Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Head of Information Security image - Rise Careers
Job details

Head of Information Security

About Us 

Hawk is the leading provider of AI-supported anti-money laundering and fraud detection technology. Banks and payment providers globally are using Hawk’s powerful combination of traditional rules and explainable AI to improve the effectiveness of their AML compliance and fraud prevention by identifying more crime while maximizing efficiency by reducing false positives. With our solution, we are playing a vital role in the global fight against Money Laundering, Fraud, or the financing of terrorism. We offer a culture of mutual trust, support and passion – while providing individuals with opportunities to grow professionally and make a difference in the world. 

Your Mission: 

As the Head of Information Security, you will be responsible for building and leading Hawk's information security program. You will develop and execute a comprehensive security strategy, manage a team of security professionals, and ensure the protection of Hawk's information assets across all systems that we operate for our clients from the financial sector as well as in general our parent company in Germany and our affiliates and subsidiaries in USA, UK and Singapore. This leadership role requires a strong technical background, strategic thinking, and the ability to effectively communicate security concepts to both technical and non-technical audiences. 

Your Responsibilities: 

  • Provide leadership and direction to the InfoSec team, fostering a culture of collaboration, innovation, and continuous improvement. 

  • Develop, implement, and maintain the organization’s information security strategy, policies, and procedures, aligning them with business objectives and risk tolerance. 

  • Oversee the maintenance and expansion of existing security certifications (ISO 27001, SOC 2) and drive initiatives for future certifications (e.g., ISO 22301, DORA). 

  • Direct regular security audits, risk assessments, and vulnerability analyses, ensuring that findings are addressed effectively and efficiently. 

  • Lead security incident response efforts, including complex investigations and remediation, and develop robust incident response plans and playbooks. 

  • Ensure compliance with relevant industry standards, regulations, and legal requirements, proactively adapting to changes in the regulatory landscape. 

  • Establish and maintain security awareness training programs, promoting a strong security culture across the organization. 

  • Oversee the design, implementation, and management of security systems and technologies, ensuring their effectiveness and integration. 

  • Collaborate with Engineering, Product, and other departments to integrate security into the software development lifecycle (SDLC) and business processes. 

  • Stay abreast of the latest security threats, technologies, and industry trends, evaluating their potential impact on Hawk and driving innovation in security practices. 

  • Manage relationships with external security vendors and service providers, ensuring they meet Hawk's security requirements and contribute to the overall security posture. 

  • Provide security expertise and support to the sales process, effectively communicating Hawk's security posture to (potential) clients and addressing their security concerns. 

Your Profile: 

  • Bachelor's or Master's degree in Information Security, Computer Science, or a related field. 

  • A minimum of 9 years of experience in information security, with demonstrated leadership experience. Work experience with a regulated financial institution, or as a technical service provider in the financial sector is a plus. 

  • Strong technical background with in-depth knowledge of security architecture, technologies, best practices and IT-regulations that apply to financial institutions or its outsourcing partners. 

  • In-depth knowledge of relevant regulatory requirements and industry standards (ISO 27001, SOC 2, GDPR, DORA, etc.). 

  • Experience with cloud security (AWS, Google etc.), application security, and DevSecOps practices is a significant plus. 

  • Proven experience in developing and implementing security strategies and programs. 

  • Extensive experience with risk management, security audits, and vulnerability management. 

  • Excellent leadership, communication, and interpersonal skills, with the ability to influence and collaborate across all levels of the organization.    

  • Strong analytical, problem-solving, and decision-making skills.    

  • Relevant certifications such as CISSP, CISM, or equivalent are highly desirable. 

 

Hawk Glassdoor Company Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
Hawk DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Hawk
Hawk CEO photo
Unknown name
Approve of CEO

Average salary estimate

$135000 / YEARLY (est.)
min
max
$120000K
$150000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Head of Information Security, Hawk

Join Hawk in Berlin as the Head of Information Security and lead the way in protecting vital information assets within the AI-supported anti-money laundering and fraud detection landscape. In this role, you’ll develop and execute a robust security strategy that aligns with our mission to fight against money laundering and fraud, while managing a dynamic team of security professionals. You’ll ensure our systems safeguard our clients in the financial sector, as well as aid our parent company and affiliates across Germany, the USA, the UK, and Singapore. Your position is essential in fostering a culture of collaboration and continuous improvement within the InfoSec team. Through your leadership, you will not only implement policies and procedures that adhere to industry standards, but also conduct regular audits and risk assessments that identify vulnerabilities and drive effective response measures. Keeping abreast of the latest threats and technologies, you will innovate our security practices and manage relationships with external vendors to ensure compliance with regulatory requirements. At Hawk, you will have the opportunity to promote a strong security culture through training programs that empower our team. If you have a strong technical background, excellent leadership skills, and a passion for elevating information security, we’d love to see how you can make a difference in our organization.

