Chief Information Security Officer – Managing Director

State Street
London
3 days ago
Create job alert

State Street seeks to recruit a Chief Information Security Officer – Managing Director to improve the overall protection of State Street’s EMEA customers and partners from the evolving landscape of threat actors.

The UK / Ireland CISO candidate must have experience driving security through leadership down through the organization on a large scale. This candidate should be a proven global cyber security leader who has experience in delivering on strategic outcomes with business operational quality and a focus on business needs. The candidate should have experience scaling security solutions to ensure sustainability and endurance throughout constant change. This leader will be part of a team responsible for ensuring the security of the business and functional teams in line with company and security policy, standards, and guidelines. The position will report to the SVP, Global Cyber GRC & GTS Tech Risk Mgmt Head.

This role will be based in the London office for State Street.

What you will be responsible for

This leader will function at the Executive Leadership level for the UK / Ireland region. Contribution to the development and progression of the Business’ exercise of connecting security into their strategic and tactical plans will be a critical success criteria. The function will champion the Information Security mandate from the Global CISO acting as a critical partner guiding stakeholders to embed information risk management practices. The candidate must be able to present to multiple audiences including external customers and clients. Critical measurements through developed KPIs reporting to the GRC team will also define business adoption to the Security framework governing State Street.

Key Responsibilities:

  • Serve as key Security contact for the UK / Ireland region leadership team.
  • Collaborate with Global Cyber Security and assigned business partner teams to ensure the business aligns plans addressing security policies in their products and services.
  • Work across the BISO Organization to appropriate shared success solutions.
  • An ability to motivate and manage a team of information security staff supporting the organization’s goals and an ability to lead the process of developing an information security vision for the future.
  • An ability to cultivate and build collaborative working relationships with a broad range of enterprise stakeholders.
  • Ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one.
  • Drive change through the ability to effectively influence others to modify their opinions, plans, or behaviors.
  • Perform Ad-Hoc security awareness to ensure region is fully aware of current threats facing the company.
  • Provide security leadership presence at a number of risk committees on a cadence basis.
  • Manage application risk and remediation prioritization based on a portfolio of regional assets.
  • Review and present Phishing statistics with educational sessions on improvement tactics.
  • Communicate complex and technical issues to diverse audiences, orally and in writing, in an easily-understood, authoritative, and actionable manner.
  • Consistently display working knowledge of the following areas of technical expertise: information policy formulation, information security management, business risk management, IT risk assessment and management.
  • Communication laterally and upwards the business temperament to security requirements.
  • Create visibility through effective security and risk metrics and reporting.
  • Build budget in conjunction with needs to ensure success of the implementation of security within the regional area.
  • Execute the implementation of Global Cyber Security strategies and tactics aligned to key State Street risk and business needs.
  • Participate actively in key Risk decision committees and forums for consistent visibility into the state of security within the region.
  • Create and deliver effective presentations as a means for communicating project and deliverable progress.
  • Provide regular status updates to the SVP, GRC on business dealings affecting Security.
  • Build and nurture positive working relationships with clients with the intention to exceed client expectations.
  • Work cross-functionally with team members to support and drive a collaborative team environment down through the BISO community.
  • Mentor and train team members on security processes, governance, and frameworks applicable to UK / Ireland region.
  • Provide business understanding of technical problems for highly executable remediation activities.

Desired Outcomes

  • KPI development demonstrating success within the Region’s security program.
  • Adherence to all regulatory compliance mandates throughout the Business Unit.
  • Security transformation of Business Unit staff improving overall security.
  • Promotion of a collaborative team atmosphere for mutual success in business alignment to GCS requirements.

Key relationships:

  • Information Security Officers
  • UK / Ireland Business and Functional Leaders
  • SVP, Cyber Fusion Center
  • SVP, Cyber Architecture & Security Engineering
  • SVP, Cyber Governance & GTS Tech Risk Mgmt Head
  • EVP, Head of International, Risk, Governance
  • Collaboration with 3LOD – Compliance, Risk Management, Corporate Audit

Education & Preferred Qualifications

  • 15+ years of experience in information security, a security related field or other information risk management function.
  • Strong experience within the Financial Services industry.
  • Modern technical understanding and experience developing and implementation large-scale innovation.
  • Extensive experience in strategic planning, budgeting, and allocation.
  • Depth with modern technology stacks – data science, machine learning, cloud (hybrid).
  • Project Management experience leading large and small technical teams.
  • Experience operating in regulated environment.
  • Bachelor’s degree in a technical field.

