INFORMATIONSECURITYMANAGER Our client is one of the largest owner-operators of rapid electric vehicle charging stations across the UK and Europe. They are award winners and are currently short listed for " The Best Place to Work" . They are growing and expanding at pace, are you up for the ride? They are seeking a highly … skilled and experienced InformationSecurityManager to join our team. You will work closely with the client's international IT team to lead the organisation's cybersecurity and information risk agenda, including oversight of ISO 27001 and broader security governance across the business. Key Responsibilities : Maintain the InformationSecurity Management System (ISMS) in … compliance with ISO 27001:2022 standards. Establish, maintain and enforce security policies, procedures, and controls to mitigate informationsecurity risks and vulnerabilities. Conduct regular risk assessments and vulnerability assessments to identify potential threats and weaknesses in our informationsecurity infrastructure. Collaborate with internal stakeholders to ensure that informationsecurity requirements are integrated into More ❯
Salary: 50.000 - 65.000 € per year Requirements: Completed degree in informationsecurity, business information technology, computer science, business administration, or a similar field/qualification. Several years of experience in informationsecurity management/governance, or other information risk management functions. Profound knowledge of informationsecurity industry standards and regulatory requirements, e.g., ISO … of control system (OT) architecture is a plus. Relevant professional qualifications/certifications, e.g., CISM, CRISC, CISSP. Excellent communication and interpersonal skills. Proactive mindset to anticipate and address potential security issues before they become critical. Effective project management skills to oversee the implementation of security initiatives. Fluency in written and spoken English; German is a plus. Responsibilities: As … the InformationSecurity Governance Manager, I support the development and implementation of Uniper's informationsecurity strategy, InformationSecurity Management System (ISMS) policies, and governance framework. My role focuses on establishing and maintaining a robust and comprehensive security framework to ensure adherence to regulatory requirements, industry best practices, and standards. The mission More ❯
operate, and maintain cyber-physical solutions for the nation's most recognizable mission critical facilities, secure environments, complex infrastructure, and global enterprises. The company's capabilities include electrical, electronic security, telecommunications, life safety, automation and controls, audio visual, and IT systems. M.C. Dean is headquartered in Tysons, Virginia, and employs more than 5,800 professionals who engineer and deploy … and change the world for the better. We are driven by our core values of agility, expertise, and trust. Clearance Requirement: Applicants selected will be subject to a government security investigation and must meet eligibility requirements, including U.S. Citizenship, for access to classified information; Active TS/SCI clearance required. Responsibilities The Information System SecurityManager … ISSM) is responsible for the development, implementation, and continuous improvement of cybersecurity functions for multiple critical systems and for providing strategic and tactical leadership to a cybersecurity staff, including Information System Security Officer(s) and cybersecurity analysts. In collaboration with the Facility Security Officer (FSO) and business leadership, take responsibility for establishing Information Systems SecurityMore ❯
Your new company - Financial Services Your new role - Permanent - ON SITE 5 Days per week. - UK OnlyLiaison with the Head Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards … are in place and in line with local regulations.The ideal candidate will be responsible for managing informationsecurity systems, ensuring compliance with regulatory requirements, and conducting thorough security audits. You will be part of the IT committee and work closely with the risk and compliance team. Ideally, having a background in IT/Network security, progressing … into informationsecurity and cybersecurity with experience to achive cyber essentials. **Key Responsibilities:** - Develop, draught, implement, and maintain informationsecurity policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards ISO 27001 & Cyber Essentials.- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations More ❯
A well-established business is looking for an accomplished InformationSecurityManager to join its team based in Uxbridge, west London. Please note this is an office-based role, so you will work from the office 5 days per week. In this role of significant responsibility, you will design and lead the informationsecurity strategy … for the organisation. Supported by a Cyber Security Analyst you will provide InfoSec expertise, ensuring that the business has a secure, resilient and robust technology estate, and will also ensure that effective security governance policies and procedures are in place. In order to be suitable for this role, you must be a highly capable informationsecurity … track record of delivering secure, compliant and robust systems and procedures. CISSP or similar accreditation would be highly advantageous to your application.Key responsibilities will include: - Evolving a cyber and informationsecurity strategy to achieve ISO27001 accreditation - Lead the design, implementation, and continuous improvement of the InformationSecurity Management System (ISMS) - Work with senior stakeholders to ensure More ❯
