Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Information Security Manager image - Rise Careers
Job details

Information Security Manager

We are seeking a highly skilled and experienced Information Security Manager to join our dynamic information security and data protection team. This role offers a unique opportunity to shape and implement security strategies that safeguard the organisation's information and technology systems.

As the Information Security Manager, you will be responsible for overseeing the organisation’s information security management system (ISMS). Your primary focus will be on managing the delivery of, and improving, security policies, practices, and standards to protect our company and our clients. You will work closely with other departments to ensure compliance with our ISMS and identify security risks to mitigate potential vulnerabilities.

The Information Security Manager will perform fundamental security and data protection tasks. You will conduct security and data protection assessments, supporting vulnerability management, reviewing security configurations, and contributing to the development of security and data protection policies. The ideal candidate is eager to learn and grow within the information security and data protection fields while contributing to the team’s efforts to protect our organisation's data and IT infrastructure.

This is a full-time position. Occasional after-hours work may be required for incident response or urgent security tasks. 

The successful candidate will be enrolled on a personalised development plan, and will be provided with mentoring support to help you grow and learn.

Responsibilities:

1.       Develop and Implement Security Governance:

  • Design, implement, and enforce information security policies and procedures aligned with business objectives and regulatory requirements
  • Identify and develop a strategy to mitigate, manage, and monitor security risks and incidents
  • Manage security audits and assessments and provide recommendations to improve the security posture of our systems and infrastructure
  • Work collaboratively with other departments to ensure the alignment of security efforts with wider business objectives

2.      Risk Management:

  • Identify and assess information security risks
  • Provide recommendations for mitigating and managing risks effectively
  • Security system management, administration and reporting;
  • Provide advice an guidance to teams on how to mitigate any identified risks

3.     Vulnerability Management:

  • Coordinate security assurance testing and vulnerability management
  • Provide advice and guidance to teams on how to mitigate vulnerabilities, and following up on remediation progress
  • Work with development teams to embed secure coding practices

4.     Incident Response & Recovery:

  • Lead incident response efforts on a duty basis
  • Provide guidance on threat mitigation, containment, and recovery processes

5.     Compliance:

  • Ensure compliance with relevant regulations (CCPA, GDPR, etc.)
  • Manage ITG Group ISO 27001 certification process and ISMS, including all external audits, internal audits, and planning
  • Ensure the accurate review of system configurations takes place to ensure alignment with security and data protection best practices
  • Ensure the documenting of configuration settings

6.     Staff Training & Awareness:

  • Implement and manage an enterprise-wide security awareness training program
  • Conduct regular training sessions and awareness programs to educate employees on security risks and best practices

7.      Vendor Management:

  • Manage third-party vendor security assessments, ensuring third-party partners comply with security protocols

8.     Reporting & Documentation:

  • Maintain accurate records of security incidents, audits, assessments etc. and compile progress reports
  • Implement and report on security key performance indicators and outcome driven metrics

9.     Continuous Improvement:

  • Continuously assess security infrastructure and recommend improvements to strengthen data protection and cybersecurity
  • Keep up to date with the latest security threats, trends, technologies, and regulations in the industry
  • Keep the organisation updated on industry best practices
  • 5+ years of experience in cyber security or a related IT role
  • Professional certifications (e.g. CISM, CISSP etc.) or a degree in a related field are preferred, but not essential
  • Strong understanding of security concepts, tools, and technologies (e.g., SIEM, firewalls, vulnerability scanners)
  • Strong understanding of network security and operating systems
  • Commitment to continuous professional development, with a willingness to learn and grow in the cybersecurity field
  • Ability to help coach and guide less experienced members of the wider Information Security and Data Protection team
  • Ability to work autonomously and manage multiple tasks simultaneously
  • Strong analytical, investigative, and problem-solving abilities
  • The adaptability to do a range of work, sometimes complex and non-routine, in different environments
  • The ability to work under direction, use discretion, and determine when to escalate issues
  • Strong written and verbal communication skills, with the ability to interact effectively with both technical and non-technical stakeholders

Work’s a treat!

