Home Office seeks £110k security leader
Deputy CISO post comes with six-figure salary
The Home Office is offering a salary of up to £110,000 a year in a bid to recruit a deputy chief information security officer.
The role, which will be based in either Croydon or Manchester, comes with a remit to serve as the department’s main advisor regarding “cyber risk within its own business operations”. The chosen candidate will also “be responsible for bringing together the department’s approach to its own cyber and information security”.
The deputy CISO will assume responsibility for an existing cybersecurity programme, and will be tasked with ensuring it can “enable and sustain elements of the overall cyber strategy for the department”.
- Home Office floats £140k for leader to ensure government tech is Brexit-ready
- Met Office seeks chief information security officer
- Home Office seeks leader for £200m transformation of immigration technology
“As an integral member of the DDaT team, you will implement enterprise strategy, approach and processes to reduce information security risks and enable services to the department to be delivered effectively,” the Home Office said. “You will establish appropriate strategy, standards, controls, and implement policies to protect the department’s information assets and technologies.”
The department is looking for someone with a “strong security background” and leadership experience. The ability to work collaboratively with policy and operations professionals and senior management is another necessary skill.
“Previous experience of leadership in government is not required, but you will be expected to quickly get up to speed with the department’s existing culture and processes – not least so you are in a stronger position to shape and develop that culture,” the Home Office added.
Applications are open until 20 May. The chosen candidate will initially be appointed to a two-year contract.
Union criticises government’s £46.9m spent with supplier in 2018
Users of S3 storage warned against allowing public access, to tackle ‘leaky bucket’ risk
Work also begins on developing a framework for identity products after Verify enters private ownership
Margot James claims research has found no danger in new network
Sharon Hobson of Riverbed explains why the key to justifying an investment in cloud technology is visibility of network performance