National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Chief Information Security Officer (CISO) (Basé à London)

Jobleads
Greater London
2 weeks ago
Applications closed

Related Jobs

View all jobs

Chief Information Security Officer (we have office locations in Cambridge, Leeds & London) @ Ge[...] (Basé à London)

Chief Information Security Officer (we have office locations in Cambridge, Leeds & London) @ Ge[...] (Basé à London)

Information Governance Manager

IG Manager

Programme Manager - Cybersecurity

Cyber Security Manager

Why Aqovia?

Since 2008, Aqovia has been at the forefront of technology innovation, serving clients in telecommunications, media, and technology. We specialise in architecture, design, and software development for transformative projects. Join a team that values innovation, expertise, and commitment to excellence.

Job Description

The Chief Information Security Officer (CISO) is responsible for overseeing the organisation’s Information and Communications Technology (ICT) infrastructure and cybersecurity framework, ensuring alignment with the Digital Operational Resilience Act (DORA) and ISO 27001 standards. The CISO safeguards the Crypto-Asset Service Provider’s (CASP) systems, including the PIL crypto platform and front-end, by conducting risk assessments, maintaining comprehensive inventories, and implementing specific security policies. This role demands rapid compliance verification and leads the security team to protect critical operations in a regulated fintech environment.

Here's what you'll do:

  • Oversee the ICT infrastructure and cybersecurity programme, ensuring compliance with DORA and ISO 27001 standards.
  • Develop and implement information security strategies, policies, and procedures in line with NIST CSF, NIST 800-53, CIS, and COBIT frameworks.
  • Conduct risk assessments and audits to ensure compliance with regulatory standards and best practices, including ISAE3402 and SOC2.
  • Author, review, and maintain IT security policies and procedures to support compliance and security goals.
  • Manage corrective action plans for identified security risks, ensuring timely execution and effective resolution.
  • Perform due diligence and assurance for supply chain security, assessing third-party risks and compliance.
  • Collaborate with internal stakeholders to promote and enhance information security awareness and maturity across the organisation.
  • Stay abreast of the latest cybersecurity threats, trends, and compliance requirements to continuously improve the security framework.

We're looking for someone who:

  • Professional communication skills are essential. Candidates must possess excellent English communication skills, both written and verbal, to effectively manage business interactions and maintain a professional tone in all commercial correspondence.
  • Extensive experience in IT security leadership, preferably within fintech, financial services, or crypto-asset sectors.
  • Proven expertise in implementing information security and risk frameworks (NIST CSF, ISO 27001, NIST 800-53, CIS, COBIT).
  • In-depth knowledge of DORA requirements, and risk management for ICT assets, including crypto platforms.
  • Strong understanding of auditing frameworks such as ISAE3402 and SOC2.
  • Demonstrated experience in authoring and maintaining policies and procedures related to information security.
  • Experience managing corrective action plans and overseeing security risk management initiatives.
  • Familiarity with supply chain security due diligence and assessment processes.
  • Ability to effectively engage and manage internal stakeholders to enhance information security maturity.
  • Professional certifications such as CISSP, CISM, CISA, or CRISC are strongly preferred.
  • Broad technical knowledge including SaaS, Cloud technologies, Software Development Life Cycle (SDLC), Vulnerability Management, Networking, and Identity and Access Management (IDAM).

Other skills:

  • Exceptional communication and interpersonal skills.
  • Strong analytical and problem-solving abilities.
  • Ability to work collaboratively across departments and drive initiatives in a fast-paced environment.
  • High level of integrity and professionalism in managing sensitive information.

Joining Aqovia means:

  • Making a real difference: You will be part of a team developing solutions that empower businesses while contributing to sustainable practices.
  • Growth opportunities: We invest in our employees' development and offer a path for career advancement.
  • Collaborative culture: We value teamwork, open communication, and a supportive environment.
  • Competitive benefits package: Including healthcare, paid for gym membership, pension scheme, perkbox and more.

If you are a technically adept analytical person who thrives in a fast-paced environment and shares our commitment to positive impact, we encourage you to apply!

Equal Opportunity Employer
At Aqovia, we believe in the strength of diversity. We strive to reflect the varied markets we serve and foster an inclusive culture where everyone feels welcome, valued, and empowered to be their authentic selves. As an equal opportunity employer, we are committed to embracing all forms of diversity across our organisation.


#J-18808-Ljbffr

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.

Part-Time Study Routes That Lead to Cyber Security Jobs: Evening Courses, Bootcamps & Online Masters

The frequency and sophistication of cyber-attacks have exploded in recent years, making cyber security one of the UK’s most in-demand skill sets. From safeguarding NHS patient data to defending FTSE 100 financial systems, organisations across sectors require qualified professionals—penetration testers, security analysts, incident responders and security architects—to protect critical infrastructure. Yet many professionals cannot pause their careers to upskill full time. Fortunately, an ecosystem of part-time learning pathways—evening courses, intensive bootcamps and flexible online master’s programmes—enables you to learn cyber security while working. This comprehensive guide explores every route: foundational CPD, immersive bootcamps, accredited online MScs, plus funding options, planning strategies and a real-world case study. Whether you’re an IT support technician, a software developer or a compliance manager aiming to pivot into security, you’ll discover how to build expertise at your own pace.

The Ultimate Assessment-Centre Survival Guide for Cyber Security Jobs in the UK

Assessment centres for cyber security positions in the UK are designed to mirror real-world threat landscapes and test both your technical acumen and soft skills under pressure. Across multiple stages—psychometric assessments, penetration testing exercises, incident response group tasks, case studies, interviews and even informal networking breaks—employers assess your ability to identify vulnerabilities, collaborate in high-stakes scenarios and communicate effectively. This guide walks you through each component, equipping you to stand out and secure your next role in cyber defence.