National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Chief Information Security Officer (CISO)

Ripjar
Bristol
2 days ago
Create job alert

Chief Information Security Officer (CISO)

1 day ago Be among the first 25 applicants

Get AI-powered advice on this job and more exclusive features.

Ripjar specialises in the development of software and data products that help governments and organisations combat serious financial crime. Our technology is used to identify criminal activity such as money laundering and terrorist financing, enabling organisations to enforce sanctions at scale to help combat rogue entities and state actors.

Lead Ripjar's Global Security Strategy

As we scale globally, this role is central to our mission of delivering secure, resilient technology to governments and enterprises around the world.

As Chief Information Security Officer (CISO), you will be responsible for developing and executing our cyber risk strategy, driving alignment with international frameworks such as ISO27001, SOC2, DORA and regional frameworks like Cyber Essentials, and leading executive team engagement on security governance, regulatory readiness, and organisational resilience. You will be responsible for monitoring and improving the information security of Ripjar's technology infrastructure, productsand services as we continue to scale.

This is a hands-on leadership role. You will be responsible not only for setting strategy, but also for directly executing core activities such as policy development, supporting audits and accreditations, incident response, and day-to-day security operations.

What you'll be doing:

Strategic Security Leadership

  • Set the organisation-wide security vision and roadmap; act as security evangelist at the executive level.
  • Maintain and evolve our security and compliance posture to support international expansion and customer growth.
  • Manage and own the Information Security budget, investments, and ROI.


Governance, Risk, and Compliance

  • Maintain compliance with ISO27001, SOC2, Cyber Essentials and evolving DORA regulations.
  • Lead internal risk assessments, security audits, and regulatory readiness efforts.
  • Oversee third-party and supply chain security due diligence and assurance processes.


Operational Security & Infrastructure

  • Partner with infrastructure and engineering teams to drive secure architecture, code, and systems.
  • Identify vulnerabilities and lead remediation in hybrid environments (AWS, private cloud).
  • Ensure security principles are implemented and continuously improved.


Culture, Education, and Awareness

  • Embed a security-first culture across the business through education, training, and policy.
  • Support the commercial team in client conversations and security due diligence including contributing actively to RFI/RFP processes.
  • Act as the point of contact for external audits, client reviews, and incident communications.


About You:

We're looking for a security leader who blends deep technical acumen with strong strategic and business leadership. You will take a pragmatic approach to information security and its practical application to our organisation as it scales.

Ideally, you will have:

  • Proven leadership in high-growth scale-up environments.
  • Expertise in ISO27001, SOC2, NIST CSF, Cyber Essentials, and DORA.
  • Experience with modern cloud infrastructure and security (AWS, Azure, GCP, PaaS/IaaS/SaaS).
  • Familiarity with IAM, DLP, and Linux-based environments.
  • Strong understanding of security architecture, governance, and regulatory trends.
  • Professional certifications such as CISSP, CISM, or CRISC (preferred).
  • Exceptional communication skills to engage senior internal and external stakeholders.
  • High level of integrity, resilience, and executive presence.


Key tasks:

  • Developing, implementing and maintaining IT information security strategies, policies and procedures for the organisationin line with security frameworks.
  • Author, review, and maintain IT security policies and procedures to support compliance and security goals.
  • Maintain awareness of the latest cybersecurity threats, trends, and compliance requirements to continuously improve the security framework.
  • Identifying and acting on opportunities to improve and update software and systems
  • Conduct risk assessments and information security audits to ensure compliance with regulatory standards and best practices, including SOC2.
  • Managing and reporting on the allocation of Information Security budget
  • Perform due diligence and assurance for supply chain security, assessing suppliers/third-party risks and compliance.
  • Act as the main point of contact for external security audits.
  • Support the commercial organisation by contributing to client security questionnaires
  • In conjunction with our operational product infrastructure team, assess and monitor current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement
  • Educate the business on Information Security best practices and ensure training and internal standards are sufficient.


Requirements

The successful candidate should have these skills:

We recognise that demonstrable skills in all these technologies is not easy to find. Don't let that stop you from applying! We can work in partnership to identify your strengths and provide you with the training necessary to fill any gaps

  • A


Benefits

Why we think you'll enjoy it here:

  • Salary up to 140k DOE
  • 25 days annual leave + your birthday off, rising to 30 days after 5 years of service
  • Fully remote working with occasional travel
  • Life assurance
  • Private Family Healthcare
  • Employee Assistance Programme
  • Company contributions to your pension
  • Enhanced maternity/paternity pay
  • The latest tech including a top of the range MacBook Pro
  • Offices equipped with well-stocked pantries with food, snacks and drinks when in the office

Seniority level

  • Seniority levelExecutive

Employment type

  • Employment typeFull-time

Job function

  • Job functionOther
  • IndustriesIT Services and IT Consulting

Referrals increase your chances of interviewing at Ripjar by 2x

Mangotsfield, England, United Kingdom 2 weeks ago

Chief Information Security Officer (CISO)

Bristol, England, United Kingdom 1 day ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.


#J-18808-Ljbffr

Related Jobs

View all jobs

Chief Information Security Officer

Chief Information Security Officer

Chief Information Security Officer

Chief Information Security Officer

Chief Information Security Officer

Chief Information Security Officer (CISO)

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.

Cyber Security Jobs Employer Hotlist 2025: 50 UK Companies Actively Hiring Right Now

Bookmark this guide—refreshed every quarter—so you always know who’s really expanding their cyber security teams. Ransomware payouts broke records in 2024, the UK’s new Cyber Security Bill imposed mandatory breach disclosure, and the National Cyber Force’s move to Samlesbury has super‑charged the northern skills market. Result? Demand for security architects, SOC analysts, penetration testers, cloud‑security engineers, threat hunters & GRC specialists is at an all‑time high in 2025. Below you’ll find 50 organisations that have posted UK‑based cyber security vacancies or announced head‑count growth during the past eight weeks. They’re organised into five quick‑scan categories. For every employer you’ll see: Main UK hub Example live or recent vacancy Why it’s worth a look (tech stack, culture, mission) Search any company on CyberSecurityJobs.tech to view current ads, or set a free alert so fresh openings land straight in your inbox.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.