Vos missions
Great assignments await you with our key account clients in rich and varied environments
Chief Information Security Officer (CISO)
We are seeking an experienced and hands-on Chief Information Security Officer (CISO) to lead cybersecurity and IT risk management efforts. The ideal candidate will possess deep expertise in cybersecurity principles, risk management practices, and regulatory compliance. This role holds direct responsibility for designing, implementing, and maintaining a comprehensive information security strategy while collaborating closely with both technical and non-technical teams.
The CISO will be part of the IT team and will report directly to the Chief Information Officer (CIO).
Key Responsibilities
Cybersecurity Strategy and Governance
1. You will define and execute a comprehensive cybersecurity vision and strategy aligned with business priorities and objectives, ensuring leadership engagement and support.
2. You will establish and maintain a cybersecurity governance framework within the first line of defense, in alignment with broader IT governance principles.
3. You will design and oversee a unified framework of policies, standards, indicators, and control plans to manage evolving regulatory, technological, and organizational requirements.
IT Risk Management
4. You will lead and coordinate risk assessments, vulnerability management activities, and risk mitigation strategies to protect IT assets and infrastructure.
5. You will advise on cybersecurity and IT risk implications for new technology initiatives and ensure regulatory compliance.
6. You will monitor and report on the implementation of cybersecurity programs and IT risk remediation plans, providing regular updates to the CIO and second line of defense.
7. You will oversee the security posture of critical third parties and ensure appropriate monitoring and follow-up actions.
8. You will consolidate IT security risk reporting for senior leadership and the Risk Committee, working closely with the IT Risk Officer and Chief Risk Officer.
9. You will manage the closure of audit findings and regulatory recommendations related to IT security.
10. You will coordinate responses to regulatory inquiries on cybersecurity and IT risk management matters.
Security Operations and Incident Response
11. You will manage daily cybersecurity operations, ensuring continuous monitoring and rapid detection of security threats across systems, networks, and applications.
12. You will maintain and update asset inventories for information systems, including cloud services and third-party environments.
13. You will coordinate incident response activities, develop and maintain incident response procedures, and ensure timely recovery of business-critical services.
14. You will support communication and coordination with authorities and regulatory bodies in the event of major cybersecurity incidents.
Cybersecurity Projects and Expertise Sharing
15. You will lead the cybersecurity and third-party risk management workstreams within the DORA compliance program.
16. You will provide expert advice during project reviews, penetration tests, red teaming exercises, and new business initiatives.
17. You will monitor emerging technologies and cybersecurity trends to anticipate new risks and promote innovative security solutions.
18. You will ensure cybersecurity and IT risk considerations are embedded in all phases of project development and delivery.
19. You will collaborate with procurement and supplier management teams to integrate cybersecurity requirements into contractual agreements.
Security Awareness and Training
20. You will foster strong internal networks across risk management, Compliance, Legal, HR, and business functions to promote a cybersecurity culture.
21. You will actively engage with external peers and industry forums to exchange insights on cybersecurity trends, threats, and best practices.
22. You will design and deliver targeted security awareness and training programs tailored to employees, contractors, business executives, and key stakeholders.
You have the following skills
Required Experience and Knowledge
23. You have between 5 and 7 years of experience in information security, including at least 3 years in a leadership or management role.
24. You have strong technical knowledge in network security, system administration, and security tools (such as firewalls, IDS/IPS, SIEM, encryption technologies ), as well as cloud security expertise including SaaS environments.
25. You have a proven track record in IT risk management, including conducting risk assessments, managing vulnerabilities, and overseeing third-party risk management activities.
26. You have strong familiarity with cybersecurity regulations and standards such as DORA, PCI-DSS, GDPR, and other relevant data protection frameworks.
27. You have the ability to align cybersecurity initiatives seamlessly with the organization’s strategic priorities and business goals.
28. You have excellent leadership skills and the ability to clearly communicate complex security topics to non-technical stakeholders, including executive leadership teams.
29. You have demonstrated success in managing relationships with senior stakeholders and regulatory bodies.
Certifications : You have earned relevant certifications such as CISM, CISSP, NIS2, GDPR Practitioner, and ISO Lead Implementer.
Language Skills : You have fluency in English, both spoken and written; with Dutch and French is preferred.
Votre profil
30. You have between 5 and 7 years of professional experiences in IT,
31. You have between 5 and 7 years of experience in information security, including at least 3 years in a leadership or management role.
32. If you are at least fluent in FR/NL AND EN
33. You’re eager to learn, motivated and curious
Let’s have a chat !
Advantages
For Consultancy :
34. Hospitalization insurance (partner/children incl.)
35. Group insurance
36. Dental insurance (partner/children included)
37. 20 days statutory paid vacations (legal vacations cumulated for 1 year of work)
38. 11 days recovery time work 38/40 per year
39. Representation fee net per month.
40. Internet fee of € 40 per month.
41. Company car with national fuel card OR Public transport reimbursed OR mobility package.
42. Daily fee of 5.50€ net /day provided.
43. Subscription GSM unlimited calls for Belgium (ITS subscription)
44. Training plan (e-learning - certification at ITS charge)
Extra advantages:
45. In our team in BE, we’re very close to each of our consultants and we differentiate ourselves trying to really take care of you and make you grow with us and within our different clients.
46. Regular follow-up (every 3 to 6months depending on your needs/will)
47. Regular teambuilding to meet-up and have fun (every 3 months more or less)
48. Flexibility and trust
49. Benefits of still being part to a bigger group (ITS Group) and having access to resources and of a larger team of Experts
50. Co-optation system because sharing is caring!
Processus de recrutement
51. 1st pre-screening on the phone to discuss about your search and conditions and our first potential opportunities matching.
52. Job descriptions sent and Teams meeting fixed with us (HR and Sales) to dig into your experience and the role.
53. Package proposal so we all agree beforehand.
54. Your CV is sent to the different clients you’ve agreed to, to find the best mission for you!
You have the opportunity to take a leading role in shaping and strengthening the cybersecurity and IT risk landscape of a dynamic and forward-thinking organization. In this position, you will work closely with senior leadership, influence strategic decision-making, and be at the forefront of key regulatory and technological developments.
If you are passionate about cybersecurity, eager to drive meaningful change, and ready to take on a critical leadership role, we invite you to apply and make an impact with us.
Apply today and take the next step in your IT career with us!
Send us your CV, Give us a call at 52 63 17 Or reach out via email at
We’re excited to hear from you!