Information Security Officer

Employee

TOR LOGO TEAMTOREON BLUE OUTLINED

Toreon is the only cybersecurity company dedicated to empowering individuals and organizations within the field of Cyber Security. We partner with companies to define and implement strategic security roadmaps in order to support their digital business objectives. Our team consists of 50+ security domain experts driven by knowledge and impact. Through coaching, training and collaboration, we increase our clients’ security maturity, as well as our own expertise.

TOR LOGO TEAMTOREON BLUE OUTLINED

Toreon is the only cybersecurity company dedicated to empowering individuals and organizations within the field of Cyber Security. We partner with companies to define and implement strategic security roadmaps in order to support their digital business objectives. Our team consists of 50+ security domain experts driven by knowledge and impact. Through coaching, training and collaboration, we increase our clients’ security maturity, as well as our own expertise.

About the Challenge

You will join a committed security team of 18 Toreonites that is already working with great enthusiasm on different security projects in various industries. 

As an Information Security Officer, you will be the one who sets up risk management frameworks, identifies risks, and can prioritize them within the risk treatment plan.
You will provide updated action plans that allow us to take other companies to a higher level of security maturity.

In doing so, you will implement and manage information security management systems such as ISMS. By defining technical and process security measures in documented policies, processes, and standards, you will succeed in making organizations more secure and possibly even help them to obtain a security certificate.

To complete your role as an Information Security Officer, you will be the one to perform security and privacy compliance assessments according to specified requirements of a security and privacy framework. You will assess organizations for compliance with the requirements of a security standard. You will be able to identify shortcomings quickly and report them immediately to the customer. You will translate these into concrete measures to meet the requirements. With this, you help the organization to meet legal standards.

Requirements

  • Knowledge about security risk management methodologies such as: ISO27005, ISO31000, and COSO.
  • Execute security risk analyses, business impact assessments and control assessments.
  • You are able to Implement and do the management of an information security management system (ISMS).
  • Knowledge about the security and privacy standards and governance frameworks such as ISO27001/2/12, NIST, CIS20 and GDPR.
  • You can format reports for the client about security policies and processes.
  • Conducting an audit and formulating an assessment plan (in accordance with ISO190011).
  • Validate control measures and report the assessment results.
  • If you have a technical background, you have the edge to make a good translation to the business. It will make it easier on yourself if you have experience in one of the following areas:
    • Identity, Access, Vulnerability and Patch Management
    • Security in the Software Development Life Cycle
    • Cloud security (EMS o365, MS Azure, AWS, …)
    • Network Technology: Routing and switching standards, VPN,
    • Experience in security domains and standards Cryptography (incl. Key Life Cycle Management) and Public Key Infrastructure.
  • You are able to give professional advice in 2 languages like Dutch and English. French is a plus.
  • You are in possession of a relevant Bachelor or Master’s degree within economics, IT or equivalent; engineering, sciences, computer sciences, statistics,…
  • One of the following certificates would be a plus:
    ISO27001 Lead Implementer, ISO27001 Lead Auditor, Certified DPO, CISM, CISSP, and CISA.

Knowledge about security risk management methodologies such as: ISO27005, ISO31000, and COSO.

Execute security risk analyses, business impact assessments and control assessments.

You are able to Implement and do the management of an information security management system (ISMS).

Knowledge about the security and privacy standards and governance frameworks such as ISO27001/2/12, NIST, CIS20 and GDPR.

You can format reports for the client about security policies and processes.

Conducting an audit and formulating an assessment plan (in accordance with ISO190011).

Validate control measures and report the assessment results.

If you have a technical background, you have the edge to make a good translation to the business. It will make it easier on yourself if you have experience in one of the following areas:

  • Identity, Access, Vulnerability and Patch Management
  • Security in the Software Development Life Cycle
  • Cloud security (EMS o365, MS Azure, AWS, …)
  • Network Technology: Routing and switching standards, VPN,
  • Experience in security domains and standards Cryptography (incl. Key Life Cycle Management) and Public Key Infrastructure.

You are able to give professional advice in 2 languages like Dutch and English. French is a plus.

You are in possession of a relevant Bachelor or Master’s degree within economics, IT or equivalent; engineering, sciences, computer sciences, statistics,…

One of the following certificates would be a plus: ISO27001 Lead Implementer, ISO27001 Lead Auditor, Certified DPO, CISM, CISSP, and CISA.
Ivo

Inside out

You are people-oriented and enjoy advising others. You can adapt well to any situation and you can motivate others and give them insights. Showing respect for others is important. In addition, you take responsibility for your own actions and you act correctly. Discretion in handling sensitive information and self-discipline can be seen in the results of your projects. Within your projects, we can see that you are the best in your field and that you make a lot of impact in the business world. And last but not least, you make an effort to grow your knowledge, but also to share knowledge with others.

What to expect

What to expect

Focus on
cybersecurity

Toreon focuses exclusively on cyber security and enables organizations to achieve their goals with specialized services and solutions.

Leading in knowledge

As a knowledge-driven company, Toreon offers top-notch expertise through its globally renowned experts.

High-performance environment

At Toreon, entrepreneurship drives us forward. We are committed to high performance and personal growth, offering support and continuous learning to keep you ahead.

People-oriented

We prioritize our employees and support their development with flexibility and freedom. We use procedures to encourage rather than hinder progress while creating space for initiative and creativity.

We offer you an attractive salary package with an expansive training budget to help you achieve your goals. Don’t worry if you don’t check off all the requirements for this amazing opportunity. Attitude and culture fit matter just as much. So, let’s chat and bring your unique self.

PlaceholderfotoSophie

Interested but need more information?

Let's talk!

Sophie Couvreur

Talent Manager
recruitment@toreon.com

PlaceholderfotoSophie

Interested but need more information?
Let's talk!

Sophie Couvreur

Talent Manager
recruitment@toreon.com

Stay tuned with our Inside Out Newsletter

Get more news on our vacancies.

Start typing and press Enter to search

Shopping Cart