×
Register Here to Apply for Jobs or Post Jobs. X

BISO-Business Information Security Officer

Job in Delaware, Delaware County, Ohio, 43015, USA
Listing for: RELX
Full Time position
Listed on 2025-12-08
Job specializations:
  • IT/Tech
    Cybersecurity, IT Project Manager, IT Consultant, Cloud Computing
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

BISO for Cloud Computing

Do you want to create strategies and chart a course for our Cyber progress?

Are you interested in evangelizing our core information security tools and risk management solutions?

About our Team, This

team delivers outcomes, longer‑term improvements and benefits that are measurable and impact the achievement of organization goals. This includes managing complex and critical issues, creating strategies and charting a course for cyber progress.

About the Role

As a BISO (reporting to our CISO) for Technology Infrastructure and Operations you will be responsible for planning, organizing, and executing enterprise‑wide information and security initiatives. You will deliver long‑term improvements and benefits impacting our organizational goals focusing on Cloud Infrastructure, risk management and cybersecurity defenses.

Requirements
  • Possess a strong proficiency with AWS services (EC2, S3, IAM, Lambda, Cloud Trail, Cloud Watch, KMS, Guard Duty, Security Hub, WAF, etc.).
  • Have the ability to design secure, scalable cloud architectures with proper identity, access management, and network segmentation.
  • Experience with AWS Config, AWS Control Tower, or Terraform for compliance automation and infrastructure as code (IaC).
  • Possess an understanding of Kubernetes (EKS), Docker, and container image scanning tools.
  • Hands‑on experience integrating security controls into Jenkins, Git Hub Actions, or Git Lab CI pipelines.
  • Familiarity with code scanning tools (Snyk, Sonar Qube, Checkmarx, or Veracode) and dependency management.
  • Scripting proficiency (Python, Bash, or Power Shell) to automate security testing and compliance checks.
  • Experience implementing vault solutions (Hashi Corp Vault, AWS Secrets Manager).
  • Ability to translate technical risks into business terms for senior stakeholders and non‑technical leaders.
  • Experience partnering with IT, Cloud, and Business Units to embed security in strategic initiatives.
  • Leading security programs, tracking KPIs/metrics, and ensuring timely delivery of remediation plans. Designing and delivering cybersecurity awareness programs tailored to business functions.
Responsibilities
  • Driving information, cyber, and infrastructure security governance across all business and technology units, ensuring alignment with enterprise cybersecurity programs, objectives, and regulatory requirements.
  • Serving as the primary liaison between Business Units, Cloud Engineering, and the Cyber Security organization to embed security awareness and best practices into AWS cloud operations, CI/CD pipelines, and Dev Ops workflows.
  • Leading cloud security oversight for AWS environments, including configuration management, identity and access controls, encryption, and compliance with organizational policies and industry standards (ISO 27001, NIST, SOC
    2).
  • Managing and coordinating technical risk assessments — including vulnerability scanning, penetration testing, and application risk reviews — to ensure secure deployment across cloud and hybrid infrastructures.
  • Overseeing the security posture of CI/CD pipelines (Jenkins, Git Hub Actions, or similar), integrating automated scanning tools and secure code validation into build and deployment processes.
  • Collaborating with Dev Ops and Infrastructure teams to define and implement secure‑by‑design practices for containerized workloads, Kubernetes clusters, and AWS‑native services (EKS, EC2, S3, Lambda).
  • Defining and executing a risk‑based information and infrastructure security strategy, including setting measurable goals, developing security training programs, and creating roadmaps for improving Dev Sec Ops  maturity.
  • Developing and reporting cybersecurity metric scorecards to track compliance with enterprise standards, vulnerability remediation progress, and adoption of security controls across business and cloud environments.
  • Providing expert guidance on security architecture decisions, evaluating new tools and technologies for impact on cloud environments, automation frameworks, and enterprise security strategy.
  • Leading cross‑functional security initiatives to ensure business innovation aligns with secure architecture principles, risk management standards, and…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary