Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
CISO Shared Line of Service Identity Management (M/F - any location) image - Rise Careers
Job details

CISO Shared Line of Service Identity Management (M/F - any location)

Job Description

CISO SHARED LINE OF SERVICE IDENTITY MANAGEMENT (M/F)

 

Attached to the Group Chief Information Security Officer teams and the Shared Line of Service Identity, you will be part of the EQUANS Cybersecurity team, which is responsible for defining and implementing the global cybersecurity strategy for the EQUANS perimeter, including the implementation of global programs and coordination of the various EQUANS cybersecurity teams.

As the Cybersecurity Reference for SLS Identity, you will be responsible for the cybersecurity of the Identity perimeter and the management of the most critical privileged accounts. In close liaison with the SLS (Shared Line of Services) teams, your mission will be to maintain and improve the security level through monitoring security indicators, managing risk analyses, audits, and remediation plans.

 

In this context, your main missions and activities will include:

  • Being the privileged CISO contact for our IAM/IAG/PAM solution partners and suppliers.
  • Defining control points, monitoring KPIs, and managing remediations in liaison with the operational IT teams of the SLS.
  • Participating in the development of security standards and guidelines for your perimeter - in liaison with the CyTO (Cyber Technical Office) - and being responsible for their dissemination/promotion within the operational IT teams of the SLS.
  • Participating in Architecture Committees related to IAM and PAM perimeters.
  • Supporting transversal projects within EQUANS on information security and cybersecurity aspects.
  • Organizing, in coordination with the EQUANS CERT and CISO Office, penetration tests and technical audits before project production.
  • Ensuring the cybersecurity of your SLS activities, including the management of Equans' Active Directory.
  • Acting as the crisis contact point if necessary, in collaboration with the Equans CSIRT.
  • Maintaining a strong relationship and good collaboration with the M-CISOs and local IT teams (Helpdesk) of the various EQUANS entities.

With an initial Masters/Engineering degree in Computer Science/Mathematics/Science, you have about ten years of professional experience in demanding, complex, and international environments, in the field of cybersecurity, including some dedicated to IS protection;

  • You have a valid cybersecurity certification (CISSP, CEH, CompTIA Security+ or GSEC) with ideally Microsoft certifications (MVP) or certain suppliers or IAM security solutions
  • You have excellent knowledge of Microsoft environments (EntraID, AD,...) and Microsoft security solutions related to identity 
  • You have excellent knowledge of administration bastion management
  • You have good knowledge of certificate management and identity processes delivered to machines;
  • You have good knowledge of IAG tools and recertification processes;
  • Knowledge of information security and risk management frameworks (ISO/IEC 27001, 27002, and 27005...) is useful;
  • You have the following qualities as a leader:
    • Change Leader
    • Operational Excellence
    • Performance Culture
    • Servant Leadership
    • Empowerment
    • Open-mindedness

You know how to navigate a decentralized and multicultural organization with varying levels of maturity in terms of cybersecurity and architecture. Autonomous, dynamic, you show initiative. You are a good communicator and are recognized for your interpersonal skills, but also your discretion. You work in compliance with ethical principles. Fluent and professional English is essential. Occasional worldwide travel to be expected.

 

Average salary estimate

$125000 / YEARLY (est.)
min
max
$100000K
$150000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About CISO Shared Line of Service Identity Management (M/F - any location), UNAVAILABLE

As the CISO Shared Line of Service Identity Management at EQUANS, you’ll play a pivotal role in shaping our cybersecurity landscape. Attached to the Group Chief Information Security Officer teams, you’ll be deeply involved in defining and executing a global cybersecurity strategy tailored for EQUANS. Your expertise in managing critical privileged accounts and the cybersecurity perimeter around identity will be vital in this position. You’ll integrate closely with Shared Line of Services to enhance security performance through monitoring security indicators and conducting risk analyses. Collaboration is key here – you’ll liaise with IAM/IAG/PAM solution partners and contribute to security standards development alongside the Cyber Technical Office. You’ll also take part in Architecture Committees, ensuring best practices around IAM and PAM are followed. But that’s not all; your responsibilities will extend to organizing technical audits and penetration tests, reaching out to cross-functional teams, and acting as a crisis point of contact when necessary. We’re looking for someone with a strong background in cybersecurity - that means having about ten years of experience in dynamic environments, along with relevant certifications like CISSP or CompTIA Security+. If you thrive in multicultural settings and are a proactive communicator, fluent in English, then this opportunity at EQUANS awaits you. Travel opportunities might arise as you take on this exciting challenge, making it a perfect fit for a seasoned cybersecurity professional ready to make an impact!