InformationSecurityManager Location: London, Hybrid Salary: Up to 75,000 Reports to: Head of Cyber Security A well regarded Managed Service Provider is seeking an experienced InformationSecurityManager to join its team on a permanent basis. This role offers the opportunity to lead and deliver strategic security initiatives across a … will have a proven background within an MSP or MSSP environment, hold CISSP certification, and demonstrate deep expertise in GRC frameworks, particularly ISO27001. Experience acting as a virtual Chief InformationSecurity Officer (vCISO) is essential. This business has made significant investment into its SOC-as-a-Service offering, positioning itself at the forefront of managed security solutions … and enabling clients to benefit from cutting-edge threat detection and response capabilities. Key Responsibilities: Serve as a vCISO for clients, providing strategic guidance on security posture and compliance Lead the development and implementation of security policies, procedures, and controls Manage ISO27001 compliance, including internal and external audits Conduct risk assessments and oversee incident response planning Collaborate with More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Context Recruitment Limited
InformationSecurityManager Location: London, Hybrid Salary: Up to 75,000 Reports to: Head of Cyber Security A well regarded Managed Service Provider is seeking an experienced InformationSecurityManager to join its team on a permanent basis. This role offers the opportunity to lead and deliver strategic security initiatives across a … will have a proven background within an MSP or MSSP environment, hold CISSP certification, and demonstrate deep expertise in GRC frameworks, particularly ISO27001. Experience acting as a virtual Chief InformationSecurity Officer (vCISO) is essential. This business has made significant investment into its SOC-as-a-Service offering, positioning itself at the forefront of managed security solutions … and enabling clients to benefit from cutting-edge threat detection and response capabilities. Key Responsibilities: Serve as a vCISO for clients, providing strategic guidance on security posture and compliance Lead the development and implementation of security policies, procedures, and controls Manage ISO27001 compliance, including internal and external audits Conduct risk assessments and oversee incident response planning Collaborate with More ❯
Sr. Manager, Virtual Chief InformationSecurity Officer (vCISO) About Workstreet At Workstreet, we're on an exciting journey to help businesses scale securely by building and implementing cutting-edge security and compliance programs. As a fast-growing startup, we specialize in compliance frameworks like SOC 2, ISO 27001, and GDPR, empowering companies to meet regulatory standards … strengthen their cybersecurity posture from day one. We've partnered with Vanta, which has significantly driven our business and contributed to our growth! We are seeking an experienced Sr. Manager, Virtual Chief InformationSecurity Officer (vCISO) to serve as an embedded security leader for our portfolio of high-growth Silicon Valley unicorns and technology companies. This … is a hands-on, client-facing role perfect for a security expert who thrives on solving complex technical challenges and wants to be deeply involved in building world-class security programs. This position focuses on direct client engagement and technical leadership rather than people management. Work directly with some of the most innovative unicorns as their trusted CISO. More ❯
Job summary We are seeking an Information Governance & Cyber SecurityManager to lead the second line of defence across Information Governance, Cyber Security, Quality, and Digital Clinical Safety. In this role, you will oversee the operational delivery of InHealths management systems, ensuring compliance, accountability, and consistency across the business. You will provide strong leadership, manage … governance priorities that protect our patients, staff, and services. This is a pivotal position for someone who is enthusiastic, motivated, and passionate about embedding high standards of quality and security across a healthcare organisation. This is a full-time permanent role, working remotely. There will be travel to InHealth sites as part of the role. Main duties of the … job Information Governance: Oversee policy frameworks, DPIAs, DSAs, and regulatory compliance, and lead the Data Security Protection Toolkit return. Cyber Security: Manage security policies, lead ISO 27001 certification, embed data security practices, and oversee incident response. Digital Clinical Safety: Maintain digital clinical safety policies (DCB0129/0160), ensure training compliance, and support safety case documentation. More ❯
Overview London - UK/IT/Navro - Pioneering the Future of Payments Architecting Trust: InformationSecurityManager This isn't just another InformationSecurity role. No legacy systems. No corporate red tape. No coasting. This is about building something from the ground up. Fast. You won't have layers of approval slowing you down. You … decisions from day one. This isn't a passenger role. We're bringing you in for your expertise and your relentless drive. You will be responsible for understanding our information assets, identifying emerging threats, and implementing robust security measures that protect Navro and our clients. Who We Are We are transforming payments for global platforms and e-commerce … is inconsistent, you dive in, solve, and fix it. You're Hands-On - One hour you're leading on an external audit, the next assessing a critical vendor's security posture, the next you're deep in the vulnerability rating details with DevOps. You Thrive in Chaos - Startups are messy. Deadlines change, priorities shift, and ambiguity is constant. You More ❯
