Itso

Birmingham, ENG, GB, United Kingdom

Job Description

Role Summary









The ITSO ensures the implementation of operational IS and IT security measures and requirements in the 1st line in accordance with the internal requirements established by the Risk Management function. In addition, ITSO supports CITSO in implementing operational IS and IT security measures within the central IT organization. ITSO role outside the central IT organisation: An ITSO may be established in individual entities that are not supported by central IT. In this case, the ITSO is appointed by the local IT management and executes the tasks outlined in the CITSO role description. The local ITSO must collaborate with the respective ISO to ensure an effective ISM.



Duties and Responsibilities





Contributes to defining IT security requirements in alignment with relevant Group-wide norms Supports the ISRM activities, providing expertise on risk assessment and treatment Supports conduction of IT security training and awareness measures. Implements and maintains IT security requirements in alignment with the Group-wide norms related to IS and ISM Designs and implements security measures based on the Group NFR Control Catalogue and the requirements of this Policy Defines 1st line IT security relevant processes in alignment with 2nd line requirements Designs and implements a sound technical security infrastructure by setting security architecture principles Conducts regular or ad-hoc security assessments within the 1st line, such as Vulnerability Assessment and Penetration Testing (VAPTs) to identify and remediate any vulnerabilities Consults and supports the Control Implementation Responsible regarding the implementation of IT related controls as well as risk mitigating measures in context of ISRM Ensures a proper conduct of control-based risk assessments for IT related controls Designs and implements IT trainings related to IS.




The ITSO further supports the 2nd line, especially in the following tasks:


Executes the security incident process and ensures a proper involvement of the 2nd line according to the defined process Monitors IS risks and reports significant or high risks to the ISO Ensures that the responsible ISM function (e.g. ISO) is informed about IS incidents in a timely manner Informs the responsible ISM function (e.g. ISO) about major projects with IS relevance, and provides additional necessary information upon request Supports the implementation of awareness measures within IT.



Core Competences




Cybersecurity Fundamentals: Deep understanding of foundational security domains such as network security, encryption, vulnerability management, and incident response. Risk Assessment & IT Risk Management: Ability to assess, classify, and mitigate IT and cybersecurity risks using recognised frameworks; includes policy development and risk analysis. Threat & Incident Management: Competency in identifying, tracking, analysing, and responding to security threats and incidents. Knowledge of operational cyber defence processes is key. Compliance, Governance & Auditing: Understanding regulatory, organisational, and industry security standards. Ability to conduct or support audits, ensure compliance, and advise on policy adherence. Data Security & Access Control: Competence in applying controls to ensure confidentiality, integrity, and availability of information; includes access management, media control, and data lifecycle protection. Security Tools Expertise: Hands-on experience with tools such as vulnerability scanners (e.g., Tenable, and endpoint / network monitoring systems. Analytical & Problem-Solving Skills: Ability to analyse logs, detect patterns, identify vulnerabilities, and resolve security gaps. Often requires strong investigative skills. Policy Development & Implementation: Competence in writing, updating, and enforcing cybersecurity policies, procedures, and security standards. Communication & Leadership: Strong communication skills for advising stakeholders, training staff, and influencing security practices across the organisation. Leadership is essential for coordinating multi-team security functions. Identity & Access Management: Proficiency in managing user accounts, access rights, identity systems, and privileged access controls. Incident Response & Recovery: Ability to plan, execute, and evaluate incident response processes, including containment, eradication, forensics, and recovery. Continuous Learning & Awareness: Staying current with cybersecurity trends, zero-day threats, and best practices; conducting security awareness training for staff.




Skills and Competencies





Customer Service Orientation: Provide excellent customer service, ensuring user satisfaction. Technical Support Skills: Ability to troubleshoot and resolve user issues efficiently. Communication: Communicate clearly with users and stakeholders, ensuring alignment on support processes. Documentation Management: Maintain accurate and up-to-date support documentation. * Initiative & Continuous Improvement: Identify opportunities to enhance support processes and system reliability.

Beware of fraud agents! do not pay money to get a job

MNCJobs.co.uk will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Related Jobs

Job Detail

  • Job Id
    JD4441659
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Full Time
  • Salary:
    Not mentioned
  • Employment Status
    Full Time
  • Job Location
    Birmingham, ENG, GB, United Kingdom
  • Education
    Not mentioned