<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel>
    <title>Information Security Analyst - Staffordshire - OCC Group RSS Feed</title>
    <link>https://jobs.co.uk/job/information-security-analyst-staffordshire-occ-group--a056e526-d15e-4b40-b89f-6fab08f29686</link>
    <description>RSS feed for Information Security Analyst - Staffordshire at OCC Group.</description>
    <language>en-gb</language>
    <lastBuildDate>Sat, 25 Apr 2026 17:29:30 GMT</lastBuildDate>
    <item>
      <title>Information Security Analyst - Staffordshire - OCC Group</title>
      <link>https://jobs.co.uk/job/information-security-analyst-staffordshire-occ-group--a056e526-d15e-4b40-b89f-6fab08f29686</link>
      <guid>https://jobs.co.uk/job/information-security-analyst-staffordshire-occ-group--a056e526-d15e-4b40-b89f-6fab08f29686</guid>
      <pubDate>Thu, 16 Apr 2026 23:00:00 GMT</pubDate>
      <description>Location: Staffordshire | Salary: Negotiable | Type: Permanent | Information Security Analyst - Staffordshire   Cyber Analyst to join the Information Security Team. Someone who can take those outputs from projects / tools and drive improvements. Looking for an experienced, proactive Security Analyst to ensure the correct level of security integrity to protect systems, information, personal data and people from cyber-attacks and unauthorised access. Working with other departments to ensure security systems are secure, fit for purpose and protected to an optimal level. You will be responsible for driving the security scrutiny, culture, awareness, and adoption across the business.   Security Toolsets and a Technical Mindset, you’re not expected or required to be an expert in all areas but expected to have a solid understanding and grounding in security principals to adapt to the varied requirements  Experienced in a wide variety of security software, systems, services and toolsets such as E-mail Security, EDR, NAC, IT/OT Segmentation, 365 etc along with an understanding of malware prevention, emerging threats, attacks and vulnerability management  Understanding of Information Security best practice for elements including workstations, servers, clou...</description>
      <category>Permanent</category>
    </item>
  </channel>
</rss>