Information Security Officer
Listed on 2026-02-16
-
IT/Tech
Cybersecurity, Information Security
Information Security Officer
Velonetic – Who are we? Velonetic represents the joint ventures between DXC Technology, the International Underwriting Association (IUA), and Lloyd’s of London. Previously referred to as the London Market Joint Ventures, we have been operating for over 20 years in the London Market (Lloyd's and Company), in both insurance and reinsurance business. Processing over £117 billion worth of premium and claims transactions today, we are building a new digital platform and services that will enable our customers to move transactions and money through the processing lifecycle with greater efficiency and speed, releasing time to drive innovation and focus on higher value activities.
Job DescriptionPosition:
Information Security Officer
Location:
UK
Full‑Time – Remote
As the Information Security Officer, you will be the security point of contact for IT operations, responsible for supporting and communicating the importance of compliance and governance of the security strategy, roadmap, and policies that are aligned with the organization’s overall security objectives.
- Identify, assess, and prioritize security vulnerabilities, ensuring effective remediation plans are in place and executed.
- Lead investigations into information security breaches, ensuring proper reporting and communication with senior management during incidents.
- Work with the Security Incident Response Coordination Centre (SIRCC) to address and mitigate security incidents, ensuring proportionate remediation of information breaches.
- Work closely with the CISO to ensure the security strategy aligns with broader organisational objectives, whilst also meeting information privacy and protection regulations (e.g., GDPR).
- Monitor and review security policies, standards, and procedures focused on protecting information across all environments, ensuring alignment with business and IT priorities.
- Own and manage all information security risks, performing risk assessments specific to storage, processing, and transfer.
- Conduct periodic audits of information security controls to ensure compliance with internal policies and external regulations.
- Ensure that information security requirements are incorporated into all phases of technology systems, from design through deployment.
- Coordinate with third‑party security vendors to conduct vulnerability assessments, penetration tests, and security audits focused on information protection.
- Stay current on emerging information security trends, threats, and technologies, recommending updates to security measures as needed.
- Establish and maintain a strong information security posture, continuously monitoring the effectiveness of controls and processes.
- Regularly evaluate the organization’s information security safeguards, ensuring they provide robust protection against evolving threats and information‑related risks.
- Monitor software development teams to ensure secure information handling throughout the software development lifecycle (SDLC), ensuring security is embedded in processing systems and applications.
- Ideally, a degree in computer science, Information Systems, Engineering, or a related field.
- Holding any of the following qualifications would be an added advantage: CISSP, CCSP, GIAC cloud security certifications.
- Proven experience in a security management capacity, particularly in information‑rich industries (e.g., software, financial services).
- Proven track record of securing cloud‑based services, ensuring scalability, performance, and reliability.
- Expertise in a wide range of security domains: access controls, network security, cloud security, application security, secure software design, security testing, and vulnerability remediation, and incident management.
- Experience in cloud computing architectures, common technologies (e.g., AWS security tools). Good understanding of NIST security controls frameworks, risk assessment, and risk management.
- Familiarity with service control frameworks such as SOC 1 and SOC 2.
- Knowledge of threat modelling and risk management practices.
- Strong project management skills with experience leading cross‑functional teams in…
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: