Information Security Specialist About the Role: We are seeking an experienced Information Security Specialist to join a growing team. In this role, you will be instrumental in deploying, managing, and optimizing security tools while working closely with cross-functional teams to ensure our security measures are aligned with business objectives. You'll be at the forefront of protecting our organization's digital assets, managing risks, and helping to shape our security strategy. Key Responsibilities: Security Tooling: Deploy, manage, and optimize tools for network monitoring, email security, data loss prevention, and user entity and behavioural analytics. Risk Assessment: Conduct regular security assessments to identify, quantify, and respond to cybersecurity risks. Security Projects: Participate in security strategy implementation by enhancing security processes and procedures in alignment with industry best practices. Operational Improvements: Identify opportunities for automation and optimization of daily workflows to increase efficiency. Collaboration: Work closely with other technology teams to align security measures with overall business and strategic objectives. Compliance Responsibilities (SMCR): Ensure compliance with policies and procedures, taking accountability for all actions. Understand and integrate relevant regulations into daily responsibilities to ensure compliant delivery of objectives. Recognise your role within the customer experience and always strive to provide the best outcomes. Take ownership of your personal development to meet the competence required for your role. Embed a customer-centric approach in all security initiatives to support the six customer outcomes: culture, information, delivery, targeting, advice, and post-sales treatment. Skills and Experience – Essential: 5 years of experience in a similar cybersecurity role. Strong knowledge of cybersecurity in cloud environments (e.g., Azure, AWS, GCP). Experience in designing, developing, and continuously improving security solutions. Expertise in control effectiveness assessment and security principles, such as privileged access and role-based access technologies. Ability to analyze data to support decisions and policies. A proactive approach to learning, development, and problem-solving. Desirable: Experience in the NIST domains (Identify, Detect, Protect, Recover, Respond) or governance. Familiarity with security frameworks like NIST CSF, CIS benchmarks, ISO27001, or SOC2. Experience in network security technologies (e.g., Palo Alto, Cisco Meraki).