London: +44 (0) 20 3119 3300  |  Birmingham: +44 (0) 20 3119 3399 (8:30am - 6pm UK office hours)


RSR Cyber represents a large range of roles in terms of skill sets and seniority including:

Sales and Marketing:

Sales and Marketing roles are tasked with relationship building, generating leads and driving revenue on behalf of their organisation. The salaries typically include bonuses and commission – based on performance to achieve an OTE (on target earnings).

The right sales and marketing team are able to increase profits and brand authority in the market through successful positioning and lead generation.

Sales and marketing teams represent the commercial arm of a vendor or SI consultancy and work to build granular strategies that can meet broader business objectives.

If you are looking for your next career move, a Sales and Marketing role would be an ideal fit if you are creative, analytical and a good communicator. Sales and Marketing represent the frontline of your organisation and are responsible for creating value from the products and services available.

Typical roles within sales and marketing in the cyber security industry are in support to sales or in direct or channel sales themselves. Typical roles include Channel managers, business development managers, marketing managers, sales operations, and inside sales.

Sales Engineering:

Sales Engineers support the sales function of an organisation and provide technical expertise in a customer facing environment. Salaries reflect the level of experience of the individual, market area and location of the organisation.

We have seen the change in the way clients are using and buying technology due to cloud and virtualization solutions. The opportunity for IT Security Vendors to develop new solutions and propositions around these technologies will have created a demand for new skills within your Pre-Sales and Product Management teams. In today’s high-tech world, it is essential for End Users of all sizes to source and integrate the latest software, to ensure information is completely safe. For the IT Security vendors supplying these solutions finding the right sales engineers is vital.

Acumin is deeply connected with the vendor space across EMEA and support our candidates for the length of their careers in this space. Take a look at our current roles and get in contact – if you have a specific organisation in mind we may be able to help you make the connection.


Intelligence roles can be varied in skills disciplines such as Cyber Security, Cloud Security, Data Privacy and Information Assurance. Some of the specific skills in this area are: Cyber Risk, Threat Management, Incident Response and Managed Security Monitoring.

If you are looking for your next job opportunity as a specialist in counter-terrorism, incident response and threat management/mitigation to protect organisations from external threats then take a view of our latest vacancies or contact us for support.

Information Security and Risk Management:

Risk Management roles are vital for organisations to keep control of the threats upon them, and roles within organisations heavily depend on factors such as size of company, teams and sector in which the company sits. For those working at a strategic level, individuals working in security and risk management will set the processes for what best practice looks like for a company.

Aside from setting strategies, common Security and Risk management roles relate to practitioner based role requirements – developing information security management systems (ISMS) through the creation and implementation of security policies and procedures. As part of this provision, they set the criteria that technical controls will follow, and are effectively the formalisation of requirements that technical security controls will serve to meet.

Often in environments where compliance is not a direct concern, security and risk management professionals will develop an internal standard for compliance, or will take a risk-based approach that allows them to ascertain effective levels of cyber security whilst still acting as an enablement function.

Acumin place candidates in roles including Information Security Officer, Information Security Manager, Information Risk Manager, Security Awareness Manager, and Information Security Analysts. Take a look at our latest vacancies or contact us today to hear about what we have on offer.

Governance and Compliance:

Able to look at the bigger picture and drill down into detail, regulatory professionals are responsible for the governance and compliance within an organisation, ensuring the company is meeting cyber security and information risk standards.

Tracking and assessing the effectiveness of security controls means a company can be accountable in their approach to cyber security and information risk. Furthermore, it means that they are able to identify where the execution of their security strategy has met expectations or where it has fallen short, and so remedial actions can be taken.

Common regulatory roles include Governance and Compliance Manager, Information Security Assurance Manager, Accreditor, ISO27001 Auditor, PCI-QSA, and Data Protection Manager.

Programme & Project Management:

Programme and Project Managers have to have the experience and intuition to manage multiple projects simultaneously; largely with broad scopes and high levels of difficulty. Extensive analytical skills are vital to be successful in these roles which promise a diverse and challenging career path.

Some of our Programme Manager role remits are based in managing global programs and services, and require working with IT, security and engineering teams to provide support to meet corporate objectives around effective cyber security.

View our roles or get in touch to learn more about similar vacancies we are currently recruiting.

