Job summary
This is a leading senior technical role within PHU, with primary accountability for the definition of cyber security solutions and secure architecture for applications, information, and infrastructure.
Main duties of the job
You will be responsible for providing expert security advice and designing secure technology solutions for the Trust. The successful candidate will act as champion for the department's security processes and provides leadership in securing the enterprise architecture technologies operated by the Trust and external vendors, suppliers, and other stakeholders.
About us
Here at Portsmouth Hospitals University NHS Trust, we are proud to provide expert, compassionate care for our local population. We are ranked as the third in the country for research, embedding education and training across the organisation. Our main hub is the Queen Alexandra Hospital, which is one of the largest hospitals on the south coast employing over 8,700 staff.
Our patients come from all walks of life and so do we. We hire great people from a wide variety of backgrounds because it makes our hospital stronger. If you share our values and our enthusiasm for getting it right for patients, colleagues, and our community, you will find a home at Portsmouth Hospitals University NHS Trust.
Job description
Job responsibilities
Acquire a complete understanding of the Trusts enterprise architecture including, business processes, technology and information systems.
Responsible for the technology security standards, lead engineer for security technology platforms and tools.
Plan, research, and design security architectures for both technical and business led projects.
Perform vulnerability testing, risk analyses and security assessments.
Research security standards, security systems and authentication protocols.
Review and approve installation of firewall, VPN, IDS and NAC policies and devices.
Define, implement, and maintain trust security policies and procedures.
Respond immediately to security-related incidents and provide a thorough post-event analysis.
Act as a champion of knowledge and skills in security specific areas of technologies, sharing these skills and knowledge with colleagues within the department. Develop staff so they can better understand how the Security architecture and IT components interact with each other.
Job description
Job responsibilities
Acquire a complete understanding of the Trusts enterprise architecture including, business processes, technology and information systems.
Responsible for the technology security standards, lead engineer for security technology platforms and tools.
Plan, research, and design security architectures for both technical and business led projects.
Perform vulnerability testing, risk analyses and security assessments.
Research security standards, security systems and authentication protocols.
Review and approve installation of firewall, VPN, IDS and NAC policies and devices.
Define, implement, and maintain trust security policies and procedures.
Respond immediately to security-related incidents and provide a thorough post-event analysis.
Act as a champion of knowledge and skills in security specific areas of technologies, sharing these skills and knowledge with colleagues within the department. Develop staff so they can better understand how the Security architecture and IT components interact with each other.
Person Specification
Qualifications
Essential
- Degree level qualification or equivalent in computer science, Cyber security, or a related field.
- Technical accreditation in at least two or more of the following:
- Microsoft Certified Systems
- Engineer (MCSE) Cisco Certified Network Associate Security (CCNA Security), VMware VCP
- ITIL Foundation Certificate
- Evidence of continuing professional development.
Desirable
- ITIL Practitioner qualification
- CISSP: Certified Information Systems Security Professional
- CISSP-ISSAP: Information Systems Security Architecture Professional
- CISM: Certified Information Security Manager
- CEH: Certified Ethical Hacker
- CSSA: Certified SCADA Security Architect
- CCP: CESG Certified Professional
- Cisco Cybersecurity specialist (SCYBER)
- Cisco Certified Network Professional Security (CCNP Security)
- Cisco Certified Internetwork Expert Security (CCIE Security)
- Enterprise architecture frameworks such as TOGAF, SABSA.
- Checkpoint (CCSA, CCSE, CCMSE, CCSM)
- BCS Practitioner in Information Assurance Architecture
- GIAC Global Information Assurance Certifications.
Experience
Essential
- Advanced theoretical and enterprise knowledge across three or more information technology platforms: Server Virtualisation, Desktop Virtualisation, Data & Voice Networking, Messaging, Storage Area Networks, Security, Mobility, Server & Peripheral Hardware.
- Advanced theoretical and enterprise knowledge across Network Data & Infrastructure Security
- Significant experience of pragmatic Security risk assessments through frameworks of security controls and security management strategies
- Significant experience of IT Service Management, Incident Management, Problem Management, Change Management, Performance Management & Availability Management.
- Significant experience of Security Architecture Design
- Significant experience in leading highly complex technical and security problems to resolution, including team management, and managing external suppliers.
- Significant experience in leading project delivery of technical projects.
- Experience in assisting with report writing, being operating procedures, options appraisals, Security policy writing, risk analysis, user guides.
- At least 5-10 years of relevant IT experience, including exposure to business planning, systems analysis and application development.
Desirable
- At least 3-5 years of relevant IT experience devoted specifically to security.
- Knowledge and understanding of the HSCIC Information Governance guidance, including but not limited to: -
- Confidentiality - Standards of practice for health record confidentiality
- IG Toolkit - IC standards and guidance for NHS and partner organisations
- Information Security - Safeguards and guidelines for protecting patient data.
- NHS Codes of Practise and legal obligations
- Information Governance Alliance (IGA)
- National Data Guardian (NDG).
Additional criteria
Essential
- Excellent interpersonal and explanatory skills in dealing with a wide range of information technology users from skilled to ICT-illiterate.
- Excellent verbal/written communication skills, with the ability to present within a group.
- Good team-player, highly motivated individual to support the delivery of an efficient, effective customer-focused support service.
- Good presentation and negotiation skills to produce and present formal proposals and get proposals accepted.
- Excellent planning and time-management skills.
- Good negotiating and relationship-building skills to gain maximum benefit for customers from software suppliers and internal ICT providers.
- Able to set clear and appropriate priorities, with the ability to deal with conflicting demands, unpredictable work patterns, and multiple deadlines.
- Good technical knowledge to understand and resolve enterprise technical problems.
