London Jobs |
Manchester Jobs |
Liverpool Jobs |
Nottingham Jobs |
Birmingham Jobs |
Cambridge Jobs |
Glasgow Jobs |
Bristol Jobs |
Wales Jobs |
London Jobs |
Manchester Jobs |
Liverpool Jobs |
Nottingham Jobs |
Birmingham Jobs |
Cambridge Jobs |
Glasgow Jobs |
Bristol Jobs |
Wales Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Leeds |
Education | Not Mentioned |
Salary | Competitive salary |
Industry | Not Mentioned |
Functional Area | Not Mentioned |
Job Type | Permanent , full-time |
Burberry is a British luxury brand, headquartered in London. INTRODUCTION At Burberry, we believe creativity opens spaces. Our purpose is to unlock the power of imagination to push boundaries and open new possibilities for our people,our customers and our communities. This is the core belief that has guided Burberry since it was founded in 1856 and is central to how we operate as a company today. We aim to provide an environment for creative minds from different backgrounds to thrive,bringing a wide range of skills and experiences to everything we do. As a purposeful, values-driven brand, we are committed to being a force for good in the world as well, creating the next generation of sustainable luxury for customers, driving industry changeand championing our communities. JOB PURPOSE The Security Business Analyst will support the Security Improvement Programme (SIP) by establishing strong relationships and working effectively with third-party and internal teams.The goal is to establish a set of baseline IT assets and security-related business processes. The Security Business Analyst will work with the business information owners and IT to document where critical information is, how/when its used, and where it goes.They will document in-scope assets, owners, associated business processes, and their priority. Additionally, they will work to document current controls in place protecting customer and people data, establish repeatable processes to maintain information, andfacilitate workshops to gather required information for secure configurations. RESPONSIBILITIES