Digital Safety Risk Specialist
Date posted: 
Thursday, 3 June, 2021
Company: 
easyJet
Closing date: 
Wednesday, 30 June, 2021
Luton
Apply now

We have disrupted the way people travel since we started 25 years ago, and we don’t intend on stopping. We may be facing the biggest challenge in our history, but we are confident that throughout the pandemic we have taken the right action to build back stronger and better – and we want you to play a part in that and #belongherewithus.

We know that flexibility, balance and wellbeing are more important than ever right now. Whether that’s working remotely, part time, or needing extra support when times are tough – we are always #happytotalkflex.

We’re Europe’s leading airline – with a network of over 1000 routes across 35 countries.  We lead the industry in data, digital, web, engineering and operational innovations, to make travel easier and great value for our customer.

We have also been named as Britain’s Most Admired Company of 2020 in the transport sector, retaining the leading position for a second year running. We support. We empower. We excite. And we do it our way. We’re uniquely different. We’re easyJet.

 

Job Purpose

The cyber risk specialist is responsible for ensuring that cyber risk is understood and managed within easyJet. The purpose is to allow the company to make informed cyber risk decisions based on a consistent use of risk methodologies and terminology, alongside accurate knowledge of the assets, the threat landscape and the potential impact on the company’s activities.

Job Accountabilities

  • Maintain and improve standard risk assessment methodologies to be used to assess and record digital safety risk within easyJet in close liaison with the Head of Risk and Audit.

  • Maintain and manage the Digital Safety Risk Register

  • Perform ongoing risk assessments of easyJet assets

  • Provide management reporting and attend the relevant governance forums to report on Digital Safety risk status

  • Ensure that the asset register is kept up to date with the risk profile of each asset

  • Maintain the register of exceptions, assess and record the risk associated with any exceptions.

  • Develop and maintain bow-tie models of key risks which tie in with other team member’s measurements of control effectiveness.

  • Model statistical risk models based on risk models (e.g. Mote Carlo analysis)

  • Work closely with the Threat and Vulnerability Manager to maintain up to date awareness and reporting of the threat landscape and how it affects the probability of risk events occurring

  • Provide training and advice to colleagues in the Cyber Governance, Compliance, Assurance and Risk team, the wider LC&R team and other departments on the use of the risk methodology to encourage consistent risk measurement and reporting across the company.

  • Ensure that the underpinning risk and exceptions processes are fit for purpose and aligned with the Enterprise Risk approach

Ideal Qualifications

  • CRISC or similar (eg Institute of Risk Management)

  • COMPTIA Security + or other technical security qualification

  • Risk or mathematical degree

Desirable Skills/Experience

  • This role operates at SFIA level 3

  • Previous work in a security role and other complementary business roles where the management of some type of risk (e.g. product, project) formed part of the role’s responsibilities.

  • Candidates must have the essential skills identified.

  • Strong candidates will demonstrate the desirable skills.

Level of Responsibility Required

>Autonomy - Works under general direction. Uses discretion in identifying and responding to complex issues and assignments. Receives specific direction, accepts guidance and has work reviewed at agreed milestones. Determines when issues should be escalated to a higher level.

>Influence - Interacts with and influences colleagues. Has working level contact with customers, suppliers and partners. May supervise others or make decisions which impact the work assigned to individuals or phases of projects. Understands and collaborates on the analysis of user/customer needs and represents this in their work.

>Complexity - Performs a range of work, sometimes complex and non-routine, in a variety of environments. Applies methodical approach to issue definition and resolution.

>Knowledge - Has a sound generic, domain and specialist knowledge necessary to perform effectively in the organisation typically gained from recognised bodies of knowledge and organisational information. Demonstrates effective application of knowledge. Has an appreciation of the wider business context. Takes action to develop own knowledge.
 

Business skills

  • Demonstrates effective communication skills.

  • Plans, schedules and monitors own work (and that of others where applicable) competently within limited deadlines and according to relevant legislation, standards and procedures.

  • Contributes fully to the work of teams. Appreciates how own role relates to other roles and to the business of the employer or client.

  • Demonstrates an analytical and systematic approach to issue resolution.

  • Takes the initiative in identifying and negotiating appropriate personal development opportunities.

  • Understands how own role impacts security and demonstrates routine security practice and knowledge required for own work.

Information Security Skills Required - (based on IISP skills framework 2v3);

Skills Group

Essential

Skill level

Desirable

Skill level

A1 – Governance

2

4

A2 – Policy and Standards

1

 

A3 – Information Security Strategy

1

 

A4 – Innovation and Business Improvement

2

 

A5 – Behavioural Change

1

 

A6 – Legal & Regulatory Environment and Compliance

2

3

A7 – Third Party Management

1

2

B1 – Threat Intelligence, Assessment and Threat Modelling

3

5

B2 – Risk Assessment

3

4

B3 – Information Risk Management

3

4

C1 – Enterprise Security Architecture

 

 

C2 – Technical Security Architecture

 

 

C3 – Secure Development

 

 

D1 – Internal and Statutory Audit

 

1

D2 – Compliance Monitoring and Controls Testing

1

 

D3 – Security Evaluation and Functionality Testing

 

 

D4 – Penetration Testing and conducting Simulated Attack Exercises

 

 

E1 – Secure Operations Management

1

 

E2 – Secure Operations and Service Delivery

1

 

F1 – Intrusion Detection and Analysis

1

 

F2 – Incident Management, Incident Investigation and Response

 

 

F3 – Forensics

 

 

H1 – Business Continuity and Disaster Recovery Planning

1

2

H2 – Business Continuity and Disaster Recovery Management

1

2

H3 – Cyber Resilience

1

3

I1 – Research

 

 

I2 – Applied Research

 

 

J1 – Management, Leadership and Influence

1

 

J2 – Business Skills

2

4

J3 – Communication and Knowledge Sharing

2

 

K1 – Contributions to the Community

 

 

K2 – Contributions to the IS Profession

 

 

K3 – Professional Development

2

3

LOCATION & HOURS OF WORK
This full time role will be based in Luton, and will be 40 hours per week.

Apply now