Frequently Asked Questions (FAQs) for Head of Information Security Role at Hawk
What are the key responsibilities of the Head of Information Security at Hawk?

The Head of Information Security at Hawk is tasked with building and leading the entire information security program. This includes developing a comprehensive security strategy, managing a skilled team of security professionals, conducting audits and assessments, and ensuring compliance with regulations such as ISO 27001 and SOC 2, all while fostering a strong security culture within the organization.

Join Rise to see the full answer
What qualifications do I need to apply for the Head of Information Security position at Hawk?

Candidates for the Head of Information Security role at Hawk should hold a Bachelor's or Master's degree in Information Security, Computer Science, or a related field, alongside a minimum of 9 years of experience in information security. Relevant certifications like CISSP or CISM are desirable. Experience in regulated financial institutions or cloud security is a significant advantage.

Join Rise to see the full answer
How does Hawk promote a culture of security awareness among employees?

At Hawk, the Head of Information Security is responsible for establishing and maintaining security awareness training programs. These initiatives not only educate employees on potential threats but also promote best practices that cultivate a proactive security mindset throughout the organization, ensuring everyone plays a role in safeguarding information.

Join Rise to see the full answer
What role does the Head of Information Security play in compliance at Hawk?

The Head of Information Security plays a crucial role in ensuring that Hawk complies with relevant industry standards and regulations. This involves overseeing security policies, adapting to changes in the regulatory landscape, and implementing ongoing audits and assessments to mitigate any risks associated with non-compliance, thereby protecting both the company and its clients.

Join Rise to see the full answer
What skills are essential for success as Head of Information Security at Hawk?

To be successful as the Head of Information Security at Hawk, strong analytical, problem-solving, and decision-making skills are essential, paired with excellent leadership and communication abilities. You should also have in-depth knowledge of security architectures and industry best practices, ensuring you can effectively communicate with both technical and non-technical audiences.

Join Rise to see the full answer
Common Interview Questions for Head of Information Security
What strategies would you implement to build an effective information security program?

To build an effective information security program, I would first conduct a comprehensive risk assessment to identify vulnerabilities. Then, I'd develop a security policy that aligns with business goals, followed by implementing training programs to enhance security awareness among staff, and establishing continuous monitoring and incident response protocols.

Join Rise to see the full answer
How do you keep up with the latest security threats and technologies?

I regularly follow industry publications, blogs, and attend conferences focused on cybersecurity. Additionally, I participate in professional groups and forums to exchange knowledge with peers. This continuous learning helps me assess emerging threats and evaluate their potential impact on our security posture.

Join Rise to see the full answer
Can you describe a time when you led a security incident response?

One notable instance involved a phishing attack that targeted our organization. I led the response team in investigating the breach, coordinating communication with affected parties, and implementing remedial actions. Post-incident, we reinforced training protocols and updated incident response playbooks based on our findings.

Join Rise to see the full answer
What methods do you use for conducting security audits?

I utilize a combination of automated tools and manual assessments to conduct security audits. This includes reviewing access logs, assessing compliance with policies, and evaluating the security measures in place. Engaging diverse team members in the process also fosters a comprehensive view of potential vulnerabilities.

Join Rise to see the full answer
How would you communicate complex security concepts to non-technical stakeholders?

When explaining complex security concepts to non-technical stakeholders, I focus on using relatable analogies and straightforward language to illustrate risks and impacts. Additionally, I provide visual aids or reports that summarize key points clearly, ensuring stakeholders understand the implications for the business.

Join Rise to see the full answer
What experience do you have with cloud security and its challenges?

I have extensive experience in cloud security, implementing security measures across platforms like AWS and Google Cloud. I understand the challenges such as data breaches, misconfigurations, and compliance with regulations. My approach involves utilizing built-in security features, conducting regular assessments, and ensuring proper governance.

Join Rise to see the full answer
How do you prioritize security risks within your programs?

