Deputy Chief InformationSecurityOfficer page is loaded Deputy Chief InformationSecurityOfficer Apply locations London time type Full time posted on Posted Yesterday job requisition id JR Deputy CISO About the role Reporting to the Chief InformationSecurityOfficer (CISO). The Deputy CISO is responsible for managing and overseeing … the informationsecurity program across AIG with a focus on day to day operations. The role requires a deep understanding of the organizations business objectives, risk appetite and regulatory environment across global regions where AIG operates. This senior leader will align with AIG's business model and will establish and build on relationships within both the International IT … and Business organization. Within ISO, this role will serve as a subject matter expert and advisor on strategy shaping the global informationsecurity program drawing on intimate knowledge of cyber threat, laws, and regulations across the different countries and regions where AIG operates outside of North America. The Deputy CISO role will develop and execute on a global More ❯
Information Systems SecurityOfficer 2 & 3 Provide support for a program, organization, system, or enclave's information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies … standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configuration management … CM) for information systems security software, hardware, and firmware. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with National More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
We are currently recruiting for a Regional InformationSecurityOfficer , reporting to the Global Chief InformationSecurityOfficer (CISO), to oversee the informationsecurity function across the countries and Tunstall entities in their scope. This is an incredibly exciting time to join Tunstall as we embark on an exciting period of transformation. … You will be joining a recently created and growing global InformationSecurity team within Tunstall and will be in a leadership position playing a key part in the success of this transformation. This role would be based at either our Manchester office or our Whitley site (DN14 0HR) working on a hybrid basis. We are flexible on number … of days in the office. What will you be doing in this role? As our Regional SecurityOfficer , you will be responsible for implementing, running and overseeing the informationsecurity function across the countries and Tunstall entities in your scope, ensuring consistent and strong informationsecurity management in support of our business goals and More ❯
Looking for a new challenge? Take a look at our current vacancies. If you see a vacancy that is right for you, we encourage you to apply! Chief InformationSecurityOfficer We currently have an exciting opportunity for an experienced Chief InformationSecurity Officer. If you are keen to maintain and develop an environment and … culture for our organisation that ensures and assures the security of our information and technology then we would really like to hear from you. Employment Type: Full-time Working hours: 35 hours per week. Where possible, we are open to considering part time/flexible working patterns. Please let us know in your application your desired working pattern … in 2023 and the ever-changing technology landscape, it is a very exciting time to be joining the Technology team here at the Financial Ombudsman Service. As our Chief InformationSecurityOfficer (CISO), you will maintain and develop an environment and culture for our organisation that ensures and assures the security of our information and More ❯
where you can take your career. Our mission is clear: to lead through innovation. Join the transformation and innovate with us. Overview: BlueHalo, an AV Company, is seeking an Information Systems Security Engineer responsible for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Key responsibilities will include maintain operational security posture … for an information system or program to ensure information systems security policies, standards, and procedures are established and followed; assist with the management of security aspects of the information system and performs day-to-day security operations of the system; and evaluate security solutions to ensure they meet security requirements for processing … classified information. You'd like to do this: Provide support for a program, organization, system, or enclave's information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards More ❯
INFORMATION SYSTEMS SECURITYOFFICER LEVEL 2 - ZERO TRUST IMPLEMENTATION SPECIALIST PROTECT CRITICAL DEFENSE INFRASTRUCTURE IN THE ERA OF ZERO TRUST We're seeking an experienced Information Systems SecurityOfficer (ISSO) Level 2 to lead the implementation of Zero Trust frameworks and maintain the security posture of classified information systems. This role combines … deep security expertise with hands-on experience in specialized security applications, requiring both strategic vision and tactical execution in protecting our nation's most sensitive data. THE OPPORTUNITY As an ISSO Level 2, you'll be instrumental in transforming traditional security architectures to Zero Trust models while maintaining continuous security authorization under the NIST Risk Management … Framework. You'll work with cutting-edge security tools including LatteArt, ScanBoy, Biscotti, Sear, and Exacta, ensuring our defense systems remain resilient against evolving cyber threats. This position requires IAM Level I certification and offers the opportunity to shape the security landscape of mission-critical defense systems. WHAT YOU'LL DO Zero Trust Architecture Implementation • Lead the institution More ❯