Frequently Asked Questions (FAQs) for CISO Shared Line of Service Identity Management (M/F - any location) Role at UNAVAILABLE
What are the main responsibilities of the CISO Shared Line of Service Identity Management at EQUANS?

The CISO Shared Line of Service Identity Management at EQUANS is primarily responsible for overseeing the cybersecurity of the Identity perimeter. Key duties include monitoring security indicators, managing risk analyses and audits, working with IAM/IAG/PAM solution partners, defining control points, and enhancing security strategies across the organization. The role also involves promoting security standards and guidelines, managing critical privileged accounts, and collaborating with the Cyber Technical Office and other project teams.

Join Rise to see the full answer
What qualifications are necessary for the CISO Shared Line of Service Identity Management at EQUANS?

Candidates applying for the CISO Shared Line of Service Identity Management position at EQUANS should hold a master’s or engineering degree in Computer Science or Mathematics. Approximately ten years of experience in cybersecurity within complex global environments is essential. Valid cybersecurity certifications like CISSP or CompTIA Security+ are important, alongside strong knowledge of Microsoft environments and security solutions relating to identity management.

Join Rise to see the full answer
What experiences would benefit someone applying for the CISO Shared Line of Service Identity Management role at EQUANS?

Experience in managing decentralized and multicultural organizations would be beneficial for the CISO Shared Line of Service Identity Management role at EQUANS. Familiarity with data protection frameworks like ISO/IEC 27001 could enhance a candidate's value. Additionally, proficiency in managing privileged accounts and administering certifications or identity processes are crucial in performing effectively in this position.

Join Rise to see the full answer
How does the CISO Shared Line of Service Identity Management at EQUANS support information security projects?

As the CISO Shared Line of Service Identity Management at EQUANS, one supports information security projects by acting as the security authority during transversal projects, ensuring that cybersecurity considerations are integrated. This includes organizing penetration tests, conducting technical audits prior to project launches, and collaborating closely with local IT teams and the Cyber Technical Office to minimize risks and improve security postures.

Join Rise to see the full answer
What soft skills are important for the CISO Shared Line of Service Identity Management at EQUANS?

For the CISO Shared Line of Service Identity Management position at EQUANS, strong communication abilities and interpersonal skills are vital. Candidates should demonstrate leadership qualities such as change leadership and empowerment, alongside the ability to work in a decentralized and multicultural environment. Being proactive, showing discretion, and maintaining ethical standards are essential attributes for success in this role.

Join Rise to see the full answer
Common Interview Questions for CISO Shared Line of Service Identity Management (M/F - any location)
How do you approach risk management in cybersecurity as CISO Shared Line of Service Identity Management?

I approach risk management by first identifying the organization's assets and valuing each in terms of potential threats. Then, I implement a framework like ISO/IEC 27001 to assess risks regularly. It's crucial to collaborate with various teams to ensure all risks are documented and mitigated effectively, promoting a culture of security awareness throughout the organization.

Join Rise to see the full answer
Can you describe a challenging cybersecurity project you've led?

In a previous role, I led a cybersecurity initiative to overhaul our access management processes. The challenge involved coordinating across multiple departments and identifying gaps in the existing system. By implementing a new IAM framework and continuously engaging with stakeholders, we improved access security and enhanced user experiences significantly.

Join Rise to see the full answer
What strategies do you use to keep your team engaged and informed on cybersecurity best practices?

To keep my team engaged, I prioritize ongoing training and development opportunities, ensuring they are updated on the latest trends and technologies in cybersecurity. Regular workshops and knowledge-sharing sessions also promote a collaborative culture, making everyone feel invested in our collective cybersecurity goals.

Join Rise to see the full answer
How do you measure the success of your cybersecurity initiatives?

I measure success through defined KPIs focusing on reduced incidents of breaches, improved response times to threats, and overall stakeholder satisfaction. Regular audits and reports also help assess compliance and identify areas for further improvement, allowing us to adapt our strategies as necessary.

Join Rise to see the full answer
What techniques do you utilize for threat detection and incident response?

For threat detection, I rely on a combination of automated tools and manual monitoring that focuses on unusual patterns in activity. Our incident response strategy includes predefined protocols allowing for rapid response and minimal impact on operations, along with conducting thorough post-incident reviews to enhance future preparedness.

Join Rise to see the full answer
How do you manage relationships with third-party vendors in the cybersecurity landscape?

Managing relationships with third-party vendors involves establishing clear communication channels and expectations from the outset. I conduct regular performance reviews and ensure that vendors align with our security standards. Building these relationships based on trust and collaboration is crucial to maintaining effective security measures.

Join Rise to see the full answer
What is your approach to developing security standards and guidelines in your organization?

My approach involves collaborating with key stakeholders to create practical guidelines that address our specific challenges and regulatory requirements. Engaging teams across the organization ensures that the standards are widely understood, supported, and implemented, fostering a security-centric culture.

Join Rise to see the full answer
How do you handle compliance with cybersecurity regulations?

Compliance is integral to our cybersecurity strategy. I establish a dedicated team that proactively monitors changes in regulations and industry standards. Regular training sessions help ensure that all employees are aware of their responsibilities in maintaining compliance, and ongoing audits help us identify areas needing attention.

Join Rise to see the full answer
What contingency measures do you have in place for crisis situations?

For crises, I ensure we have a comprehensive incident response plan that outlines roles and responsibilities. Regular drills simulate real scenarios to keep the team prepared, while continuous communication with stakeholders during an incident guarantees that everyone stays informed and coordinated for a swift response.

Join Rise to see the full answer
Why do you believe you are a good fit for the CISO Shared Line of Service Identity Management at EQUANS?

I believe I am a strong fit for this role due to my extensive experience in cybersecurity, coupled with my leadership skills and commitment to cultivating a culture of security. My ability to navigate complex environments and collaborate with diverse teams aligns well with EQUANS' needs for its Shared Line of Service Identity Management.

Join Rise to see the full answer
Similar Jobs
Posted 4 days ago
Photo of the Rise User
Posted 5 days ago
Photo of the Rise User
Posted 5 days ago
Photo of the Rise User
LINEAR Remote No location specified
Posted 13 days ago
Fidelity Investments Remote US, Suffolk County, MA; Massachusetts, Boston, MA
Posted 5 days ago
Photo of the Rise User
Posted 8 days ago
Inclusive & Diverse
Diversity of Opinions
Passion for Exploration
Dare to be Different
Empathetic
Growth & Learning
Paid Holidays
Medical Insurance
Equity
401K Matching
Learning & Development
Social Gatherings
Flex-Friendly
Maternity Leave
Paternity Leave
Sabbatical
Photo of the Rise User
RPI Group Hybrid Virginia, United States
Posted 2 days ago
MATCH
Calculating your matching score...
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, remote
DATE POSTED
March 26, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
Someone from OH, Dayton just viewed Front Desk Clerk at Marriott International
Photo of the Rise User
Someone from OH, Hilliard just viewed Junior Digital Analyst at Jellyfish
Photo of the Rise User
Someone from OH, Hilliard just viewed Junior Digital Data Analyst at AECOM
Photo of the Rise User
Someone from OH, Columbus just viewed Data Analyst/R Programmer at Peet's
Photo of the Rise User
Someone from OH, Grandview Heights just viewed Service Drive Greeter at Jeff Wyler Automotive Family
Photo of the Rise User
41 people applied to SOC Analyst I at Epsilon
Photo of the Rise User
Someone from OH, Washington Court House just viewed Administration and Clerical at Walmart
Photo of the Rise User
Someone from OH, Dover just viewed Finance Intern - Summer 2025 at Spectrum
F
Someone from OH, Columbus just viewed Mortgage Loan Officer Assistant at Fulton Bank
Photo of the Rise User
Someone from OH, Cincinnati just viewed Amazon Work from Home Data Entry Jobs – Entry Level at Amazon
Photo of the Rise User
7 people applied to Software Intern at Oracle
J
Someone from OH, Westerville just viewed Oracle Database Administrator- Remote only at JASCI
V
Someone from OH, Toledo just viewed Sports Event Coordinator at Ventures With Jen
Photo of the Rise User
Someone from OH, Dayton just viewed Research Assistant at Leidos
Photo of the Rise User
Someone from OH, Cincinnati just viewed Finance & Accounting Associate at HeadQuarters
Photo of the Rise User
Someone from OH, Canton just viewed Communications Manager at Shearer's Foods
Photo of the Rise User
Someone from OH, Sandusky just viewed Supply Chain Trainee Program (SCTP) at Anheuser-Busch
Photo of the Rise User
Someone from OH, Mason just viewed HR/Recruiting Assistant at Illumination
Photo of the Rise User
Someone from OH, Strongsville just viewed Used Car Buyer - Concord Toyota at Sonic Automotive