top of page

Contract Recruitment

i-confidential specialises in delivering first-class cyber security and information risk solutions to support some of the UK's most successful companies.

Our associates are skilled professionals who can enhance and supplement existing teams or lead projects on behalf of our clients.

Below are roles we typically engage associates for on a contract basis.

Information Security Manager

  • Provide advice to our clients on information security and risk management whilst gaining valuable experience in security technology solutions.

  • Establish and maintain strong business relationships to assist with security and risk threats affecting their business. Apply deep knowledge of information security and business activities to highlight information risks to senior management and executives.

Security SMEs

  • Our security SMEs have deep knowledge of how to address the latest challenges.

  • These services can include security architecture & design, cyber security, risk & control, network security, identity and access management, DDoS, cloud, vulnerability management, incident management, third-party risk, and application security.

  • We look for and work with security leaders who can run complex security improvement programmes.  

Project / Programme Management

  • Responsible for project deliverables, maintaining overall project plans. Can proactively identify threats to project delivery and client-wide risks.

  • Will engage key stakeholders to identify and agree the key project objectives. These roles can also cover a variety of cyber security programmes.

Security Analysts

  • Work across a variety of security areas including Data Loss Prevention, I&AM, Third Party, Risk, Recertification, Network Security.

  • Provide security analysis whilst working under the direction of i-confidential management.

Business Analysts

  • Responsible for understanding and capturing requirements at both a business and technical level, along with identifying requirements across a variety of technologies.

  • Engage, influence and elicit requirements from stakeholders, recognising gaps and drawing out the important detail.

bottom of page