Accessibility Links

Information Security Analyst

  • Job reference: 30958OH
  • Location: London
  • Job type: Contract
  • Start date: Not specified
  • Contact: Not specified
  • Sector: Information and Cyber Security
  • Salary: £450 - £500 per annum

Information Security Analyst

A leading Telecoms business requires an Information Security Analyst to support with increasing security capabilities across the business through an ongoing security improvement programme.

The suitable candidate will have the following experience:

  • Previous experience taking ownership and responsibility for security incidents and escalation process
  • Experience in security management across mobile network services & architectures
  • Experience working with diverse technologies within mobile networks eg. cloud-based services, radio base stations
  • Design, development, and evaluation of industry-wide procedures, threat landscape reports and education documents
  • Excellent communication skills across small groups, open platforms and within written communications
  • Understanding/experience or qualifications in ITIL is desirable

Should you be interested, please do not hesitate to contact Olly Hopping at Olly.Hopping@Lafosse.com or call me on 02079321691.

Related jobs
Identity and Access Management Business Analyst (IAM BA)
  • Contract
  • London
  • £500 - £570 per day
  • Reference 31211
  • Identity and Access Management Business Analyst (IAM BA) Leading Asset Manager require a Business Analyst (BA) to join their Security Transformation programme, of which a large project is the end to end implementation of an Identity and Access Management solution. The IAM Business Analyst will have the following...
Read more
IT Security Analyst
  • Permanent
  • City of Westminster
  • £60000 - £65000 per annum
  • Reference 31116
  • The It Security Analyst will work across the following areas: 30 % Vulnerability Management 30% IT Risk Management 20% Supporting internal project delivery pipeline 10% Cyber Security Incident Response 10% Identity and Access Management You will need a good understanding of how cyber threat actors operate...
Read more