On top of a competitive salary, you can expect a whole load of perks:

  • 25 days’ holiday + bank holidays – we understand the importance of you getting some down time.
  • Annual Wellbeing Day – enjoy an additional day on us to look after your physical and mental wellbeing.
  • Pension Scheme – helping you save towards your retirement home in the sun!
  • Corporate Medical Cash Plan – claim back the cost of your medical treatments.
  • Smart Working Options – spend up to 40% of your working week from home.
  • So many savings – through our online community platform, you can access dozens of daily deals, from money off top brands to discounts on days out.
  • Employee Assistance Programme – our people are at the heart of everything we do, so if you’re happy, we’re happy.
  • Cycle to Work Scheme – save on the cost of biking to work.
  • Monthly Employee Awards - Employee of the Month programme with £250 bonus
  • Raising money for charity including a paid Volunteer Day – we’re all about giving back… and having lots of fun in the process!
  • Referral scheme – know the perfect person to join the team? You could bag £1,500 for a putting a good word in.
  • Wellbeing Programme – giving you the opportunity to join regular, interactive Wellbeing Workshops or join our 30 plus Wellbeing Champions.
  • Enhanced Family Friendly Leave – support for you and your family to help you navigate through the craziness of family life.


We Value Diversity

We champion and welcome diversity in our workforce and ensure all job applicants receive equal and fair treatment, regardless of age, race, gender or gender identity, religion, sexual orientation, disability, or nationality.

We are not only committed to increasing the visibility and recognition of talent from under-represented groups within our organisation, but the wider industry too.

At the end of the day, we make sure we take time to look after ourselves, each other, and the planet, because we’re always stronger together.

ITG have a number of community groups (ERGs) available to employees which offer a safe space for like-minded colleagues, with shared interests to connect, socialise and check in with each other. These include Black ITGers Together, LGBTQ+ Together, Mens Health Together, Muslims Together, Neurodiversity Together, Working Parents and Carers Together and Women In Tech Together.

#LI-NW1

Average salary estimate

$105000 / YEARLY (est.)
min
max
$90000K
$120000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Information Security Manager, Inspired Thinking Group (ITG)

Are you ready to take the reins as the Information Security Manager with us? We’re excited to invite a highly skilled and experienced Information Security Manager to join our dynamic information security and data protection team! This isn’t just a job—it's a chance to shape and implement groundbreaking security strategies that will protect our company’s valuable information and technology systems. In this pivotal role, you’ll oversee our Information Security Management System (ISMS) and ensure our security policies and practices are top-notch, securing both our organization and our clients. You’ll collaborate with various departments to identify and manage security risks while conducting assessments and developing robust security policies. We’re looking for someone eager to learn and grow within the ever-evolving world of information security. This full-time position might involve some after-hours work during critical incidents, but fear not! You'll be equipped with a personalized development plan and mentoring support to ensure you thrive. With a strong understanding of security concepts and compliance regulations, along with your professional certifications, you'll be instrumental in fortifying our IT infrastructure. Think you’re up to the challenge? We can’t wait to meet you and see how you can contribute to our awesome team!

Frequently Asked Questions (FAQs) for Information Security Manager Role at Inspired Thinking Group (ITG)
What are the key responsibilities of an Information Security Manager at our company?

As the Information Security Manager at our company, you'll be at the forefront of developing and enforcing our security governance policies. Your primary responsibilities include managing risk assessment activities, conducting vulnerability management, leading incident response efforts, ensuring compliance with regulations like GDPR, and driving security awareness training across the organization. Each day will present you with new challenges, and you’ll work closely with teams to create a safer digital landscape for everyone.

Join Rise to see the full answer
What qualifications do I need to become an Information Security Manager at your company?

To land the Information Security Manager role at our company, a minimum of 5 years of experience in cybersecurity or IT roles is required. A degree in a related field or professional certifications such as CISM or CISSP can give you a competitive edge. We're also looking for candidates with strong analytical skills, problem-solving abilities, and a commitment to continuous learning in the cybersecurity domain. If you possess these attributes, you might just be the perfect fit!

Join Rise to see the full answer
How does your company support the professional development of an Information Security Manager?

At our company, we believe in investing in our employees' growth. As an Information Security Manager, you'll be enrolled in a personalized development plan designed to enhance your skills and knowledge. Additionally, you'll receive mentoring support, access to workshops, and opportunities to engage in training sessions focused on the latest security trends and technologies—ensuring you stay ahead of the curve in this fast-paced field.

Join Rise to see the full answer
What types of security assessments will I conduct as an Information Security Manager?

In your role as Information Security Manager within our team, you will conduct a variety of security assessments including vulnerability assessments, security audits, and incident response evaluations. You'll work with technical teams to analyze system configurations and identify potential threats, providing actionable recommendations to strengthen our security posture. Your expertise will be critical in maintaining compliance and safeguarding our information systems.

Join Rise to see the full answer
Is there a specific work environment for the Information Security Manager role at your company?

