-services-190.aspx</guid><applyUrl>https://www.informationsecuritysolutions.com/job/director-of-group-cyber-security-services-190/apply.aspx</applyUrl><pubDate>Mon, 27 Apr 2026 08:15:55 GMT</pubDate><ffAdvert:applyUrl>https://www.informationsecuritysolutions.com/job/director-of-group-cyber-security-services-190/apply.aspx</ffAdvert:applyUrl><ffAdvert:ReferenceNumber>190</ffAdvert:ReferenceNumber><ffAdvert:Title>Director of Group Cyber Security Services</ffAdvert:Title><ffAdvert:CompanyReferenceNumber>338</ffAdvert:CompanyReferenceNumber><ffAdvert:JobType>Permanent</ffAdvert:JobType><ffAdvert:Discipline>IT/Information/Cyber Security</ffAdvert:Discipline><ffAdvert:Role>Head of Security Operations</ffAdvert:Role><ffAdvert:LocationArea>London</ffAdvert:LocationArea><ffAdvert:Location></ffAdvert:Location><ffAdvert:PostedDate>Mon, 27 Apr 2026 08:15:55 GMT</ffAdvert:PostedDate><ffAdvert:ClosingDate>Mon, 11 May 2026 08:15:55 GMT</ffAdvert:ClosingDate><ffAdvert:Remuneration></ffAdvert:Remuneration><ffAdvert:PostedBy>Iain Sutherland</ffAdvert:PostedBy><ffAdvert:RecruiterEmail>iain@informationsecuritysolutions.com</ffAdvert:RecruiterEmail><ffAdvert:RecruiterDirectDial>020 7887 6090</ffAdvert:RecruiterDirectDial><ffAdvert:MinimumPayment>140000.00</ffAdvert:MinimumPayment><ffAdvert:MaximumPayment>160000.00</ffAdvert:MaximumPayment><ffAdvert:PaymentRate>Per Year</ffAdvert:PaymentRate><ffAdvert:Currency>GBP</ffAdvert:Currency><ffAdvert:Country>UK</ffAdvert:Country></item><item><title>Cyber Security Culture Manager</title><description><![CDATA[<div>&nbsp;</div>

<table class="MsoTableGrid" style="border-collapse:collapse; border:none">
	<tbody>
		<tr>
			<td style="width:160px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Title:</span></span></div>
			</td>
			<td style="width:832px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Cyber Security Culture Manager</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:160px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Reference No:</span></span></div>
			</td>
			<td style="width:832px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">2155</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:160px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Company:</span></span></div>
			</td>
			<td style="width:832px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">FTSE100</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:160px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Location:</span></span></div>
			</td>
			<td style="width:832px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">London &ndash; 3 days in the office (Tuesday -Thursday) plus if required for specific meetings on other 2 days</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:160px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Working pattern:</span></span></div>
			</td>
			<td style="width:832px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">This hybrid role is 37.5 hour week Monday &ndash; Friday</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:160px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Reports to</span></span></div>
			</td>
			<td style="width:832px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Group CISO</span></span></div>
			</td>
		</tr>
		<tr>
			<td style="width:160px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Salary:</span></span></div>
			</td>
			<td style="width:832px; padding:0cm 7px 0cm 7px" valign="top">
			<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&pound;100,000</span></span></div>
			</td>
		</tr>
	</tbody>
</table>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">The Role</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Role Summary</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">The Group are transforming the way in which the cyber security risk is managed across the group. &nbsp;A new cyber strategy has been agreed; there is a short-term focus on security hygiene and resilience while a multi-year transformation programme is initiated to introduce new and make improvements to existing cyber capabilities and services. &nbsp;</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">The Cyber Security Culture Manager will be the driving force behind a mission to create a security-first mindset across a global, diverse organisation. This role sets the vision for cyber security culture, embedding security as a core value and shaping behaviours that protect people, processes, and assets. By defining clear goals and delivery roadmap for cultural maturity, it ensures alignment with business objectives, regulatory requirements, and industry best practice. &nbsp;</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Reporting to the CISO, this role builds strong relationships with senior leaders and advocates across Group&rsquo;s divisions, influencing change and creating a unified security posture. Acting as a cultural leader, the role champions continuous improvement, leveraging data-driven insights to strengthen security behaviours and reduce human risk. It fosters collaboration across security teams and business units, enhancing engagement and building a high-performing, values-driven environment. Through compelling communications and thought leadership, the role amplifies the voice of the CISO and ensures security messaging resonates at every level of the organisation.</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Success in this role means delivering measurable improvements in security culture&mdash;where secure choices are intuitive, risk is reduced at scale, and every colleague feels empowered to navigate cyber threats confidently. This is a unique opportunity to shape the future of security culture and leave a lasting impact on the resilience of a global enterprise.</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Role Responsibilities/Accountabilities</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Key Responsibilities: </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Set the Strategic Vision for Security Culture</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Define and own the long-term strategy for cyber security culture, ensuring alignment with business objectives, regulatory requirements, and industry best practice.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Establish a clear roadmap for cultural maturity and embed security as a core value.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Drive Continuous Improvement of Security Culture</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Monitor and assess cultural maturity through surveys, KPIs, and behavioural metrics.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Identify gaps and implement initiatives that strengthen security behaviours and reduce human risk.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Champion best practices and foster collaboration between security teams and business units.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Enhance the Culture of Security Teams</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Promote a high-performing, collaborative, and values-driven environment within and across the security teams.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Develop initiatives that improve team engagement, communication, and alignment with the security vision.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Act as a role model for cultural leadership within the security function</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Plan, coordinate and facilitate Group Cyber Security (GCS) team meetings. &nbsp;</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Create and Curate Strategic Content on Behalf of the CISO</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Develop high-quality, impactful content for internal audiences, including executive communications, presentations, and thought leadership pieces.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ensure messaging reflects the Groups security vision, priorities, and cultural objectives.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Collaborate with corporate communications to maintain consistency and clarity in all security-related messaging.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Collaborate with the Global Cyber Security </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Partner with Global Cyber Security peers to ensure cultural initiatives complement technical controls, risk frameworks, and strategic priorities. </span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Work closely with the Cyber Transformation Programme and BTS to deploy phishing simulation campaigns and implement tools that uplift cyber culture.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Align cultural objectives with broader security programmes to deliver a unified and effective security posture.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Stakeholder Engagement and Advocacy</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Build strong relationships with senior leaders, divisional business units, and functional teams to influence and embed security culture.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Represent the Group in relevant forums, working groups, and industry networks to share insights and adopt best practices.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Measurement and Reporting</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Define KPIs and success metrics for cultural initiatives and report progress to the CISO and senior leadership.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Use data-driven insights to refine strategies and demonstrate measurable improvements in security culture.</span></span></div>