rewarding experiences a career can offer. If that sounds exciting to you, you're in the right place. About the Role: We are seeking a proactive and commercially-minded InformationSecurity & Compliance Manager to join our team. This is a mid-level individual contributor role suited for someone who thrives in a fast-paced environment, is comfortable … wearing multiple hats, and is equally excited by InfoSec and hands-on compliance operations. This role will focus primarily on security, data privacy, compliance, and regulatory matters. You will play a key role in helping the business stay compliant with relevant laws and standards, including oversight of our SOC 2 compliance processes, while also helping to drive practical compliance … solutions across the business. A background in Security Engineering is a big plus as it would enable you to own the end-to-end architecture and technical execution of our security controls and systems. Key Responsibilities: Operational Security & Security Architecture Drive strategic planning, execution, and operations of scalable, automated, and resilient security controls Contribute towards More ❯
Rockville, Maryland, United States Hybrid / WFH Options
PTFS
Information System SecurityManager/FSO (Hybrid) Rockville, MD Salary Range: $120,000.00 To $160,000.00 Annually Job Description: The ISSM will maintain a security program that is compliant with the National Industrial Security Program (NISP), the National Industrial Security Operating Manual (NISPOM), applicable Director of Central Intelligence Directives (DCIDs), Intelligence Community Directives (ICDs … FedRAMP and relevant US government policies and procedures. In addition, the position requires part time Facility Security Officer (FSO) duties. Essential Duties: Oversee STIG/SCAP compliance on DoD FedRAMP systems Support FedRAMP, IL4, IL5, IL6 Certification processes Support government client ATO processes Provide ISSM support to PTFS IT and software development and support staff for PTFS COTS software … Perform self-inspections and coordinate DCSA inspections. Develop and revise security plans, procedures, and instructions as necessary. Develop and administer security procedures for classified and sensitive (including proprietary) materials, documents, and equipment. Perform an annual review of internal administrative security policies and procedures and the Federal and DoD issuances upon which they are based. Maintain the manual More ❯
Assisting technical/management leadership on major tasks or technology assignments • Establishing goals and plans that meet project objectives • Assisting in direction and control activities, having overall responsibility for security management, methods, and staffing to ensure that technical requirements are met • Participating in client negotiations and interfacing with senior management • Supporting decision making and domain knowledge that may have … a critical impact on overall project implementation • Providing support to plan, coordinate, and implement a cybersecurity lab's informationsecurity - Providing support for facilitating and helping the lab identify its current security infrastructure and define future programs, design and implementation of security related to lab systems • Assisting the efforts of security staff to design, develop … engineer and implement solutions to security requirements • Implementing and development of the DHS IT security standards • Gathering and organizing technical information about the lab's mission goals and needs, existing security products, and ongoing programs • Performing risk analyses which also includes risk assessment • Planning and leading major technology assignments • Evaluating performance results and recommends major changes More ❯
This is a contingent opportunity Information Systems SecurityManager (ISSM) K2 Group is searching for an ISSM to support the Air Force Research Laboratory Sensors Directorate (AFRL/RY) at Wright-Patterson Air Force Base, OH. Duties: Be the Directorate's Certification & Accreditation (C&A) process expert. Perform C&A duties in compliance with the Risk Management … Interim Approval to Operate IATO/Approval to Operate (ATO). Prepare, submit, and track all Directorate C&A packages of all Research, Development, Test, & Evaluation (RDT&E) computer information systems for base-level and higher headquarters approval, and ensure that all systems are following DoD Information Technology (IT) C&A guidance. Submit a quarterly Plan of Action … eMASS; review eMASS registration workbooks, recommend changes/clarification and submit updated workbooks to HQ AFRL for registration of Point-to-Point, Standalone, Standalone Enclave systems having a Federal InformationSecurity Management Act (FISMA) requirement. Coordinate any changes or modifications to hardware, software, or firmware of a system directly with the Authorizing Official (AO)/Delegated Authorizing Official More ❯
Senior ManagerInformation Systems & Cyber Security North Charleston, SC Ability to Obtain Clearance Required Adapt Forward is seeking a hands-on leader who thrives on both building and mentoring. As our Senior Manager of Information Systems and Cyber Security, you will architect, secure, and continuously improve a Microsoft centric enterprise environment while coaching a … and wireless networks using Zero Trust principles Automate routine tasks through PowerShell, Graph API, and Intune configuration profiles Manage asset lifecycle and SaaS licensing for a growing, distributed workforce Security Architecture & Hardening Implement secure configuration baselines for Windows, macOS, mobile, and cloud workloads Deploy and tune the Microsoft Defender suite (Defender for Endpoint, Identity, Office 365, Cloud Apps, Intune …/SOAR detections and integrate log sources into Microsoft Sentinel Compliance & Audit Readiness Lead readiness and evidence collection for ISO 27001, NIST 800171, and CMMC Level 2 assessments Map security controls to customer and regulatory requirements, develop POA&Ms, and track remediation Author and maintain policies, standards, and procedures aligned with NIST CSF and CIS benchmarks Coordinate third party More ❯
one mind, and one purpose, we can accomplish our mission and be an organization anyone would be proud to be a part of. POSITION SUMMARY Aleut is seeking an Information System SecurityManager (ISSM)/Task Lead to work with the United States Air Force Academy (USAFA) RMF team. This position requires personnel to work on-site … the primary point of contact with the Government, COR, and Authorizing Officials, managing communication, deliverables, schedules, risks, and contract compliance. Lead the creation and ongoing refinement of the System Security Plan (SSP), including tailoring and implementation of controls from NIST SP 800-53 Rev. 5 and baselines defined in FIPS 200. Oversee the selection, documentation, and management of security … ensuring that each control includes a functional description of inputs, behavior, and outputs as reflected in the SSP. Direct and support development of all RMF artifacts including POA&Ms, Security Assessment Reports (SARs), Risk Acceptance Packages, and continuous monitoring artifacts). Manage the complete Authorization to Operate (ATO) package lifecycle, including development of the POA&M tracker, Risk Acceptance More ❯
Barbaricum is a rapidly growing government contractor providing leading-edge support to federal customers, with a particular focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is … with a focus on collaboration and innovation. Our teams are at the frontier of the Nation's most complex and rewarding challenges. Join our team. Barbaricum is seeking an Information System SecurityManager (ISSM) to guide the delivery of secure systems within the Navy's Risk Management Framework (RMF). This role provides cybersecurity oversight and lifecycle … and submit RMF and DIACAP risk assessment packages Ensure systems and solutions meet DoD cybersecurity policy and accreditation requirements Track system compliance status and coordinate with stakeholders to mitigate security gaps Maintain configuration management of security baselines and assess impacts of change Guide teams through cybersecurity audits and implement corrective action plans as needed Maintain continuing education hours More ❯
Description As the Category Manager for the Cloud & InfoSec categories, you will be responsible for supporting WTW across the business for all procurement aligned to cyber security and Cloud operations. You will collaborate with business stakeholders to develop sourcing strategies related to end user & collaboration services. Knowledge of how global software and licensing works, and experience/background … specifically in informationsecurity or cloud migration, are essential to meet the business and stakeholder needs. A strong knowledge of wider major Technology providers is also desirable. You must have experience in building and maintaining key business stakeholder relationships within the category and serve as a trusted advisor and partner for them on informationsecurity and … cloud maturity matters for WTW. The Category Manager for Cloud & InfoSec will support the Head of Enterprise Technology Procurement with relevant category planning for the business. The successful candidate will have a creative and positive approach to problem solving and a strong collaborative approach with other team members and stakeholders. A strong, analytical mindset with a meticulous approach to More ❯
In-depth knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, NIST SP800-53, etc. • Knowledge of commercial security tools and their uses. • Experience with hardware/software security implementations. • Knowledge of different communication protocols, encryption techniques/tools, and PKI and authorization … services. • Familiarity with security incident management, experience collaborating with Incident Response Teams, and able to provide viable recommendations for the resolution or computer security incidents and vulnerability compliance. • Experience creating and presenting documentation and management reports. Qualifications • Twelve (12) years of related work experience in the field of security authorization. • A Bachelor's degree in Computer Science … Information Technology Engineering, or a related field may be substituted for four (4) years' experience. • DoD 8570.1 compliant IAM Level III certification, such as GSLC, CISM and/or CISSP (or Associate) will also be accepted. More ❯
In-depth knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, NIST SP800-53, etc. • Knowledge of commercial security tools and their uses. • Experience with hardware/software security implementations. • Knowledge of different communication protocols, encryption techniques/tools, and PKI and authorization … services. • Familiarity with security incident management, experience collaborating with Incident Response Teams, and able to provide viable recommendations for the resolution or computer security incidents and vulnerability compliance. • Experience creating and presenting documentation and management reports. Qualifications • Ten (10) years of related work experience in the field of security authorization. • A Bachelor's degree in Computer Science … Information Technology Engineering, or a related field may be substituted for four (4) years' experience. • DoD 8570.1 compliant IAM Level I certification, such as CompTIA Security+ certification. A higher-level certification, such as GSLC, CAP, CASP, CISM and/or CISSP will also be accepted. More ❯
Overview We are seeking a highly motivated and experienced Senior Manager of Risk to lead our cyber risk and third-party risk management functions within the Cyber Governance, Risk & Compliance (GRC) team. This individual will manage a small team of risk professionals and be responsible for building, embedding, and continuously improving the organisation's cyber risk management framework, ensuring … and ongoing monitoring of suppliers. Define risk appetite, assurance requirements, and contractual controls for third-party cyber security. Partner with procurement, legal, and business teams to ensure suppliers meet security and compliance requirements. Provide risk assessments, recommendations, and remediation guidance to business stakeholders. Escalate material supplier risks and lead risk acceptance discussions where required. Leadership & Team Management Manage, coach More ❯