IT Security Manager
Role details
Job location
Tech stack
Job description
As the IT Information Security Manager, you will act as the senior point of contact for security issues within the business, reporting directly into the Head of IT. The role will be technically focused, and you will work closely with the Infrastructure Manager, covering areas such as, * Firewalls, threat monitoring and endpoint protection using CrowdStrike, and security solutions around MDM.
- This technical work will encompass areas such as the security impact on PC/laptop/mobile phone builds, password policies and VLANs.
- Manage the day-to-day workload, work with the other teams to improve the current stance of business and work with the suppliers to get tools working.
- You will maintain the Information Security risk register, whilst also carrying out DPIAs and security design assessments.
- As a senior leader within the organisation's IT function, you will have the ability to put together reports for the board on threats and vulnerabilities.
- People-management will be an element of the role, as you will directly line manage 1 x Security Analyst.
Whilst the business does promote a hybrid working culture, given the nature of this role, you will ideally be flexible with occasional travel to relevant company sites where required.
Requirements
Have a strong IT Security background with an infrastructure foundation, ideally with 3-5 years in a technical role covering IT Security responsibilities.
- Really understand the concepts of firewalls, and underlying core infrastructure of an IT estate, and how network security is integral to a business.
- Have a solid level of experience with endpoint security systems, such as CrowdStrike, from a NDR, threat monitoring and vulnerability perspective.
- Endpoint security exposure across the mobile device space, such as working with MobileIron, or similar vendors.
- Management of 3rd party vendor
- Possess an in-depth understanding of Information Security frameworks, such as ISO27001
- Excellent communication and collaboration skills and understand how to translate complex security-terminologies and ideas into layman's terms for senior stakeholders.