Business Information Security officer MEI (BISO)
Fugro
Job Description
Who we are:
Do you want to join our Geo-data revolution Fugros global reach and unique know-how will put the world at your fingertips. Our love of exploration and technical expertise help us to provide our clients with invaluable insights. We source and make sense of the most relevant Geo-data for their needs so they can design build and operate their assets more safely sustainably and efficiently. But were always looking for new talent to take the next step with us. For bright minds who enjoy meaningful work and want to push our pioneering spirit further. For individuals who can take the initiative but work well within a team.
In support of Fugros digitalization journey and nature of its business as a Geo-data company there is a need to improve the Information Security posture. The regional Information Security Lead will cover both operational and governance aspects of Information Security. The individual will work on key projects and initiatives and collaborates closely with stakeholders across all functions to manage Information Security risks. The lead has a healthy degree of business acumen and will acquire a good understanding on key assets and processes. Together with stakeholders risks are evaluated and reduced to acceptable essence the analyst will help the various teams to achieve organizational objectives while not compromising the security posture.
Job Description:
The Regional BISO MEI -
Collaborates with stakeholders to address and identify high-risk areas and support business-critical projects and key initiatives.
Works with Project Managers Business Analysts architecture compliance and support team to ensure Fugro Information Security standards are being followed.
Responsible for information security posture and assurance for MEI and where applicable Global.
Influences to achieve positive change to the Information Security posture through regular engagement and collaboration.
Actively shares knowledge and insights to increase Information Security awareness throughout the region.
Collaborates with the Security Operations Center and to respond to and manage priority incidents.
Actively works with the Security Operating Center to remediate regional vulnerabilities and develop possible use cases.
Key result area
Information Security advisor with a regional scope covering both governance and operational aspects.
Major Security Incidents
Coordinates major information security incident management in the region in collaboration with the various IT teams and the Security Operations Centre.
Adopt Information Security best practises
Act as an advisor and provide consistent interpretation of Information Security policies standards and procedures to stakeholders.
Review adherence to Information Security policies while continuously monitoring and reporting on risks.
Risk Management & Data Sovereignty
Oversees Information Security posture in the region and provides actionable plans to reduce risk levels.
Will understand key (information) assets and processes identify and evaluate risks and Information Security controls and suggest risk management approaches where necessary.
Provide Information Security advice for business-critical projects.
Responsible for the business continuity process for MEI
The individual will assess suppliers on Information Security maturity.
Responsible for data sovereignty in the region engage and collaborate with the geo-processing team to maintain sovereignty in the region.
Support compliance efforts
Address client Information Security requirements. Furthermore together with the Information Security team develop a toolkit to address common client requests.
Ensure Information Asset Owners implement the right measures to make the regional IT landscape compliant and secure. For instance adhere to GDPR and client requirements data sovereignty requirement for Middle east & India.
Discuss compliance and audit findings with management and develop action plans to address them. Will drive remediation activities across the region.
Drive Information Security awareness
Drive education and increase Information Security awareness.
Share relevant risk analyses and Information Security metrics with the business line.
Others experience
Functional
Demonstrated experience in Information Security (e.g. Security Operations and / or Information Risk & Security Governance);
Understanding of common security risk scenarios threats and vulnerabilities;
Knowledge on Information Security standards such as ISO 27001 and NIST.
Leadership
Good stakeholder engagement skills and a healthy degree of business acumen and interest;
Proven ability to collaborate across functions;
Process-driven has attention to detail and is well organized;
Takes ownership and is not afraid to fail.
Good to have
ISO27001 implementation operation and management security control audits and assessments;
Understanding of relevant legal & compliance aspects such as GDPR.
Experience on working with external and internal auditors.
Skills and Qualifications:
Bachelor or Masters Information Security Information Technology or relevant professional experience.
3-8 years of experience. Ideal candidates would have work experience in both Security Operations and Governance Risk and Compliance.
Relevant Information Security certifications are seen as a plus but not required.
What we offer
Fugro provides a positive work environment as well as projects that will satisfy the most curious minds. We also offer great opportunities to stretch and develop yourself. By giving you the freedom to grow faster we think youll be able to do what you do best better. Which should help us to find fresh ways to get to know the earth better. We encourage you to be yourself at Fugro. So bring your energy and enthusiasm your keen eye and can-do attitude. But bring your questions and opinions too. Because to be the worlds leading Geo-data specialist we need the strength in depth that comes from a diverse driven team.
