Chief Information Security Officer (CISO) (Basé à London)

Jobleads
Greater London
7 months ago
Applications closed

Related Jobs

View all jobs

Identity and Access Management Analyst

Information Security Manager - ISO27001

Interim Chief Operating Officer

Specialist Officer

Interim Head of Service – Street Scene & Leisure

Head of Technology

Why Aqovia?

Since 2008, Aqovia has been at the forefront of technology innovation, serving clients in telecommunications, media, and technology. We specialise in architecture, design, and software development for transformative projects. Join a team that values innovation, expertise, and commitment to excellence.

Job Description

The Chief Information Security Officer (CISO) is responsible for overseeing the organisation’s Information and Communications Technology (ICT) infrastructure and cybersecurity framework, ensuring alignment with the Digital Operational Resilience Act (DORA) and ISO 27001 standards. The CISO safeguards the Crypto-Asset Service Provider’s (CASP) systems, including the PIL crypto platform and front-end, by conducting risk assessments, maintaining comprehensive inventories, and implementing specific security policies. This role demands rapid compliance verification and leads the security team to protect critical operations in a regulated fintech environment.

Here's what you'll do:

  • Oversee the ICT infrastructure and cybersecurity programme, ensuring compliance with DORA and ISO 27001 standards.
  • Develop and implement information security strategies, policies, and procedures in line with NIST CSF, NIST 800-53, CIS, and COBIT frameworks.
  • Conduct risk assessments and audits to ensure compliance with regulatory standards and best practices, including ISAE3402 and SOC2.
  • Author, review, and maintain IT security policies and procedures to support compliance and security goals.
  • Manage corrective action plans for identified security risks, ensuring timely execution and effective resolution.
  • Perform due diligence and assurance for supply chain security, assessing third-party risks and compliance.
  • Collaborate with internal stakeholders to promote and enhance information security awareness and maturity across the organisation.
  • Stay abreast of the latest cybersecurity threats, trends, and compliance requirements to continuously improve the security framework.

We're looking for someone who:

  • Professional communication skills are essential. Candidates must possess excellent English communication skills, both written and verbal, to effectively manage business interactions and maintain a professional tone in all commercial correspondence.
  • Extensive experience in IT security leadership, preferably within fintech, financial services, or crypto-asset sectors.
  • Proven expertise in implementing information security and risk frameworks (NIST CSF, ISO 27001, NIST 800-53, CIS, COBIT).
  • In-depth knowledge of DORA requirements, and risk management for ICT assets, including crypto platforms.
  • Strong understanding of auditing frameworks such as ISAE3402 and SOC2.
  • Demonstrated experience in authoring and maintaining policies and procedures related to information security.
  • Experience managing corrective action plans and overseeing security risk management initiatives.
  • Familiarity with supply chain security due diligence and assessment processes.
  • Ability to effectively engage and manage internal stakeholders to enhance information security maturity.
  • Professional certifications such as CISSP, CISM, CISA, or CRISC are strongly preferred.
  • Broad technical knowledge including SaaS, Cloud technologies, Software Development Life Cycle (SDLC), Vulnerability Management, Networking, and Identity and Access Management (IDAM).

Other skills:

  • Exceptional communication and interpersonal skills.
  • Strong analytical and problem-solving abilities.
  • Ability to work collaboratively across departments and drive initiatives in a fast-paced environment.
  • High level of integrity and professionalism in managing sensitive information.

Joining Aqovia means:

  • Making a real difference: You will be part of a team developing solutions that empower businesses while contributing to sustainable practices.
  • Growth opportunities: We invest in our employees' development and offer a path for career advancement.
  • Collaborative culture: We value teamwork, open communication, and a supportive environment.
  • Competitive benefits package: Including healthcare, paid for gym membership, pension scheme, perkbox and more.

If you are a technically adept analytical person who thrives in a fast-paced environment and shares our commitment to positive impact, we encourage you to apply!

Equal Opportunity Employer
At Aqovia, we believe in the strength of diversity. We strive to reflect the varied markets we serve and foster an inclusive culture where everyone feels welcome, valued, and empowered to be their authentic selves. As an equal opportunity employer, we are committed to embracing all forms of diversity across our organisation.


#J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.

How to Write a Cyber Security Job Ad That Attracts the Right People

Cyber security is now a board-level priority for organisations across the UK. From financial services and healthcare to critical infrastructure, SaaS platforms and the public sector, demand for skilled cyber security professionals continues to grow. Yet despite this demand, many employers struggle to attract the right candidates. Cyber security job adverts often generate large volumes of applications, but few are a genuine match. Meanwhile, experienced security engineers, analysts and architects quietly ignore adverts that feel vague, unrealistic or disconnected from real security work. In most cases, the problem is not a lack of talent — it is the quality of the job advert. Cyber security professionals are trained to assess risk, spot weaknesses and question assumptions. A poorly written job ad signals organisational immaturity and weak security culture. A well-written one signals seriousness, competence and trust. This guide explains how to write a cyber security job ad that attracts the right people, improves applicant quality and positions your organisation as a credible security employer.

Maths for Cyber Security Jobs: The Only Topics You Actually Need (& How to Learn Them)

If you are applying for cyber security jobs in the UK it can feel like “real security people” must be brilliant at maths. The reality is simpler: most roles do not need degree-level pure maths. What they do need is confidence with a small set of practical topics that show up repeatedly in day-to-day work across SOC, incident response, cloud security, AppSec, threat detection, IAM & security engineering. This guide strips the maths down to what actually helps you get hired. It includes a 6-week learning plan plus portfolio projects you can publish to prove the skills. You will focus on: Number systems & bitwise thinking (binary, hex, bytes, XOR) Modular arithmetic basics (enough to understand how modern crypto “works”) Probability & statistics for detection, triage & risk Discrete maths for logic, sets, graphs & complexity Security maths habits: estimation, false positive control & evidence-led reporting You will not waste time on heavy theory that rarely appears in junior or mid-level cyber security roles.