Every year, we help hundreds of thousands of people find rewarding jobs in the ever-changing world of work.
We understand the importance of a job in peoples lifes and we want to help them find work that feels good. And we’ll help them continue to grow as their needs and ambitions change.
At Randstad, our value comes from our people and that is why we put them first. We are proud of our learning culture and career architecture framework that encourages ours team to develop both personally and professionally.
We believe that talent grows when presented with opportunity and this is why we encourage our people to think beyond their role. We have created a culture that enables talent to flourish, encouraging entrepreneurship, fostering team spirit, and continually building mutual trust.
Priorities for the Role
Lead the management and continuous development of the ISO27001:2022 ISMS
Working with internal and global teams to manage and reduce vulnerability assessments and remediation across server and end user computing estates
Management and updating of the OneTrust platform (including new assessments, asset reviews, vendor onboarding)
Working with global teams to implement Information Security programmes at a technical and programme management level.
Working with internal stakeholders to manage deployment of new security programmes.
Documentation of policies and procedures relating to Information Security project implementations
Work with prospective vendors and global teams to complete assurance programmes
Support within the Architecture and DevOps and Infosec Agile Squad to meet sprint goals
Assistance in supporting internal, client and external audits
Key Performance IndicatorsMaintain ISO27001:2022 accreditation
Continuous improvement if ISO27001:2022 ISMS
Implementation of agreed Randstad Global Standards and Programmes to agreed timelines
Reporting of programme management status to key stakeholders
Successful completion of internal and external audits (technical areas / evidencing)
4.0
Supporting documents, assumptions and constraints
Job description JD Information Security Analyst
Additional insight and information which may be useful to the ITA teams:
Is this the job for you? We would love to hear from you! Please apply directly to the role and we will get in touch with you.
...