Our view on diversity equity and inclusion
At Fugro our people are our superpower. Their variety of viewpoints experiences knowledge and talents give us collective strength. Distinctive beliefs and diverse backgrounds are therefore welcome but discrimination harassment inappropriate behaviour and unfair treatment are not. Everybody is to be well-supported and treated fairly. And everyone must be valued and have their voice heard. Crucially we believe that getting this right brings a sense of belonging of safety and acceptance that makes us feel more connected to Fugros purpose together create a safe and liveable world and to each other.
Responsible for ensuring safety of self and others at site. Prevent damage of equipment and assets Responsible for following all safety signs/procedures/ safe working practices Responsible for using appropriate PPEs Responsible for participating in mock drills. Entitled to refuse any to undertake any activity considered unsafe. Responsible for filling up of hazard observation card wherever hazard has been noticed at site. Responsible for safe housekeeping of his work place. To stop any operation that is deemed unsafe To be able to operate fire extinguisher in case of fire To report an incident as soon as possible to immediate supervisor and HSE manager To complete HSE trainings as instructed to do so.
Disclaimer for recruitment agencies:
Fugro does not accept any unsolicited applications from recruitment agencies. Acquisition to Fugro Recruitment or any Fugro employee is not appreciated .
Required Experience:
Unclear Seniority
- ...lifecycle.- Ensure compliance with ISMS security standards and maintain ISO 27001 certification... ...and mentor IT teams, collaborating with business units and senior leadership to ensure... ...Develop and implement data security and information management policies to mitigate...SuggestedLong term contractImmediate startRelocation
- Description :ROLE AND RESPONSIBILITIES :Information Security Governance & Risk Management : - Lead enterprise and project-level Information Security... ...security risk management practices across technology and business initiatives.- Identify, assess, and track project-related...SuggestedFor contractors
Rs 40 - 50 lakhs p.a.
...We are currently looking to hire a Business Development Manager (BDM) with strong expertise in Infrastructure Projects, specifically Bridge Projects , and proven Gulf experience . Position Details: • Role: Business Development Manager (BDM) • Experience: Minimum 15...SuggestedContract work- ..., and network segmentation- Ensure network solutions align with security, operational, and performance requirementsStakeholder & Transition... ...smooth communication between technical teams, vendors, and business stakeholdersProject Governance & Reporting :- Prepare executive...SuggestedLocal area
- ...interview based on your resume Submit form Resources & Support For details about the interview process and platform information please check: For any help or support reach out to: PS: Our team reviews applications daily. Please complete your AI...SuggestedHourly payWeekly payFull timeContract workPart timeFor contractorsSummer workRemote job
- ...tools RPA, MAM/MDM, O3655. Infra Security & Monitoring- Identify... ...AI/ML solutions across infra/business functions & operations- Candidate... ...& operations. Corporate office setups and expansion plans.-... ...specialized data security and information management policies that can...Long term contractTemporary workWork at officeImmediate startRelocation
- ...potential extension) Reports To: Founders / Chief Executive Officer About the Organisation The company is dedicated to developing... ..., shelf-life enhancement, and commercial-scale production. 5. Business & Market Enablement Use existing industry relationships to...Long term contractFull timeContract work
- ...management and regulatory bodies. Maintain accurate records and documentation related to IT compliance, audits, and inspections.- Information Security Management System (ISMS) - Support the implementation of robust ISMS practices across the bank.- Compliance Risk Assessment...
- ...This is a remote position. Yashuss Unlimited is looking for a highly skilled and proactive IT Security Manager to establish, implement, monitor, and continuously improve the organization’s IT security infrastructure, policies, and compliance framework. The ideal candidate...Full timeRemote job
- ...frameworks. Ability to operate effectively in fast‑paced, contractor‑integrated environments Hybrid Work Expectation: Average office presence of 3 days per week or as per Company Policy, with travel for client/site meetings and occasional team meetings. #LI-TG1 At...For contractorsHybrid workRelocation packageWork at officeRemote jobRelocationOverseasFlexible hours3 days week
- ...Immediate to 30 days Job description: Manage the sales and business development team to ensure targets are met and business... ...negotiation skills with the ability to close complex deals and secure long-term contracts. Cyber security sales preferred Personal...Long term contractFull timeHybrid workImmediate startWork from homeWorking Monday to Friday
- ...Qualifications ~ Bachelors degree in Engineering/ Life Sciences/ Business or a related field ~10 years of significant experience in... ...employment with GE HealthCare. #LI-ML1 #LI-Onsite Additional Information Relocation Assistance Provided: No Required Experience...Full timeRelocation package
- ...Role: IT Security Lead Division : Information Technology Academic: BE IT/BCA/MCA preferred or/and Certified... ...security projects. Understanding Business landscape and security applicability... ...compliance) Information Security Officer ISO 27001 Implementation or Auditor...Full timeHybrid workLocal area
- ...sectors, is seeking a Fractional Chief Information Officer (CIO) to support the organization’s next... ...currently operates through multiple business entities across India and international... ...monitoring. Operational Stability & Security Strengthen system reliability, cybersecurity...3 days week
Rs 2 - 2.4 lakhs p.a.