I prioritize security risks by evaluating their potential impact and likelihood alongside business objectives. This risk-based approach allows me to allocate resources effectively to address high-priority vulnerabilities while maintaining an overall risk management strategy that aligns with the organization's goals.

Join Rise to see the full answer
What role does collaboration play in your approach to information security?

Collaboration is vital in information security. I believe in engaging cross-functional teams to integrate security into all business processes, including development. By collaborating with departments like engineering and product management, we ensure that security considerations are embedded from the ground up.

Join Rise to see the full answer
How do you handle compliance with changing regulations?

To handle compliance with changing regulations, I stay informed through industry newsletters and regulatory updates. I regularly review our policies to ensure alignment with any changes, and I engage team members in training sessions to ensure everyone is aware and compliant with new regulations.

Join Rise to see the full answer
Why do you believe a strong information security posture is essential for a company like Hawk?

A strong information security posture is essential for a company like Hawk because we operate in the sensitive financial sector. Protecting our clients' data builds trust, enhances our reputation, and ensures compliance with regulatory requirements. It is critical for us to safeguard our technology against evolving threats to maintain our leadership in fraud detection.

Join Rise to see the full answer
Similar Jobs
Posted 3 days ago

Join Andersen Windows as a Senior Salesforce Tech Lead, where your Salesforce expertise will drive a major enterprise program.

Join Toyota as a Senior Manager to lead cybersecurity efforts in managing attack surfaces and vulnerabilities within their innovative team.

As an Associate Application Analyst at Prime Healthcare, you will support the management and implementation of essential electronic medical record systems in a dynamic healthcare environment.

Photo of the Rise User
Multi Media LLC Remote No location specified
Posted 10 days ago

Join Multi Media, LLC as a Security Engineer and play a key role in enhancing their security detection and response capabilities.

Photo of the Rise User
DoorDash USA Hybrid Chicago, Illinois, United States
Posted 7 days ago

Join DoorDash as a Staff Security Engineer, Red Team and play a pivotal role in identifying and mitigating security threats.

Photo of the Rise User
Visa Remote Bogota, Colombia
Posted 6 days ago

Visa is seeking a DevOps Consultant to enhance its technology infrastructure and support innovative payment solutions in a fully remote role.

Dive into the world of banking operations with M&T Bank's comprehensive Youth Apprenticeship Program designed to foster professional growth and development.

Hawk (formerly TabMo) goes one for all : Omnichannel programmatic platform for agencies and advertisers. Since 2014, Hawk has built its own & operated omnichannel programmatic full stack platform. Based in London, Paris, Montpellier (South of F...

29 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
April 15, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
N
8 people applied to SAP BO Admin at NXTGIG
G
Someone from OH, Cincinnati just viewed Operations Lead - AML Refresh Ops (Global Banking) at GHR
Photo of the Rise User
Someone from OH, Akron just viewed Data Scientist II at Kaiser Permanente
Photo of the Rise User
Someone from OH, Eastlake just viewed Summer Intern at Gooch & Housego
I
Someone from OH, Perrysburg just viewed CNC Manufacturing Technician at Innovance
Photo of the Rise User
82 people applied to Security Analyst Jr at DEUNA
Photo of the Rise User
78 people applied to Cybersecurity Intern at Dewberry
Photo of the Rise User
Someone from OH, Cincinnati just viewed Senior Lifecycle Marketing Manager at SoFi
Photo of the Rise User
Someone from OH, Cincinnati just viewed Lifecycle Marketing Manager at Caribou
Photo of the Rise User
Someone from OH, Cincinnati just viewed Senior Marketing Manager at Ocorian
Photo of the Rise User
Someone from OH, Cincinnati just viewed Growth Marketing Manager at Credit Genie
Photo of the Rise User
Someone from OH, Cincinnati just viewed Director of Product Marketing - AAA Campaigns at PrizePicks
Photo of the Rise User
Someone from OH, Cincinnati just viewed Digital Marketing Analyst, Digital Properties at Darden
Photo of the Rise User
Someone from OH, Cincinnati just viewed Growth Lead at io.net
Photo of the Rise User
Someone from OH, Cincinnati just viewed Sr. Manager / Director of Demand Generation at Seesaw
Photo of the Rise User
Someone from OH, Euclid just viewed Work From Home Union Benefits Rep at Global Elite
Photo of the Rise User
Someone from OH, Cincinnati just viewed Runtime QA Tester II at Aechelon Technology
Photo of the Rise User
19 people applied to IT Support Intern at SoundCloud