Chief Information Security Officer

Florida Remote Worker


<p>Akumin is a national leader in comprehensive outpatient radiology and oncology solutions and a partner of choice for U.S. hospitals, health systems and physician groups. Akumin provides fixed-site outpatient radiology and oncology services...

View company page

The Chief Information Security Officer (CISO) is responsible for identifying, evaluating, and reporting on information security risks in a manner that meets compliance and regulatory requirements, and aligns with and supports the risk posture of the enterprise. The CISO is responsible for establishing and maintaining the cybersecurity plan and a multi-year roadmap that ensures that company’s information assets are adequately protected. The CISO will proactively work with other IT leaders, business unit leaders, and Senior Management to implement practices that meet defined objectives and standards for information security. The position will also oversee a variety of IT-related risk management activities. They will ensure the ongoing compliance with internal and external security requirements such as HIPPA Security Rule, NIST 800-171, CMMC, ISO 27001, Cyber Essentials +, PCI DSS and corporate security policies such as the Security Standards for the Protection of Electronic Protected Health Information

Specific duties include, but are not limited to:

  • Develop and implement a strategic, long-term information security strategy and roadmap to ensure that Akumin’s information assets are adequately protected.

  • Work with senior leaders across the business to assess and communicate acceptable levels of risk. Identify, evaluate, and report on information security risks, practices and projects to the Compliance Committee, Senior Leadership, and provide subject matter expertise on security standards and best practices.   Maintains dotted line to Chief Legal Council and accountable to Compliance Officer for security incident and discovery reporting.

  • Develop, mentor, and manage a high performing staff of information security professionals.

  • Lead the development of up-to-date information security policies, procedures, standards, and guidelines, and oversee their approval, dissemination, and maintenance.  Ensure that the security management program is in compliance with applicable laws, regulations, and contractual requirements. Act as the champion for the enterprise information security program and foster a security-aware culture.

  • Oversee the evaluation, selection and implementation of information security solutions that are innovative, cost-effective, and minimally disruptive.

  • Partner with enterprise architects, infrastructure, and applications teams to ensure that technologies are developed and maintained according to security policies and guidelines.

  • Manage regular intrusion detection and vulnerability reporting, internal and external IT audit groups reviews, and the coordination of all required fixes.

  • Develop business metrics to measure the effectiveness of the security management program and increase the maturity of the program over time.

  • Monitor the industry and external environment for emerging threats and advise relevant stakeholders on appropriate courses of action.

  • Liaise with law enforcement and other advisory bodies as necessary to ensure that the organization maintains a strong security posture.

  • Oversee incident response planning and the investigation of security breaches, and assist with any associated disciplinary, public relations and legal matters.

  • Oversee and lead the creation, communication, and implementation of a process for managing vendor risk and other third-party risk.

  • Other duties as assigned by management.

Position Requirements:

  • Bachelor's Degree in Engineering, Computer Science or Equivalent Experience.

  • 10+ years IT experience, including demonstrated success working as a member of a team in a senior leadership role.

  • 5+ years of Infrastructure and or software development management experience utilizing modern agile, cloud and edge approaches.

  • A proven track record in developing information security policies and procedures, and successful execution.

  • Extensive knowledge of business risk, risk assessment and risk-based decision making.

  • Able to communicate security and risk-related concepts to both technical and non-technical audiences (in business terms), including board level.

  • A natural influencer and coalition builder; passionate about building high performing teams.

  • Ability to inspire and motivate cross-functional, interdisciplinary teams to achieve tactical and strategic goals, an innovative leader, problem solver and consultant.

  • Ability to evangelize IT security to make it a critical part of business operations; build trust and respect for the security function.

  • Excellent written and verbal communication, interpersonal and collaborative skills.

  • Experienced with contract and vendor negotiations.

  • Ability to effectively prioritize and execute tasks in high-pressure situations.

  • Knowledge of security, risk and control frameworks and standards such as ISO 27001 and 27002, SANS-CAG, NIST, FISMA, COBIT, COSO and ITIL.

  • Understanding of cloud, SaaS, and IoT architectures, and their implications on information security strategy.

  • Technical acumen including but not limited to: OSI, IT infrastructure, cloud, application development languages, tools and frameworks, database technologies, web technologies, next gen mobile, network architecture, enterprise architecture, and directory services.

  • Security technology acumen and experience including but not limited to firewall, intrusion detection, cyber-attack tools and defenses, encryption, certificate authority, web filtering, anti-malware, anti-phishing, identity, and access management, multi factor authentication.

  • 10% travel may be required.


  • Master's of Business Administration or Master's of Healthcare Administration

  • Professional certifications, such as a CISSP, CISM, CISA. 

Physical Requirements:

Standard Office Environment.

More than 50% of the time:

  • Sit, stand, walk.

  • Repetitive movement of hands, arms and legs.

  • See, speak and hear to be able to communicate with patients.

Less than 50% of the time:

  • Stoop, kneel or crawl.

  • Climb and balance.

  • Carry and lift 10-20 lbs.

Residents living in CA, WA, NY, Jersey City, NJ, and CO click here to view pay range information.

Akumin Operating Corp. and its divisions are an equal opportunity employer and we believe in strength through diversity. All qualified applicants will receive consideration for employment without regard to, among other things, age, race, religion, color, national origin, sex, sexual orientation, gender identity & expression, status as a protected veteran, or disability.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  6  1  0

Tags: Agile Audits CISA CISM CISO CISSP Cloud CMMC COBIT Compliance Computer Science Encryption Firewalls FISMA Incident response Intrusion detection IoT ISO 27001 ITIL IT infrastructure Malware NIST PCI DSS Risk assessment Risk management SaaS SANS Security strategy Strategy

Perks/benefits: Career development Team events

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.