...Salary Probation: Duration: Salary during probation: After probation: Annual CTC: ₹ 2,00,000 - 2,40,000 /year Perks Informal dress code Number of openings 1 About Coppergate Coppergate is a company specializing in headhunting,...Immediate start- ...with Brand Teams to plan, develop, and execute marketing strategies and campaigns across all digital HCP touch points to achieve key business objectives. ~ Drive hyper personalization for HCP through different digital initiatives ~ Evangelize digital solutions that are deeply...Long term contractFull time
- ...optimal performance and user satisfaction. Collect and coordinate business requirements for analytical reporting. Develop, evaluate, and... ...to automate and optimize processes. Ensure appropriate security measures are adhered to within all tools. Acquire data from primary...Full timeContract work
- ...architecture (LAN/WAN)- Firewalls and network security- VPN and remote access systems- Endpoint... ...IT infrastructure across all Snapmint offices and locations.- Ensure high availability... ...and compliance purposes.4. Compliance & Information Security :- Ensure IT infrastructure aligns...
- ...Planning: Developing and executing a robust IT roadmap aligned with business and production objectives; managing IT budgets and driving... ...and automated backup systems to ensure maximum uptime. Data Security & Compliance: Implementing rigorous cybersecurity measures to safeguard...Long term contractFull timeHybrid work
- ...strong client-centric mindset to help unlock revenue and meet business goals. Key Responsibilities Own overall GCS annual and long... ...or status that is legally protected. If you would like more information about how your data is processed please contact us. Required...Long term contractFull time
- Description :Key Responsibilities :- Head of Technology B2D (Business to Distributor) Own the platform roadmap and responsible for omnichannel... ...stream backlog, sprint cadence, and release governance in coordination with the PMO and Release Management Office (ref:hirist.tech)Work at office
- ...We are looking to hire a Chief Technology Officer (CTO) for Luke Coutinho Holistic Healing... ...overall technology strategy aligned with business growth objectives.- Drive digital transformation... ...architecture, technology infrastructure, security, and scalability.- Collaborate with...
Rs 60 lakh p.a.
...a dynamic and hands-on Chief Technology Officer (CTO) to lead our technology vision and execution... ...growing Direct-to-Consumer (D2C) apparel business. This role is ideal for a tech leader who... .... Architect robust, scalable, and secure systems to support high-growth apparel...Full timeWeekday work- ...ARE Optiver is a global market maker founded in Amsterdam with offices in London Chicago Austin New York Sydney Shanghai Hong Kong... ...005) Hong Kong (2007) Shanghai (2012) and Singapore (2021). The business in Mumbai is newly established and deemed to be an integral part...Full timeHybrid workWork at office
- ...your role - but thats not where it ends. If you make a good case for some extra learning were delighted to foot the tab. Food at the office Meals are on us. We wont let your stomach grumble while you hustle. Health insurance - Health always comes first. The health of...Full timeApprenticeshipWork at officeSleeping nightsFlexible hoursShift workDay shift
Rs 25 - 30 lakhs p.a.
...across multi-cloud environments. This role is responsible for ensuring high availability, operational reliability, security compliance, and cost optimization of business-critical cloud platforms while driving continuous improvement and stakeholder satisfaction. Requirements...Full timeHybrid workWeekday work- ...risks and ensure key stakeholders are kept informed about progress and expected outcomes.... ...verbal presentations. Stay abreast of current business and industry trends relevant to the... ...information systems to develop and improve security at procedural and technology levels. Assist...Full time
Rs 10 - 35 lakhs p.a.
...looking for a highly driven and strategic Cyber Security Manager who can bridge the gap between advanced cybersecurity solutions and business growth. This role is ideal for... ...Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field...Long term contractFull timeWeekday work- ...means leading structured discovery with functional teams to surface pain points and automation opportunities, building business cases with credible ROI, securing sponsorship, and then driving delivery with rigour and velocity.2. Finance Technology Ownership & Automation Scale-...Long term contract
- ...incremental collections error handling retries and idempotency. Secure credentials and secrets via vaulting or platform key stores;... ...rollback procedures. Workflow Design & Orchestration Build business workflows for: JoinerMoverLeaver (JML) lifecycle automation....Full time
Do you want to receive more vacancies?
Subscribe and receive similar vacancies to Business Information Security officer MEI (BISO). Be the first to apply!

