Regional Cybersecurity and Compliance Expert*


Full Time Senior-level / Expert
Apply now Apply later

Fyber delivers innovative products and experiences to mobile advertisers and publishers. As a leading monetization and mediation platform, we work with today’s most successful publishers and advertisers to help elevate the mobile economy in a user-friendly and positive way. Fyber is always on the lookout for resourceful, intelligent, driven talent globally to add value to its business across disciplines and aims to be not just a next job, but a place where employees make their careers.
We are actively seeking a Regional Cybersecurity and Compliance Lead who is responsible for the cyber security, threat intelligence, risk management, incident response and governance/compliance of Digital Turbine’s assets in Israel and Europe. This role will be the regional process owner of all assurance activities ensuring the confidentiality, integrity and availability of customer, partner, employee and business information and services. This role will support the development, review, organization and maintenance of the company’s policies and procedures for the entities in scope in accordance with regulatory requirements, best practices and standards for cyber security.

Your Responsibilities:

  • Work directly with business and legal partners in Israel and Europe to facilitate cybersecurity assessment and risk management processes
  • Be the single point of contact (SPOC) for all things related to cybersecurity and compliance, liaise with the central cybersecurity team in the US and ensure that policies, standards and procedures are being implemented as designed
  • Be an authoritative voice in the region and articulate convincingly the security risks and rationale for prioritized solutions in a risk-based approach that outlines risk tradeoffs and tolerance
  • Lead, plan and test incident and response process pursuing threats to the company assets, including customer and partner facing discussion of the event
  • Help develop security policies and procedures that provide adequate business application protection levering the company's core business requirements
  • Lead advanced security analytics efforts for continuous security monitoring and support platform modernization efforts in container and microservices architecture
  • Manage relationships with regional security vendors and lead incident response and remediation efforts for the region
  • Assist with the overall business technology planning, providing current knowledge and future vision of technology and systems with a focus on cyber security and risk management
  • Responsible for monthly financial tracking of project and operational spend
  • Effectively communicate best practices and standards for the implementation of security technologies
  • Oversee research, selection, testing, deployment, and maintenance of security products
  • Oversee a team responsible for managing the region’s security measures ranging from Web Application Firewalls, DLP, IDP, VPN solution, endpoint management and SIEM, etc.
  • Encourage a culture of security awareness and evangelize security best practices and principles with application development teams
  • Oversee and maintain 24x7x365 coverage and support for security systems
  • Oversee daily operational processes for all information security systems and adhere to change control processes
  • Participate in tier 2 and tier 3 security operations support and information security incidents

Your Qualifications:

  • 10+ years of experience in managing complex, highly technical security infrastructure environments, preferably in public clouds with Compliance and Regulatory requirements associated with publicly traded companies
  • Hands-on experience working with a wide range of cloud and mobile security technologies such as web application firewalls (WAFs), endpoint management and response tools, privileged access management tools, encryption, PKI, certificate pinning, vulnerability management, container and container orchestration security and identity and access management tools
  • Experience with Secure Software Development Life Cycle (S-SDLC), application security frameworks, design patterns, and assessment tools.
  • Knowledge in DevOps and CI/CD pipeline security
  • Bachelor’s Degree in Information Security, Computer Science or Computer/Electrical Engineering, and/or equivalent field experience
  • Amazon Web Services (AWS) or Google Cloud Certification Training (GCP) certified

  • Preferred Qualifications for this role: 
  • Prior divisional CISO or BISO roles especially in public companies
  • Professional Security Certification such as CEH or Security
  • Ability to listen and integrate ideas from diverse views, build and maintain respectful relationships, collaborate with others, and resolve conflicts constructively
Missing a required skill but still think this is a perfect job for you? Don’t hesitate - tell us why you are a great fit anyway!   
*Fyber is an equal opportunity employer. You are welcome to our Fyber team regardless of your gender, race, color, ethnicity, nationality, religion, sexual orientation, age, disability, family status or any other matter.
#LI-YR1 #LI-Hybrid

About FyberFyber, part of Digital Turbine’s independent Mobile Growth Platform, develops innovative ad monetization solutions trusted by top mobile game and app publishers. Fyber’s product suite - FairBid mediation, Fyber Marketplace, and Offer Wall Edge, were built with performance, scale, and transparency in mind. Our products offer publishers a trusted, unconflicted alternative that drives superior results by creating an optimal connection between mobile audiences, top global brands, and mobile-first advertisers across over 40Bn daily ad opportunities. For additional information, visit
Job perks/benefits: Career development
Job region: Europe
Job country: Germany
Job stats:  3  0  0
  • Share this job via
  • or

Other jobs like this

Explore more Cyber Security career opportunities

Find open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Analysis, Cryptography, Digital Forensics and Cybersecurity in general, filtered by job title or popular skill, toolset and products used.