Warren, Michigan, United States Hybrid / WFH Options
Softek International Inc
Description The Information System SecurityOfficer (ISSO) serves as the principal advisor to the Information System Owner (SO), Business Process Owner, and the Chief InformationSecurityOfficer (CISO)/Information System Security Manager (ISSM) on all matters, technical and otherwise, involving the security of an information system. ISSOs are … responsible for ensuring the implementation and maintenance of security controls in accordance with the Security Plan (SP) and Department of Defense (DoD) policies. In almost all cases, ISSOs will be called on to provide guidance, oversight, and expertise, but they may or may not develop security documents or actually implement any security controls. While ISSOs will … are being performed. As a result, it is important for ISSOs to build relationships with the SO, technical staff, and other stakeholders. Duties/Responsibilities: Essentials The goal of informationsecurity is to help the business process owner accomplish the mission in a secure manner. To be successful, ISSOs need to know and understand the following: Coordinates with More ❯
Position: Information Systems SecurityOfficer (TS w/SCI Clearance Required) Location: Greater Boston, MA (Onsite) Length: 3+ years Job Description: Our client is seeking a skilled and motivated Information Systems SecurityOfficer (ISSO) to join their dynamic Cybersecurity Team. This role is crucial in maintaining and developing our InformationSecurity (IS … program and ensuring compliance with established security policies and procedures. The ISSO will be responsible for overseeing operational security implementation, vulnerability management, system assessments, and recovery processes. The ideal candidate will play a key role in safeguarding critical information systems and contribute to a comprehensive security posture. Essential Duties and Responsibilities: • Develop and maintain an Information Systems (IS) security program and policies to ensure the protection of sensitive and classified systems and data. • Monitor and enforce security policies for system implementation and configuration management. • Ensure the protection of information systems and recommend resources to maintain security. • Continuously monitor system vulnerabilities, assess potential threats, and respond to security incidents. • Oversee corrective actions More ❯
Information System SecurityOfficer (ISSO)/Technical Security Requirements. The contractor shall perform the following duties related to Information Assurance/Technical Security IAW DoD JSIG and applicable DoD, DAF, ACC, and Wing applicable AIS security polices and regulations: - Manage, update, and accomplish AIS RMF BOE and BOE associated requirements. Ensure development and … implementation of procedures IAW Configuration Management policies and procedures for evaluation of AIS security program. - Perform analysis of network security, based upon RMF JSIG, National Industrial Security Program Operating Manual (NISPOM) Chapter 8, and other sources as added or updated, advise customers on AIS certification and accreditation issues. - Perform AIS risk assessments and make recommendations to customers … Wing Information System Security Manager (ISSM), and System Owner. - Participation in AIS Configuration Control Board. - Advise Wing ISSM and System Owner on security testing methodologies and processes. - Evaluate AIS certification documentation and provide written recommendations for accreditation to Wing ISSM and System Owner. - Review AIS security to accommodate and/or recommend changes to policy or More ❯
large software development program which includes software maintenance and development, IT support (Network/Workstation/Server), systems integration and life cycle support, enterprise application development, network engineering, and information systems security (ISS). The candidate will work with other security professionals in developing and implementing strategies to detect and mitigate threats to information systems, protect … critical data sets, and provide assessments of system and network vulnerabilities. Primary Roles and Responsibilities: Provide support for implementing and enforcing information systems security policies, standards, and methodologies. Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types of information. Assist with the Configuration Management for information system … security software, hardware, and firmware. Analyze threats and develop and implement best practice methodologies for incident detection, reporting, and vulnerability remediation. Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades. Evaluate security solutions to ensure they meet security requirements for processing information. Maintain operational security posture for informationMore ❯
The Information Systems Security Engineer II Hanover, MD TS/SCI Full Scope Polygraph The Information Systems Security Engineer II (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system … security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and … systems developers in the identification and implementation of appropriate informationsecurity functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architecture. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. More ❯
