×
Register Here to Apply for Jobs or Post Jobs. X

Information Security Manager

Job in Mission, Johnson County, Kansas, 66201, USA
Listing for: 55 Redefined Ltd
Full Time position
Listed on 2026-02-15
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 125000 - 150000 USD Yearly USD 125000.00 150000.00 YEAR
Job Description & How to Apply Below

Cornerstone is the UK's leading mobile and digital infrastructure provider, managing over 15,700 sites and holding 35% of the market. Our Mission is to be famous for excellence in delivery, embracing transformation with our people and our customers at its heart.

As Cornerstone's Information Security Manager, you will lead the development, implementation, and continuous improvement of our Information Security Management System (ISMS), ensuring alignment with ISO 27001:2022. You will be responsible for safeguarding our digital infrastructure, managing cyber risk, and embedding a security-first culture across the organisation.

This is a strategic and hands‑on role, requiring collaboration across IT, legal, procurement, and operational teams. You will act as the primary point of contact for all matters related to information assurance, supplier security assurance, incident response, and regulatory compliance.

Scope IT Security Operations
  • Collaborate closely with IT Sec Ops team members to ensure security controls remain effective. Where gaps are identified, implement appropriate mitigation measures and lead the response to security incidents in a timely and coordinated manner.
Compliance & Security
  • Coordinate ISO 27001 certification audits and maintain ongoing compliance on behalf of the IT & Digital function.
  • Actively support and contribute to health and safety, environmental sustainability, business continuity, and information security initiatives, ensuring we meet our obligations to customers and regulatory standards.
Delivery
  • ISMS Leadership:
    Own and maintain the ISMS, ensuring it meets ISO 27001:2022 requirements and supports business objectives.
  • Risk Management:

    Identify, evaluate, and mitigate information security risks across systems, suppliers, and processes. Maintain visibility over key cyber risks and report to senior leadership.
  • Incident Response:
    Lead the response to security incidents, including forensic analysis, reporting, and remediation. Coordinate with law enforcement and external partners where necessary.
  • Supplier Assurance:
    Conduct security reviews and audits of third‑party vendors. Ensure compliance with Cornerstone's security policies and contractual obligations.
  • Policy & Governance:
    Draft, review, and enforce security policies and procedures. Chair or support governance forums such as the ISMS Review and Information Security Steering Group.
  • Cyber Awareness Programme:
    Champion a culture of security awareness through training, phishing simulations, ensuring staff compliance with mandatory cyber training and internal communications.
  • Compliance & Certification:
    Ensure ongoing compliance with GDPR, ISO standards, and other regulatory frameworks. Lead surveillance audits and certification renewals.
  • Technology Oversight:
    Evaluate and implement security tools and technologies. Collaborate with IT Operations and infrastructure teams to embed security into system design and operations.
  • Secure Development:
    Ensure that security considerations are embedded throughout the project lifecycle, from initial design through to deployment and ongoing maintenance.
What we offer
  • The successful candidate will possess substantial experience in managing and maintaining an enterprise Information Security Management System (ISMS), with a demonstrable track record of leading and supporting external ISO 27001 audits and implementing and managing robust security frameworks.
  • They will have a comprehensive understanding of cyber threats, cloud security, particularly within Azure and Microsoft 365 environments, and key regulatory and compliance frameworks, including GDPR and ISO 27001. Experience with security and compliance tools such as ISMS Online, Qualys VMDR, and Cofense phishing simulation would be highly advantageous.
  • The role requires strong proficiency in vulnerability management, coordinating penetration testing, supplier security assurance, and incident response. A thorough understanding of legal and procedural obligations relating to data protection and information governance is essential.
  • Excellent communication and stakeholder management skills are required, with the ability to articulate technical risks in a…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary