Negotiable
Undetermined
Remote
Reading, England, United Kingdom
Summary: The Cyber Security Business Analyst role focuses on delivering business analysis outputs for cyber security projects, ensuring they meet regulatory obligations and represent value for money. The position requires effective requirements management and documentation for complex cyber programmes, along with stakeholder engagement and communication. Candidates must have experience in cyber security projects and the ability to translate technical requirements for diverse audiences. The role is primarily remote with occasional presence in Reading, England.
Key Responsibilities:
- Ensure all business analysis outputs are fit-for-purpose and delivered on time.
- Engage in technically oriented projects to meet regulatory obligations.
- Conduct requirements gathering and manage business analysis deliverables.
- Facilitate workshops and apply business analysis methods for requirements validation.
- Translate complex cyber security requirements into actionable insights.
- Draft detailed project appraisal documents and maintain discovery phase artefacts.
- Collaborate with stakeholders for requirements gathering and project updates.
- Maintain thorough documentation of processes and project progress.
- Facilitate communication between technical teams and non-technical stakeholders.
Key Skills:
- In-depth understanding of enterprise cyber security principles and GRC.
- Experience in requirements gathering and business analysis techniques.
- Knowledge of IT infrastructure, network monitoring, IPS, and IDS.
- Experience in regulated industries and compliance frameworks.
- Prior experience in network security, data protection, and classification.
Salary (Rate): undetermined
City: Reading
Country: United Kingdom
Working Arrangements: remote
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
Cyber Security Business Analysts - remote and Reading occasionally - 12 months ONLY APPLY IF YOU HAVE WORKED ON CYBER SECURITY PROJECTS
In depth understanding of enterprise cyber security principles, GRC
Role BA on a Cyber Project Delivery- It will be ensured that all BA output for the project is fit-for-purpose, represents value for money, and is delivered on time. Involvement will be in technically oriented projects that enable the organisation to meet its regulatory obligations. Business outcomes will be ensured through effective requirements management using BA best practice techniques and tools.
Requirements gathering experience will be applied, along with the ability to engage the business in understanding their needs to deliver business solutions. Business Analysis deliverables on large and complex Cyber programmes will be completed, with comprehensive and accurate documentation (eg, process mapping, data flow diagramming, user cases, customer journey mapping) being produced.
Workshops with the business will be facilitated using a variety of business analysis methods, including gap analysis, requirements gathering, and validation. Agreement between the business customer and solution provider on requirements, including traceability management across the full project life cycle, will be established and maintained.
Skills Requirement Articulation: Translate complex cyber security requirements into clear, actionable insights for both technical teams and executive leadership.
Project Appraisal Documents: Draft detailed project appraisal documents, including objectives, scope, risks, and benefits.
Discovery Phase Artefacts: Develop and maintain artefacts such as process maps, requirement specifications, and risk assessments during the discovery phase of projects.
Stakeholder Engagement: Collaborate with stakeholders to gather requirements, provide updates, and ensure alignment with business goals.
Documentation: Maintain thorough documentation of all processes, requirements, and project progress.
Communication: Facilitate effective communication between technical teams and non-technical stakeholders, ensuring mutual understanding and alignment.
Desirable . Substantial experience of working on projects involving broad-based business and IT change with experience gained on cyber security, Data Classification, Encryption, DLP methodologies.
. Experience working in a regulated industry or with compliance frameworks
Tech, domain Skills * In depth understanding of enterprise cyber security principles, GRC . Knowledge of IT infrastructure, network stack, network monitoring, IPS, IDS. . Prior experience in Network Security, Data protection, classification will be an added advantage.