Enable job alerts via email!
A leading UK accountancy firm is seeking a Security & IT Training Analyst to design and deliver technical training programs aimed at improving cybersecurity awareness and compliance. You will collaborate with multiple departments to enhance digital literacy and ensure all staff are well-versed in necessary IT protocols. This role offers flexible locations, a competitive salary, and a dedication to employee growth and well-being.
Security & IT Training Analyst
Flexible location - Peterborough, Milton Keynes, Birmingham, Preston
Competitive salary, negotiable depending on your experience and expertise + benefits
What Sets Us Apart
At MHA, we're about people first - our people, our clients, and the communities we serve. As one of the UK's top 15 accountancy firms and a proud member of Baker Tilly International, the 9th largest network in the world, we are a hub of global knowledge with a strong local commitment.
Our people-focused approach truly sets us apart. Here, you won't just be another face in the firm; you'll be part of an ambitious, driven team dedicated to continuous learning and growth. We invest in our people because they are the foundation of our success. We take immense pride in being awarded gold for Investors in People. This recognition reflects our deep commitment to nurturing talent and ensuring every individual feels valued and supported.
Purpose of the Role
As the Security & IT Training Analyst, you will be responsible for designing, delivering, and evaluating engaging technical and security training programmes that empower our employees to thrive in a secure, technology enabled environment. Acting as the crucial bridge between our technical controls and our people centric culture, you'll ensure that all staff possess the IT knowledge and cyber awareness required to perform their roles effectively, securely, and in compliance with policy and regulatory requirements.
You will work collaboratively with IT, HR, and system leads to identify training needs, improve digital literacy, and support the successful adoption of new technologies and systems.
In addition, you'll lead the development and upkeep of high-quality training materials spanning both general IT and IT security content and be accountable for reporting on key awareness metrics and training KPIs.
Your efforts will ensure that every employee is not only a confident user of our systems but also a proactive first-line defender of our digital estate.
Qualification and Essential Skills
Qualifications:
Main Responsibilities
Training Programme Design & Delivery
Develop and deliver a modular, business-aligned Security and IT training curriculum covering topics such as phishing, password hygiene, secure remote working, and core digital tools through classroom, virtual, and self-paced formats
Awareness & Behavioural Change Campaigns
Plan and execute engaging security awareness initiatives using newsletters, posters, short-form videos, e-learning, and simulated phishing exercises to foster a proactive security culture across the organisation.
LMS Administration & Training Governance
Manage learning journeys via the KnowBe4 Learning Management System (LMS), monitor participation and proficiency metrics, identify gaps, and ensure all training records support internal and external audit readiness.
Risk-Informed Training Enhancements
Collaborate with the Head of IT Security to interpret cyber risk assessments, maintain the risk register, and shape training content that addresses emerging threats and control gaps.
Process & Reporting Oversight
Maintain IT Security Management System (ISMS) documentation, support the upkeep of standard operating procedures, and generate data-driven training dashboards for senior stakeholders, focusing on completion rates, behavioural impact, and ROI.
Cross-Functional Enablement
Work with the IT Service & Systems teams to embed training into technology rollouts and ensure alignment with regulatory frameworks such as GDPR and ISO27001.
User-Centric Control Adoption
Support implementation of key security controls (e.g. MFA, endpoint protection) through tailored enablement materials how-to guides, live workshops, and FAQs bridging the gap between technical rollout and user adoption.
Financial responsibilities and authority limits
Communications
Problems and Issues
Decision Making Parameters
Delegation
The offering
And more!