- Excellent knowledge of data protection and information security/governance issues.
- Good knowledge of providing proactive IT System/Network performance monitoring.
- PERSONAL QUALITIES
- Essential:
- Service-orientated, customer-focused.
- Self-motivated, enthusiastic, and confident.
- Methodical, logical, and numerate.
- Patient and flexible, able to operate as part of a team, accepting and resilient.
Desirable
- Security monitoring detection and response software.
Person Specification
Qualifications
Essential
- Degree level qualification or equivalent in computer science, Cyber security, or a related field.
- Technical accreditation in at least two or more of the following:
- Microsoft Certified Systems
- Engineer (MCSE) Cisco Certified Network Associate Security (CCNA Security), VMware VCP
- ITIL Foundation Certificate
- Evidence of continuing professional development.
Desirable
- ITIL Practitioner qualification
- CISSP: Certified Information Systems Security Professional
- CISSP-ISSAP: Information Systems Security Architecture Professional
- CISM: Certified Information Security Manager
- CEH: Certified Ethical Hacker
- CSSA: Certified SCADA Security Architect
- CCP: CESG Certified Professional
- Cisco Cybersecurity specialist (SCYBER)
- Cisco Certified Network Professional Security (CCNP Security)
- Cisco Certified Internetwork Expert Security (CCIE Security)
- Enterprise architecture frameworks such as TOGAF, SABSA.
- Checkpoint (CCSA, CCSE, CCMSE, CCSM)
- BCS Practitioner in Information Assurance Architecture
- GIAC Global Information Assurance Certifications.
Experience
Essential
- Advanced theoretical and enterprise knowledge across three or more information technology platforms: Server Virtualisation, Desktop Virtualisation, Data & Voice Networking, Messaging, Storage Area Networks, Security, Mobility, Server & Peripheral Hardware.
- Advanced theoretical and enterprise knowledge across Network Data & Infrastructure Security
- Significant experience of pragmatic Security risk assessments through frameworks of security controls and security management strategies
- Significant experience of IT Service Management, Incident Management, Problem Management, Change Management, Performance Management & Availability Management.
- Significant experience of Security Architecture Design
- Significant experience in leading highly complex technical and security problems to resolution, including team management, and managing external suppliers.
- Significant experience in leading project delivery of technical projects.
- Experience in assisting with report writing, being operating procedures, options appraisals, Security policy writing, risk analysis, user guides.
- At least 5-10 years of relevant IT experience, including exposure to business planning, systems analysis and application development.
Desirable
- At least 3-5 years of relevant IT experience devoted specifically to security.
- Knowledge and understanding of the HSCIC Information Governance guidance, including but not limited to: -
- Confidentiality - Standards of practice for health record confidentiality
- IG Toolkit - IC standards and guidance for NHS and partner organisations
- Information Security - Safeguards and guidelines for protecting patient data.
- NHS Codes of Practise and legal obligations
- Information Governance Alliance (IGA)
- National Data Guardian (NDG).
Additional criteria
Essential
- Excellent interpersonal and explanatory skills in dealing with a wide range of information technology users from skilled to ICT-illiterate.
- Excellent verbal/written communication skills, with the ability to present within a group.
- Good team-player, highly motivated individual to support the delivery of an efficient, effective customer-focused support service.
- Good presentation and negotiation skills to produce and present formal proposals and get proposals accepted.
- Excellent planning and time-management skills.
- Good negotiating and relationship-building skills to gain maximum benefit for customers from software suppliers and internal ICT providers.
- Able to set clear and appropriate priorities, with the ability to deal with conflicting demands, unpredictable work patterns, and multiple deadlines.
- Good technical knowledge to understand and resolve enterprise technical problems.
- Excellent knowledge of data protection and information security/governance issues.
- Good knowledge of providing proactive IT System/Network performance monitoring.
- PERSONAL QUALITIES
- Essential:
- Service-orientated, customer-focused.
- Self-motivated, enthusiastic, and confident.
- Methodical, logical, and numerate.
- Patient and flexible, able to operate as part of a team, accepting and resilient.
Desirable
- Security monitoring detection and response software.
Disclosure and Barring Service Check
This post is subject to the Rehabilitation of Offenders Act (Exceptions Order) 1975 and as such it will be necessary for a submission for Disclosure to be made to the Disclosure and Barring Service (formerly known as CRB) to check for any previous criminal convictions.
Applications from job seekers who require current Skilled worker sponsorship to work in the UK are welcome and will be considered alongside all other applications. For further information visit the UK Visas and Immigration website (Opens in a new tab).
From 6 April 2017, skilled worker applicants, applying for entry clearance into the UK, have had to present a criminal record certificate from each country they have resided continuously or cumulatively for 12 months or more in the past 10 years. Adult dependants (over 18 years old) are also subject to this requirement. Guidance can be found here Criminal records checks for overseas applicants (Opens in a new tab).
Additional information
Disclosure and Barring Service Check
This post is subject to the Rehabilitation of Offenders Act (Exceptions Order) 1975 and as such it will be necessary for a submission for Disclosure to be made to the Disclosure and Barring Service (formerly known as CRB) to check for any previous criminal convictions.
Applications from job seekers who require current Skilled worker sponsorship to work in the UK are welcome and will be considered alongside all other applications. For further information visit the UK Visas and Immigration website (Opens in a new tab).
From 6 April 2017, skilled worker applicants, applying for entry clearance into the UK, have had to present a criminal record certificate from each country they have resided continuously or cumulatively for 12 months or more in the past 10 years. Adult dependants (over 18 years old) are also subject to this requirement. Guidance can be found here Criminal records checks for overseas applicants (Opens in a new tab).