While the Information Security Manager position can be performed remotely, our company offers flexible smart working options. This means you can spend up to 40% of your working week from home! We pride ourselves on maintaining a collaborative and supportive work culture, whether you’re in the office or working remotely, ensuring you always feel like part of the team.

Join Rise to see the full answer
Common Interview Questions for Information Security Manager
Can you explain the importance of an Information Security Management System?

An Information Security Management System (ISMS) is vital because it provides a systematic approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability. It helps organizations continuously assess risks and implement appropriate security controls while adhering to regulatory requirements. When answering this question, emphasize how a robust ISMS aids in mitigating security incidents and enhancing compliance.

Join Rise to see the full answer
How do you conduct a risk assessment?

Conducting a risk assessment involves identifying potential security risks, analyzing vulnerabilities, and evaluating the impacts associated with these risks. You should discuss steps like creating an asset inventory, identifying threats, assessing current controls, and recommending improvements. It’s essential to demonstrate a structured methodology while explaining your approach, as it shows your thorough understanding of risk management.

Join Rise to see the full answer
What is your experience with incident response planning?

When discussing your experience with incident response planning, highlight any frameworks or standards you've implemented, like NIST or ISO. Describe how you prepare for incidents, including detection, analysis, containment, and recovery strategies. Showcase your ability to lead teams during incidents and providing key insights into improving response processes.

Join Rise to see the full answer
Describe how you would handle a data breach.

Handling a data breach involves a prepared and swift response. Start by identifying the breach's scope, contain the threat, and prevent further data loss. Notify stakeholders and affected parties, while also collaborating with your team to analyze the breach's cause and implement corrective actions. Communicate the incident clearly and transparently while adhering to legal and regulatory obligations. This response showcases your readiness to manage real-world security issues.

Join Rise to see the full answer
What security tools are you familiar with?

Be prepared to discuss various security tools you've used, such as SIEM systems, firewalls, antivirus solutions, and vulnerability scanners. Highlight how you've applied these tools to enhance security measures and detect threats. Providing specific examples of how these tools helped your previous organization will give your answer depth and relevance.

Join Rise to see the full answer
How do you ensure compliance with regulations like GDPR or CCPA?

Ensuring compliance with GDPR or CCPA involves understanding the regulations' requirements and aligning your organization's policies accordingly. Highlight your experience in conducting data audits, implementing necessary controls, and developing policies to protect personal data. Discuss your role in educating staff about compliance requirements, and how you stay updated on regulatory changes. This answer demonstrates your awareness of the legal landscape surrounding data protection.

Join Rise to see the full answer
How do you motivate your team in cybersecurity initiatives?

Motivating your team in cybersecurity initiatives is crucial for success. Discuss strategies such as providing recognition for achievements, promoting professional development opportunities, and fostering a collaborative environment. Highlight how you encourage team members to share ideas and stay engaged in security awareness programs, which helps cultivate a proactive security culture.

Join Rise to see the full answer
What do you do to stay updated on cybersecurity trends?

To stay updated on cybersecurity trends, engage with industry publications, participate in webinars, and follow thought leaders on relevant social media platforms. Joining professional organizations and attending cybersecurity conferences are great strategies as well. Mention any specific research or areas of interest you're following, showing your commitment to remaining informed in this rapidly evolving field.

Join Rise to see the full answer
Why do you think cybersecurity awareness training is essential?

Cybersecurity awareness training is essential because human error is often a significant factor in security breaches. Training empowers employees to recognize and respond to security threats effectively. When answering, include how ongoing training fosters a culture of security within the organization, ultimately reducing the risk of incidents. Highlight your past experiences organizing or conducting such training.

Join Rise to see the full answer
Can you give an example of a successful security project you've led?

For this question, cite a specific project where you played a pivotal role in enhancing an organization’s security posture. Describe the project's goals, the challenges faced, and the strategies you implemented to overcome them. Emphasize measurable outcomes, like reduced incidents or improved compliance rates, showcasing your leadership and practical expertise in managing security initiatives.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 13 days ago
Photo of the Rise User
Posted 6 days ago
Photo of the Rise User
Posted 9 hours ago
Photo of the Rise User
Posted 9 days ago
Photo of the Rise User
TEKsystems Hybrid Anaheim, California, United States
Posted 5 days ago
Photo of the Rise User
Posted 4 days ago
Photo of the Rise User
Posted 10 hours ago
MATCH
VIEW MATCH
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, hybrid
DATE POSTED
March 28, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!