the nation and the world are counting on us to deliver. Join the transformation and help us make this impact now. BlueHalo, an AV Company, is seeking a strong Information System SecurityOfficer to join the team and provide aid to the program, organization, system, or enclave's information assurance program. In this position the individual … will lend assistance for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies If that sounds like you and you're ready to make an impact now, not later, read on for the details and apply to make the most out of your career. You'd like to do this Assist security authorization activities … in compliance with Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Maintain operational securityMore ❯
We're urgently seeking a Chief InformationSecurityOfficer (CISO) Location: Milwaukee, WI (20-30% travel, all expenses paid) Start Date: Ideally next week Key Responsibilities: Lead organizational informationsecurity strategy and operations Manage risk and ensure regulatory compliance Oversee security incident response and build awareness programs Provide leadership to the informationsecurity team Guide technology oversight and governance Represent security interests with executive leadership/board Qualifications: Strong leadership experience in informationsecurity Certifications such as CISSP, CISM, or CRISC Proven track record in risk management and regulatory compliance Experience leading response to major security incidents Preferred/Plus Skills: Prior board-level representation of security interests Leadership of large departments or teams Advanced certifications such as GIAC Security Leadership (GSLC) or CCISO If you're available and interested, please share your resume ASAP. More ❯
Summary The Senior Information System SecurityOfficer (Sr. ISSO) will assist in preparation, development, and maintenance of specialized Information Systems (IS) security plans used to obtain/retain DCSA accreditation. Essential Duties and Responsibilities may include the following. Other duties may be assigned. Review and revise IS system plans documentation based on analysis of the … existing equipment configuration. Document any changes or special security requirements. Provide day-to-day technical support to classified IS including adherence to policies, procedures, and best practices. You will be required to oversee the system compliance, and auditing of the information systems. Oversees the information systems readying system configurations for ISSM certification and/or DCSA accreditation …/assessment. Assist with the design, develop, and implement annual IS security training for the end-users. Similar but specialized training will also be given to the Data Transfer Agents DTAs and SAs annually. Assists the SAs in the implementation and validation of security relevant controls on computing systems; network devices such as switches, routers and firewalls; SAN More ❯
Information Assurance, IAVA, System Security Plans (SSPs), RMF, Windows, Linux, Authorization to Operate, Verification and Validation, Security+, Security X, CASP+, NIST 800-53 Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/…/active polygraph (Polygraph must be within the last five (05) years). At least twelve (12) years of direct/relevant experience Bachelor's degree in Computer Science, Information Assurance, InformationSecurity, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar … processes may be substituted for a bachelor's degree. Security+ Certification or Security X (previously known as the CASP+) Certification required Must have experience as ISSO working independently, and/or on teams maintaining secure information system operations in isolated, connected and standalone environments. Must have at least five (05) years of experience using tools to support IAVA More ❯
Junior Information System SecurityOfficer (ISSO) Washington, DC (On-Site/Office) Salary Range: $104,000 - $166,000 Clearance: Top Secret Seeking a Junior Information System SecurityOfficer (ISSO) to work on a large-scale enterprise Information Technology (IT) program. This role will work closely with the team to monitor, assess, and maintain … the security controls, ensuring that systems meet the necessary security requirements as outlined in the Risk Management Framework (RMF). Responsibilities include, but not limited to: Assist in the development and maintenance of RMF documentation and artifacts, ensuring proper security controls and safeguards are implemented for all systems. Collaborate with the ISSE and other engineering teams to … assess and integrate security controls, providing security guidance for design and implementation efforts. Monitor and manage the security posture of systems, ensuring that security controls are effective and compliant with applicable standards and regulations. Conduct security assessments and audits, identifying vulnerabilities and recommending mitigations to strengthen the overall security posture. Review and maintain securityMore ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Exertis
