Information Security Manager

Newyork
3 weeks ago
Create job alert

This role can be based in the US or Latin America, and is fully remote.

We are proud to be exclusively partnered with a leading global headless CMS organisation, who are looking to pioneer the future of content management!

Trusted by leading global brands, this organisation enables them to deliver seamless, engaging digital experiences at scale.

This is a great opportunity to join a business who have just gone through lucrative series-c funding, in a role where you will shape the organisations security strategy!

What's in it for you?

Monthly remote work stipend (home internet costs, electricity). Home office equipment package right at the start (laptop, keyboard, monitor…)
Home office equipment upgrade (furniture, ear plugs …) or membership to a local co-working space after your onboarding
Sick leave benefit, parental leave and 25 days of annual leave plus your local national holidays
Personal development fund for courses, books, conferences, and material
VSOP (Virtual Stock Option Plan)
The annual international team-building trip, quarterly and monthly online get-togethers
As a fully remote company, with work-life balance at its core, you'll enjoy flexible schedules
An international team that loves to have fun at work and works hard together to accomplish shared goalsJob Role -

This role will design the company's information security strategy and lead all compliance and audit processes. Ensuring the risk and vulnerability assessment activities are carried out according to the ISO 27005 Standard.

The information security manager will also plan steps to mitigate the identified risks. The person will lead the incident response process for security breaches and coordinate relevant teams. The role will collaborate with different functions and is responsible for training, supporting and coordinating different team members

Essential job functions -

Design information security strategy
Risk Management - ISO 27005
Incident Response
Compliance & Audit - (e.g., GDPR, ISO, Fedramp, Privacy Acts).Qualifications:

More than 7 years relevant experience in Information Security or Cybersecurity.
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
Proven experience in successfully implementing Fedramp and at least one more information security related certification like ISO 27001, SOC, NIST.
Experience with setting up and maintaining an information security environment in a remote setup.
Professional certifications such as, CISM (Certified Information Security Manager), ISO 27001 LI or equivalent.
Work experience in a company that is ISO 27001 and Fedramp certified.
Strong experience with MDM, Authentication Management, Infrastructure and other information security-relevant tools.
Strong analytical, problem-solving, and decision-making skills.
Excellent communication and interpersonal skills.
Ability to manage multiple projects and priorities in a fast-paced environment.Preferred Skills:

Experience with Google Workspace
Experience with security information and event management (SIEM) systems.
Knowledge of cloud security principles and practices.
Experience in incident response and digital forensics.
Understanding of secure software development practices.
Knowledge about Cybersecurity
Good GDPR and Privacy skills

Related Jobs

View all jobs

Information Security Manager

Information Security Manager

Information Security Manager

Information Security Manager/Specialist (ISMS)

InfoSec Manager - Governance, Risk & Compliance

InfoSec Manager - Governance, Risk & Compliance

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.

Which Cyber Security Career Path Suits You Best?

Discover Your Ideal Role in the World of Digital Defence Cyber threats grow more complex by the day—ranging from sophisticated nation-state attacks to persistent phishing scams. In response, cybersecurity has become one of the fastest-expanding and most in-demand fields. If you’re exploring a career in cybersecurity, you might wonder which specialised role aligns best with your skills and aspirations. This quiz will help you identify your ideal cybersecurity path, from penetration testing to threat intelligence and beyond.

The Ultimate Glossary of Cyber Security Terms: Your Comprehensive Guide to Protecting the Digital World

As our daily lives become increasingly entwined with digital technologies, cybersecurity has emerged as one of the most critical and rapidly evolving fields. From safeguarding personal data on social media to protecting vital infrastructure and corporate networks, cyber threats loom in every corner of our connected world. Whether you’re just entering the workforce, looking to pivot your career, or a seasoned professional sharpening your skill set, understanding core terminology is essential to thrive in this domain. That’s why we’ve prepared this comprehensive glossary of cybersecurity terms and optimised for your career development. We’ll walk through the building blocks of cybersecurity—covering fundamental concepts, advanced techniques, and the latest trends—so you can confidently navigate this complex landscape. If you’re keen to explore or advance your career, be sure to check www.cybersecurityjobs.tech for roles spanning penetration testing, incident response, threat intelligence, and more.