<div>&nbsp;</div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Experience, Knowledge, Skills &amp; Attributes</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Essential</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Proven experience in cyber security awareness, culture, or behavioural change programs within a large, complex organisation.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Proven track record of working with senior partners to deliver metrics and reporting and progress updates.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Strong understanding of human risk factors and security best practices.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Excellent written, presentation and verbal skills with fluent English (written and verbal).</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Articulate and effective communicator across a range of formats, able to convey complex topics with ease to a variety of audiences and persuade others of the importance of security.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Build excellent relationships, credibility and influence easily with people at different levels, working to persuade them of the need to work with security in-mind.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">Desirable</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Experience of working in a federated environment.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Experience of operating security standards / frameworks such as ISO27001, NIST 800-53, NIS2.</span></span></div>

<div><span style="font-size:14pt;"><span style="font-family:Calibri;">&bull;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Experience and involvement with major Cyber Security transformation projects or programmes.</span></span></div>
]]></description><link>https://www.informationsecuritysolutions.com/job/cyber-security-culture-manager-192.aspx</link><guid>https://www.informationsecuritysolutions.com/job/cyber-security-culture-manager-192.aspx</guid><applyUrl>https://www.informationsecuritysolutions.com/job/cyber-security-culture-manager-192/apply.aspx</applyUrl><pubDate>Mon, 27 Apr 2026 08:15:54 GMT</pubDate><ffAdvert:applyUrl>https://www.informationsecuritysolutions.com/job/cyber-security-culture-manager-192/apply.aspx</ffAdvert:applyUrl><ffAdvert:ReferenceNumber>192</ffAdvert:ReferenceNumber><ffAdvert:Title>Cyber Security Culture Manager</ffAdvert:Title><ffAdvert:CompanyReferenceNumber>338</ffAdvert:CompanyReferenceNumber><ffAdvert:JobType>Permanent</ffAdvert:JobType><ffAdvert:Discipline>Information/Business Risk</ffAdvert:Discipline><ffAdvert:Role>Security Awareness Manager</ffAdvert:Role><ffAdvert:LocationArea>London</ffAdvert:LocationArea><ffAdvert:Location></ffAdvert:Location><ffAdvert:PostedDate>Mon, 27 Apr 2026 08:15:54 GMT</ffAdvert:PostedDate><ffAdvert:ClosingDate>Mon, 11 May 2026 08:15:54 GMT</ffAdvert:ClosingDate><ffAdvert:Remuneration></ffAdvert:Remuneration><ffAdvert:PostedBy>Iain Sutherland</ffAdvert:PostedBy><ffAdvert:RecruiterEmail>iain@informationsecuritysolutions.com</ffAdvert:RecruiterEmail><ffAdvert:RecruiterDirectDial>020 7887 6090</ffAdvert:RecruiterDirectDial><ffAdvert:MinimumPayment>0.00</ffAdvert:MinimumPayment><ffAdvert:MaximumPayment></ffAdvert:MaximumPayment><ffAdvert:PaymentRate>Per Year</ffAdvert:PaymentRate><ffAdvert:Currency>GBP</ffAdvert:Currency><ffAdvert:Country>UK</ffAdvert:Country></item></channel></rss>