Company description: Exertis UK Job description: Job Title: InformationSecurityOfficer Company: Exertis UK Salary: Up to £50,000 DOE plus 10% Bonus OTE Location: Basingstoke RG24 8EH or Burnley BB12 7BF (hybrid working, Monday to Friday, 9 am5:30 pm) Contract Type: Permanent Description: Are you looking to take your IT career to the next level … in a fast-paced, supportive, and rewarding environment? Join our team at Exertis UK as an InformationSecurityOfficer, where youll be responsible for the hand on implementation, enforcement and continuous improvement of our security policies, procedures and controls. As part of the team, youll: Oversee the implementation and enforcement of security policies, standards and … tools including endpoint protection, SIEM, SOC and vulnerability management systems. Conduct risk assessments and threat modelling, maintaining the IT risk register and supporting the deployment of security controls, aligned with regulatory and business requirements. Lead incident response efforts including containment, investigation, recovery and post incident reviews while maintaining robust response plans and playbooks. Drive compliance with standards such as More ❯
Company description: Exertis UK Job description: Job Title: InformationSecurityOfficer Company: Exertis UK Salary: Up to £50,000 DOE plus 10% Bonus OTE Location: Basingstoke RG24 8EH or Burnley BB12 7BF (hybrid working, Monday to Friday, 9 am5:30 pm) Contract Type: Permanent Description: Are you looking to take your IT career to the next level … in a fast-paced, supportive, and rewarding environment? Join our team at Exertis UK as an InformationSecurityOfficer, where youll be responsible for the hand on implementation, enforcement and continuous improvement of our security policies, procedures and controls. If you are interested in applying for this job, please make sure you meet the following requirements … as listed below. As part of the team, youll: Oversee the implementation and enforcement of security policies, standards and tools including endpoint protection, SIEM, SOC and vulnerability management systems. Conduct risk assessments and threat modelling, maintaining the IT risk register and supporting the deployment of security controls, aligned with regulatory and business requirements. Lead incident response efforts including More ❯
Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Telent Technology Services Ltd
deliver the vital services to ensure the continued success of our business divisions. These services include HR, Finance, Procurement, Marketing, Legal and Commercial, Estates and Facilities, Core Technology, Corporate Security, IT, and Fleet. Every person in every team is contributing the lasting impact our Team makes. Help build and keep the nation's critical infrastructure connected and protected …/7. Reporting into the Network Services Business Unit Security Manager, the Senior InformationSecurityofficer will ensure security is embedded into all areas of the business and appropriate technical controls are in place throughout our infrastructure. This company facing role will assist new initiatives such as Threat Modelling and assist projects through the tender … to be in our Warwick a few times per month. What you'll do: Assist on all Governance, Risk and Compliance activities across Network Services Business Unit. Provide specialist security expertise for multiple internal projects across the Network Services business area. Provide guidance in secure software development throughout the lifecycle. Lead on risk and compliance technical assessments of all More ❯
associated skills, previous experience, and any qualifications that applicants are expected to have. These services include HR, Finance, Procurement, Marketing, Legal and Commercial, Estates and Facilities, Core Technology, Corporate Security, IT, and Fleet. Every person in every team is contributing the lasting impact our Team makes. Help build and keep the nation's critical infrastructure connected and protected …/7. Reporting into the Network Services Business Unit Security Manager, the Senior InformationSecurityofficer will ensure security is embedded into all areas of the business and appropriate technical controls are in place throughout our infrastructure. This company facing role will assist new initiatives such as Threat Modelling and assist projects through the tender … to be in our Warwick a few times per month. What you'll do: Assist on all Governance, Risk and Compliance activities across Network Services Business Unit. Provide specialist security expertise for multiple internal projects across the Network Services business area. Provide guidance in secure software development throughout the lifecycle. Lead on risk and compliance technical assessments of all More ❯
Dollars for electrifying their homes, shifting usage to off-peak hours, and supporting grid stability-critical for scaling AI and energy-intensive industries. We're looking for a Chief InformationSecurityOfficer (CISO) to lead our company-wide security strategy. You'll protect our infrastructure, digital assets, and customer data while enabling fast, secure growth. Key … Responsibilities Security Strategy & Leadership Define and lead Fuse's security strategy across infrastructure, applications, and data. Lead hands-on development of security roadmaps, maturity models, and control frameworks tailored to Fuse's risk profile. Directly contribute to architecture reviews, threat modelling sessions, and key design decisions across product and platform teams. Build and mentor a high-performing … security team, including hiring, coaching, and managing performance. Develop KPIs and reporting structures to measure and communicate security posture to leadership and the board. Advise the executive team on security risks, regulatory exposure, and investment priorities to support long-term growth. Governance & Compliance Own company-wide security governance, including data protection, access control, and insider risk. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Stack Recruitment
