Skip to content

Chief Information and (Cyber)Security Officer (CISO)#


  • Lead the IT and Security Workstream and manage team operations

  • Develop and implement information technology and security strategies, policies, and procedures that align with's goals and objectives.

  • Ensure the internal IT infrastructure is designed, documented, and managed effectively to meet the's technology and security requirements.
  • Ensure's IT infrastructure and data are secure and protected from potential security threats and risks.
  • Manage internal information technology and security budgets, resources, and contracts to ensure optimal use of resources and cost-effectiveness.

  • Oversee the management of security incidents, threats, and vulnerabilities to ensure prompt detection and response to security incidents.

  • Oversee the management of conducting regular security assessments, audits, and penetration testing to ensure compliance with security standards and regulations.
  • Oversee the management of providing regular security training and awareness programs to employees and other stakeholders to ensure they understand their roles and responsibilities in protecting the organization's information and technology assets.

  • Identify and assess potential information security risks and vulnerabilities to the organization's information and technology assets.

  • Develop and implement information security controls and measures to protect against potential security threats and risks.

  • Foster a culture of innovation and continuous improvement to ensure the organization's technology infrastructure remains competitive and aligned with emerging technologies and industry trends.

  • Foster a culture of collaboration and continuous learning among team members to ensure that they stay up-to-date with the latest security technologies and industry trends.
  • Ensure that disaster recovery and business continuity plans are in place and tested regularly to ensure's ability to respond to information technology and security related incidents and other disasters.

  • Collaborate with other workstreams to ensure the organization's security objectives are integrated into all business processes and activities.

  • Ensure the alignment of technologies used and ensure that the IT infrastructure is planned with a security by design approach.