Title: Chief Information Security Officer (CISO)-AVP to SAVP
Company Name: Trust Bank Ltd.
Vacancy: --
Age: Na
Job Location: Anywhere in Bangladesh
Salary: --
Experience:
Bachelor’s in Computer Science, IT, Cybersecurity, or Information Security.CISSP and CISM (additional certifications advantageous).
Over 15 years of professional experience in IT and cybersecurity in the banking industry, with a minimum of 5 years in IT and 5 years in cybersecurity.
Strong SOC, risk management, payment security, incident response, and BCP expertise.
Hands-on and leadership experience with SIEM, EDR/XDR, firewalls, WAF, PAM, VAPT.
Proven compliance management for PCI DSS, ISO 27001, SWIFT CSP in banking.
Knowledge of banking, financial services, and regulatory security.
Experience with vendor management, security tool procurement, and contracts.
Develop and enhance the Bank’s cybersecurity and information security strategy in line with business goals, risk appetite, and regulatory requirements.
Establish, maintain, and enforce security policies, standards, and governance frameworks per Bangladesh Bank ICT Guidelines and international best practices.
Oversee risk assessments, vulnerability management, penetration testing, and cyber threat programs.
Ensure compliance with ISO 27001, PCI DSS, Swift CSP, and Bangladesh Bank regulations, while leading related certification and compliance initiatives.
Design and maintain the Business Continuity Management System (BCMS) and Disaster Recovery framework in accordance with Bangladesh Bank and ISO 22301.
Manage cybersecurity operations, including SOC, threat intelligence, monitoring, detection, and response.
Define and manage security architecture and technology stack for effective integration.
Oversee implementation and management of security tools: SIEM, EDR/XDR, firewalls, WAF, API Security, DLP, PAM, VAPT, threat intelligence, web& email security.
Ensure proper logging, monitoring, correlation, and retention of security events.
Lead cyber incident response, digital forensics, crisis management, and regulatory reporting.
Oversee data protection, encryption, key management, and secure system configurations.
Manage security budgets, cyber security roadmaps, vendors, and third-party risk assessments.
Develop and deliver cybersecurity awareness, training, and phishing simulations.
Report cybersecurity posture, tool effectiveness, incidents, and KRIs to senior management and the Board.