InformationSecurity Analyst 📍 Location: City of London (Hybrid – 2 days/week in office) 💰 Salary: Competitive + Benefits 🧭 Industry: B2B Travel Tech/SaaS A high-growth, global B2B travel technology company is hiring an InformationSecurity Analyst to join its newly formed InfoSec team. This is a hands-on role in a fast-paced SaaS … settlement solutions for travel operators. 🔍 What You’ll Do 🕵️ ♂️ Monitor & Detect: Continuously monitor network traffic, system logs, and alerts for suspicious activity. 🚨 Incident Response: Act as first responder to security incidents, investigate breaches, and contain threats. 🔍 Vulnerability Management: Conduct regular assessments and penetration tests to identify and resolve weaknesses. 🔐 Security Implementation: Improve and implement security measures across … systems and infrastructure. 📜 Compliance: Ensure alignment with GDPR and other relevant data protection laws and industry standards. 📊 Reporting: Deliver detailed reports on incidents, vulnerabilities, and security effectiveness. 🧠 Threat Research: Stay ahead of emerging threats and technologies to proactively defend systems. 🧯 Disaster Recovery: Develop and test contingency plans to ensure business continuity. 🤝 Cross-Team Collaboration: Work closely with IT, Engineering More ❯
InformationSecurity Analyst 📍 Location: City of London (Hybrid – 2 days/week in office) 💰 Salary: Competitive + Benefits 🧭 Industry: B2B Travel Tech/SaaS A high-growth, global B2B travel technology company is hiring an InformationSecurity Analyst to join its newly formed InfoSec team. This is a hands-on role in a fast-paced SaaS … settlement solutions for travel operators. 🔍 What You’ll Do 🕵️ ♂️ Monitor & Detect: Continuously monitor network traffic, system logs, and alerts for suspicious activity. 🚨 Incident Response: Act as first responder to security incidents, investigate breaches, and contain threats. 🔍 Vulnerability Management: Conduct regular assessments and penetration tests to identify and resolve weaknesses. 🔐 Security Implementation: Improve and implement security measures across … systems and infrastructure. 📜 Compliance: Ensure alignment with GDPR and other relevant data protection laws and industry standards. 📊 Reporting: Deliver detailed reports on incidents, vulnerabilities, and security effectiveness. 🧠 Threat Research: Stay ahead of emerging threats and technologies to proactively defend systems. 🧯 Disaster Recovery: Develop and test contingency plans to ensure business continuity. 🤝 Cross-Team Collaboration: Work closely with IT, Engineering More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Stack Recruitment
InformationSecurity Analyst 📍 Location: City of London (Hybrid – 2 days/week in office) 💰 Salary: Competitive + Benefits 🧭 Industry: B2B Travel Tech/SaaS A high-growth, global B2B travel technology company is hiring an InformationSecurity Analyst to join its newly formed InfoSec team. This is a hands-on role in a fast-paced SaaS … settlement solutions for travel operators. 🔍 What You’ll Do 🕵️ ♂️ Monitor & Detect: Continuously monitor network traffic, system logs, and alerts for suspicious activity. 🚨 Incident Response: Act as first responder to security incidents, investigate breaches, and contain threats. 🔍 Vulnerability Management: Conduct regular assessments and penetration tests to identify and resolve weaknesses. 🔐 Security Implementation: Improve and implement security measures across … systems and infrastructure. 📜 Compliance: Ensure alignment with GDPR and other relevant data protection laws and industry standards. 📊 Reporting: Deliver detailed reports on incidents, vulnerabilities, and security effectiveness. 🧠 Threat Research: Stay ahead of emerging threats and technologies to proactively defend systems. 🧯 Disaster Recovery: Develop and test contingency plans to ensure business continuity. 🤝 Cross-Team Collaboration: Work closely with IT, Engineering More ❯
london, south east england, united kingdom Hybrid / WFH Options
Stack Recruitment
InformationSecurity Analyst 📍 Location: City of London (Hybrid – 2 days/week in office) 💰 Salary: Competitive + Benefits 🧭 Industry: B2B Travel Tech/SaaS A high-growth, global B2B travel technology company is hiring an InformationSecurity Analyst to join its newly formed InfoSec team. This is a hands-on role in a fast-paced SaaS … settlement solutions for travel operators. 🔍 What You’ll Do 🕵️ ♂️ Monitor & Detect: Continuously monitor network traffic, system logs, and alerts for suspicious activity. 🚨 Incident Response: Act as first responder to security incidents, investigate breaches, and contain threats. 🔍 Vulnerability Management: Conduct regular assessments and penetration tests to identify and resolve weaknesses. 🔐 Security Implementation: Improve and implement security measures across … systems and infrastructure. 📜 Compliance: Ensure alignment with GDPR and other relevant data protection laws and industry standards. 📊 Reporting: Deliver detailed reports on incidents, vulnerabilities, and security effectiveness. 🧠 Threat Research: Stay ahead of emerging threats and technologies to proactively defend systems. 🧯 Disaster Recovery: Develop and test contingency plans to ensure business continuity. 🤝 Cross-Team Collaboration: Work closely with IT, Engineering More ❯