Critical Leadership Capabilities

  • Driving results
  • Strategic Thinking
  • Collaborating & Influencing
  • Change Management
  • Senior Executive communication
  • Personnel Management
  • Project Management

About State Street

What we do.State Street is one of the largest custodian banks, asset managers and asset intelligence companies in the world. From technology to product innovation, we’re making our mark on the financial services industry. For more than two centuries, we’ve been helping our clients safeguard and steward the investments of millions of people. We provide investment servicing, data & analytics, investment research & trading and investment management to institutional clients.

Work, Live and Grow.We make all efforts to create a great work environment. Our benefits packages are competitive and comprehensive. Details vary by location, but you may expect generous medical care, insurance and savings plans, among other perks. You’ll have access to flexible Work Programs to help you match your needs. And our wealth of development programs and educational support will help you reach your full potential.

Inclusion, Diversity and Social Responsibility.We truly believe our employees’ diverse backgrounds, experiences and perspectives are a powerful contributor to creating an inclusive environment where everyone can thrive and reach their maximum potential while adding value to both our organization and our clients. We warmly welcome candidates of diverse origin, background, ability, age, sexual orientation, gender identity and personality. Another fundamental value at State Street is active engagement with our communities around the world, both as a partner and a leader. You will have tools to help balance your professional and personal life, paid volunteer days, matching gift programs and access to employee networks that help you stay connected to what matters to you.

State Street is an equal opportunity and affirmative action employer.

Discover more at StateStreet.com/careers

State Street's Speak Up Line

#J-18808-Ljbffr

Related Jobs

View all jobs

Chief Information Security Officer

Chief Information Security Officer (CISO)

Chief Information Security Officer

OSB Senior Security Analyst

Enterprise Security Architect

Security Operations Manager

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.

Cyber Security Programming Languages for Job Seekers: Which Should You Learn First to Launch Your Security Career?

Cyber security has become a top priority for companies of all sizes, public institutions, and governments. As cyber threats evolve—from sophisticated ransomware attacks to large-scale data breaches—employers are eager to recruit talent with the skills to detect, prevent, and respond to security incidents. If you’re exploring roles on www.cybersecurityjobs.tech, a key question inevitably arises: Which programming language should you learn first for a career in cybersecurity? Cyber security is a multifaceted domain encompassing network security, application security, reverse engineering, digital forensics, ethical hacking (penetration testing), and more. Each niche may have unique language preferences—like Python for scripting tasks, C/C++ for exploit development, or Rust for building secure low-level tools. In this article, we’ll: Highlight the top programming languages used across cyber security. Break down pros, cons, and key use cases for each language. Present a simple beginner’s project for hands-on learning. Share essential resources and tips, so you can stand out in the competitive cybersecurity job market.

UK Visa & Work Permits Explained: Your Essential Guide for International Cyber Security Talent

Cyber security is one of the fastest-growing fields in today’s digital age. As cyber threats proliferate—ranging from data breaches and ransomware attacks to sophisticated nation-state incursions—organisations worldwide are investing more than ever to protect their systems, networks, and customer data. The United Kingdom, in particular, is emerging as a hub for advanced cyber defence, AI-driven threat detection, and compliance consulting. For international cyber security professionals, the UK offers a wealth of career opportunities, spanning financial services, government contracts, tech start-ups, and global corporations. However, stepping into the UK’s cyber security job market requires a clear understanding of the country’s visa and work permit processes. If you are an international candidate with expertise in areas like intrusion detection, penetration testing, or security architecture, navigating these immigration pathways can be daunting. This article aims to demystify the visa process—highlighting key routes, eligibility criteria, and practical tips—to help you seamlessly transition into the British cyber security ecosystem.