CrawlJobs Logo

Information Security Assurance Analyst

triarecruitment.com Logo

TRIA

Location Icon

Location:
United Kingdom , Portsmouth

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

50000.00 - 55000.00 GBP / Year

Job Description:

We have a brilliant opportunity to join an industry-leading utility company based in the Southeast. They are going through a period of growth, undergoing multiple digital, and tech transformations. As a UK Critical National Infrastructure provider, Information Security is an integral part of their business operation, so this role is critical to the business.

Job Responsibility:

  • Providing assurance to the leadership team regarding the design and operating effectiveness of IT security controls within future IT projects and implementation
  • Reviewing and identifying security control gaps in design documents
  • Providing recommendations for amendments and mitigation

Requirements:

  • Strong experience of performing threat modelling exercises
  • Experience of reviewing high/low level architecture definition documents for compliance against security policies and standards
  • Knowledge of technology risk and controls including relevant tools and techniques
  • Good understanding and practical experience of Cyber Security Frameworks including NCSC CAF, NIST and ISO 27001
  • Must have at least 2 years' cyber security experience
  • Excellent communication skills with the ability to deal with conflicting priorities
  • Must be eligible for SC Clearance/have an active SC Clearance
What we offer:
  • Salary sacrifice pension scheme
  • 25 days holiday + Bank Holidays

Additional Information:

Job Posted:
January 26, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Information Security Assurance Analyst

Cyber Information Assurance Analyst - Junior Assessor

The Cyber Information Assurance Analyst supports the customer by performing anal...
Location
Location
United States , Ft. Meade, MD
Salary
Salary:
65000.00 - 70000.00 USD / Year
chickasaw.com Logo
Chickasaw Nation Industries, Inc (CNI)
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • The ability to obtain, maintain and access classified information at the TS/SCI level
  • DoD 8570 IAM/IA Technical (IAT) Level II certification
  • Familiarity with STIGs (Security Technical Implementation Guides), Security Requirement Guides (SRGs), Plan of Action and Milestones (POA&Ms) and cybersecurity best practices
  • Understanding of the RMF process, NIST SP 800- 37, NIST SP 800-53, CNSSI 1253
  • Familiarity with relevant tools such as eMASS, STIG Viewer, Nessus, ACAS, SCAP, or HBSS
  • Strong written and verbal communication skills for reporting assessment findings
  • This position requires travel ~85% CONUS & OCONUS
  • Bachelor's Degree and a minimum of one to two (1-2) years of experience in systems security, or equivalent combination of education/experience
Job Responsibility
Job Responsibility
  • Conducts cybersecurity assessments, audits, and inspections for DoD organizations and partners handling DoD information or connecting to the DoDIN
  • Evaluates systems and Defensive Cyberspace Operations using cyber threat emulation and performance-based testing
  • Adheres to policies and processes for each assessment type
  • Supports assessment development and execution to ensure security expertise is properly applied
  • Coordinates logistics, test plans, and scope with the SCA Team Lead
  • Performs vulnerability assessments, capture results using STIG Viewer or designated tools, and document findings in eMASS
  • Analyzes security gaps and provide mitigation recommendations
  • Validates cybersecurity controls, TTPs, STIGs, RMF controls, and compliance with DoD policies and guidelines
  • Provides risk analysis and assessment results for authorization recommendations
  • Participates in daily assessment reviews, in-briefs, and out-briefs, sharing findings with the SCA-R
What we offer
What we offer
  • Medical
  • Dental
  • Vision
  • 401(k)
  • Family Planning/Fertility Assistance
  • STD/LTD/Basic Life/AD&D
  • Legal-Aid Program
  • Employee Assistance Program (EAP)
  • Paid Time Off (PTO) – (11) Federal Holidays
  • Training and Development Opportunities
  • Fulltime
Read More
Arrow Right

Cyber Information Assurance Analyst SME

The Cyber Information Assurance Analyst SME supports the customer by performing ...
Location
Location
United States , Ft. Meade
Salary
Salary:
131000.00 - 155000.00 USD / Year
chickasaw.com Logo
Chickasaw Nation Industries, Inc (CNI)
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must possess appropriate level of certifications for this position as required by the contract
  • Required DOD Top Secret Clearance with SCI eligibility
  • Bachelor's Degree and a minimum of ten plus (10+) years of experience in systems security, or equivalent combination of education/experience
Job Responsibility
Job Responsibility
  • Performs extensive assessments of systems and networks within the networking environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy
  • Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems
  • Assists in the implementation of the required government policy and makes recommendations on process tailoring
  • Supports the formal Security Test and Evaluation required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports
  • Periodically conducts of a review of each system's audits and monitors corrective actions until all actions are closed
What we offer
What we offer
  • Medical
  • Dental
  • Vision
  • Company Life Insurance
  • Short-Term and Long-Term Disability Insurance
  • 401(K) Immediate Vesting
  • Professional Development Assistance
  • Legal Aid Assistance Program
  • Family Planning / Fertility Assistance
  • Personal Time Off
  • Fulltime
Read More
Arrow Right