Security Management:

Security Management roles needs to be able to find a balance between the day to day management of security practises within the organisation by managing the outputs of security analysts. The second core responsibility of this career path is in establishing policy, architecture and training processes to ensure the organisations maintains correct procedures to reduce risk. Communication is vital to the success of these roles and an ability to demonstrate requirements and effectiveness to the board is vital.

Acumin support clients find the right security managers with both managerial flair and the right technical capabilities for the role. If you are looking for your next managerial role please take a look at our vacancies or contact us to learn more about some of our other opportunities.

Penetration Testing and Digital Forensics:

With so much information stored digitally, it is vital for businesses to ensure that their data cannot be maliciously accessed by unauthorised sources. Acumin provide Digital and Network Forensics, Intrusion Analysts, Security Operations and Penetration Testing specialists to investigate why the systems become compromised and how access was gained.

A penetration test or vulnerability assessment is a proactive and authorised attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system weaknesses within operating systems, infrastructures, applications and configurations.

As the leading recruiter in the information risk management sector for 20 years we work with a plethora of clients and frequently have roles within this career path on offer. Get in touch for more details.

Executive Management:

Executive Management roles include the most senior of the roles within the industry, both in the End User and Vendor markets. Those who hold such titles usually represent diverse experience across both technical and commercial domains. The sector in which the organisation sits, alongside the size of the organisation have a direct effect on the range of salaries available.

Technical Security:

Careers in this area of technical security can develop to be especially lucrative and grow in managerial responsibility.

Acumin has a long and credible history in providing contract and permanent IT Security staff, whether in-house, or as part of a consultancy operation, we provide Security Engineers, Application security architects, Network Security Analysts and Technical Security experts. We have helped our clients ensure that they mitigate the risks associated with this changing landscape and enabled stable career moves on behalf of our expansive database.

Security Architecture:

Roles in this area of technical security are demanding and generally include managerial scope. Those looking for a Security Architecture role will likely focus predominantly on High Level Design looking at the workflow and broad controls. Responsibilities will translate the security policy into technical specifications. There are many different specialisms within Security Architecture for which Acumin frequently represent roles including Security Solutions Architects, Enterprise Security Architects and Application Security Specialists and Architects.


CISO is a fairly broad job title, this can be a managerial, executive leadership or board-level role. Responsibilities will often involve developing and implementing an information security program, with include procedures and policies designed to protect enterprise communications, systems and assets from internal and external threats.

Roles under this title often require a broad background leading and developing cyber security functions, covering all aspects of information risk management privacy, governance, and effecting and implementing real change within organisations. If you are looking for your next senior role within an organisation take a look at our latest vacancies.

DV and SC Cleared Jobs:

SC clearance is the most widely held level of security clearance within the UK government.

DV clearance is the most detailed and comprehensive from of security clearance in the UK government.

Both forms of security clearance require individuals to have frequent and uncontrolled access to government SECRET assets. If DV clearance is required then the role will likely involve frequent and uncontrolled access to TOP SECRET government assets.

Acumin have built relationships within the UK public sector as part of our 20 year tenue in the cyber security industry. We are a Crown commercial Services (CCS) approved supplier for all IT and Cyber Security and approved to recruit and deliver against multiple government frameworks.

Acumin support our candidates by offering SC Clearance in house, and conduct a meticulous selection process.

Application Security:

Roles in this area are centred on improving the security of an application. This is done by finding, fixing and preventing security vulnerabilities. Application security roles are split into analysts and managers, with the latter being responsible for a team of analysts within an organisation.

Information/Risk Assurance:

Working in technology and risk assurance often entails testing and reviewing the effectiveness of key IT controls, reviewing business processes, assessing large scale business change projects and performing data analysis over critical information.

Dev Sec Ops:

Dev Sec Ops Engineers are tasked with developing, building and testing secure applications for the organisations they work in. Fluency in scripting languages such as Ruby or Phython are critical. Dev Sec Ops Engineers usually have to provide vulnerability assessments of company assets and deliver recommendations and in some situations, assistance to resolve issues. A few years’ experience in a technical security role are advantageous before moving across to Dev Ops, as is a CISSP qualification and knowledge of ISO 270001.

Identity Management:

Identity and Access Management (IAM) Manager and specialists utilise IAM technologies to control user access within their organisation’s network. IAM specialists are able to dictate access levels of user within organisations depending on their role requirements or seniority. Identity and Access Management are a set of principles and processes that make up a framework designed to securely manage electronic or digital identities of those working on connection to the organisation.

Last edited: 1st June 2018