Сhief Information Security Officer (CISO)

Limassol, Limassol, Cyprus - Remote

Applications have closed

P2P.org

P2P helps investors compound their cryptocurrency investments through non-custodial Staking with insurance and high-performance PoS Nodes with top-of-the-line infrastructure. We provide ⌚ high uptime, 🔐 secure staking with advanced monitoring &...

View company page

P2P.org launched in 2018 with a mission to positively influence the development of PoS technologies. Since our launch we have grown to manage 4+ billion USD in staked assets across more than 20,000 investors and 25+ unique blockchain networks.

P2P.org is comprised of talented, inspiring individuals spread around the globe.Our team is distributed across the world - with one thing in common: our passion for the decentralised future.We all share this passion to code, learn, create, and connect to collectively contribute to the future of finance.

The Chief Information Security Officer will be responsible for ensuring the highest level of information security of the company's infrastructure, and its global security compliance in all operating markets.

Responsibilities:

  • Planning for disaster recovery and creating contingency plans for any security breaches. Ensuring business continuity.
  • Organizing testing and evaluation of security products.
  • Upgrading existing and developing new security systems.
  • Establish processes for investigating security alerts and responding to incidents.
  • Providing monitoring of attacks, intrusions and unusual, unauthorized or illegal activity.
  • Researching/assessing emerging security threats and how to deal with them.
  • Implement advanced analytical tools to identify and report on emerging threats and vulnerabilities.
  • Identify potential weaknesses and implement appropriate measures to ensure information security.
  • Oversee identity and access management, including monitoring abuse of permissions by authorized system users.
  • Maintain an information security risk register and assist with internal and external audits related to information security.
  • Help to create, maintain, and conduct cybersecurity training for colleagues.
  • Securing all platform infrastructure and external integrations.

Requirements

  • 5+ years of relevant experience as a CISO.
  • Demonstrated experience building a successful security function in an established company.
  • Experience working in a cloud architecture environment, is preferred.
  • Ability to lead the implementation of security compliance projects.
  • Demonstrated skills in hiring and developing a team.
  • Experience selecting and managing vendors for security software procurement and contracting for penetration testing services.
  • Working knowledge of computer vulnerability assessment, threat modeling, networks, operating systems and software security.
  • Good working knowledge of various security technologies such as network and application firewalls, intrusion prevention systems, and anti-viruses.
  • Analytical and problem-solving skills to identify and assess risks, threats, patterns and trends.
  • Keep abreast of the latest innovations in security and technology.
  • Fluency in English.

Benefits

  • Remote working from any part of the world to your liking as long as your business hours fit the Cyprus time zone.
  • Competitive salary paid in $ and excellent international career opportunities.
  • LTI program (RSU or Stock option).
  • Well-being & Mental Health support program.
  • Full tech/equipment set-up, which is relevant to executing tasks.
  • A high degree of autonomy, no micromanagement.
  • Ownership culture.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Audits Blockchain Cloud Compliance Finance Firewalls IAM Intrusion prevention Monitoring Pentesting Vulnerabilities

Perks/benefits: Career development Competitive pay Health care

Regions: Remote/Anywhere Middle East North America South America
Job stats:  37  6  0
Category: Leadership Jobs

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.