Computer Network Defense Analyst

Altamira is searching for a Computer Network Defense Analyst in Annapolis Juncti...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Experience in network or system administration
  • Completion of military training in a relevant area such as JCAC, UCT, NWBC/INWT, Cyber Defense Operations can count towards experience
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Clearance: TS/SCI w/Full Scope Poly
Job Responsibility
Job Responsibility
  • Use information collected from a variety of computer network defense resources to identify, analyze, and report events that occur or might occur within their environment
What we offer
What we offer
  • $20K SIGN-ON BONUS AFTER SIX-MONTHS ON CONTRACT
Read More
Arrow Right

Senior Mainframe Security Analyst

Our client, a large systems integrator and solutions provider, is looking to hir...
Location
Location
Canada , Ontario
Salary
Salary:
45.00 - 71.50 USD / Hour
clearbridgetech.com Logo
ClearBridge Technology Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Information Assurance, or related field
  • Must be eligible and able to obtain a Secret Clearance
  • Minimum 5 years of experience in mainframe security with expertise in RACF, CA Top Secret, or ACF2
  • Strong understanding of mainframe security principles, including authentication, authorization, and access control
  • Strong communication and collaboration skills
Job Responsibility
Job Responsibility
  • Designing, implementing, and maintaining secure mainframe systems
  • Providing expert-level support and guidance to ensure the security and integrity of our mainframe infrastructure
  • Design and implement, and maintain mainframe security configurations using RACF, CA Top Secret, or ACF2
  • Develop and enforce mainframe security policies and procedures
  • Conduct security assessments and audits to identify vulnerabilities and recommend remediation
What we offer
What we offer
  • Excellent benefits and compensation packages
Read More
Arrow Right

Computer Network Defense Analyst

Altamira is searching for a Computer Network Defense Analyst. Use information co...
Location
Location
United States , Harlem, GA; Annapolis Junction, MD
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Experience in network or system administration
  • Completion of military training in a relevant area (e.g., JCAC, UCT, NWBC/INWT, Cyber Defense Operations) may count toward experience
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Clearance: TS/SCI w/Full Scope Poly
Job Responsibility
Job Responsibility
  • Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment
What we offer
What we offer
  • $20K sign-on bonus after six-months on contract
Read More
Arrow Right

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI with polygraph
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associates degree
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
  • In some cases, foreign language proficiency may also be used to satisfy experience requirements
  • recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level
  • Level 1: 2 years applicable experience with a bachelors degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a masters degree, OR 5 years applicable experience with a bachelors degree, OR 7 years applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associates degree
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
  • In some cases, foreign language proficiency may also be used to satisfy experience requirements
  • recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level
  • Active TS/SCI with polygraph
  • Specific labor category determined by years of experience + educational degrees: Level 1: 2 years applicable experience with a bachelors degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a masters degree, OR 5 years applicable experience with a bachelors degree, OR 7 years applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right

Information Security Specialist/Analyst III

The Information Security Specialist/Analyst III reports to the Manager, Security...
Location
Location
United States
Salary
Salary:
Not provided
muschealth.org Logo
MUSC Health
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience
  • or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience
  • or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required
  • Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.)
  • Strong analytical and problem-solving skills with the ability to make decisions under pressure
  • Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools
  • Familiarity with cloud security (Azure, AWS) and identity management solutions
  • Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices
  • Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language
  • Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks
Job Responsibility
Job Responsibility
  • Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure
  • Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches
  • Perform cyber security incident handling, tracking and reporting
  • Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts
  • Respond to relevant service requests received from end users (e.g. for investigation of security events)
  • Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents
  • Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities
  • Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements
  • Conduct vulnerability assessments to identify security risks and report findings to system owners
  • Manage workflows to ensure that protected assets are properly assessed in a timely manner
  • Fulltime
Read More
Arrow Right