Vice President, Chief Information Security Officer
McLean, Fairfax County, Virginia, USA
Listed on 2026-01-14
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, IT Project Manager
Introduction
KLDiscovery offers a fantastic opportunity for you to use your talents to make a meaningful impact in a fast‑paced, growing technology and services organization! KLDiscovery is a global leader in eDiscovery, compliance, and data management solutions, empowering law firms, corporations, and government agencies to tackle their most complex legal and regulatory challenges.
We are seeking an accomplished and strategic VP, Chief Information Security Officer (CISO) to lead our global Information Security teams and shape the cyber security strategy, compliance, and risk posture across all business operations.This role ensures the confidentiality, integrity, and availability of company systems, data, and services while enabling business agility and compliance with regulatory requirements. The CISO will develop and execute an enterprise security roadmap that protects our clients, employees, systems, and sensitive data while enabling business efficiency.
Work Status: Remote, work from home opportunity.
Is This Role For You?You will provide strategic direction, manage teams and budgets, drive multi‑year maturity plans, and regularly communicate risk, priorities, and progress to senior leadership. At the same time, this role requires hands‑on engagement with architecture reviews, incident response, vendor risk management, audits, certifications, and customer trust initiatives.
You will partner closely with leaders across Engineering, IT, Legal, Compliance, Finance, and Operations, fostering a culture of shared responsibility for security. This includes establishing clear policies and standards, defining and monitoring key risk and performance metrics, and guiding teams through secure‑by‑design principles and real‑world threat considerations.
A Day in The Life Strategic Leadership- Define and drive KLD's information security roadmap, strategy, and execution in alignment with business goals.
- Develop and maintain a security program aligned with industry frameworks (e.g., NIST CSF, SOC
2) and privacy/security obligations (GDPR, CCPA/CPRA, HIPAA, GLBA, DOJ, and client‑specific requirements). - Integrate cyber resilience and business continuity planning into enterprise risk management.
- Partner with Engineering and Product to ensure security requirements are integrated and prioritized within all roadmap initiatives.
- Own global compliance certifications (ISO 27001, SOC 2, CMMC) and client audit readiness programs.
- Establish and enforce security policies, standards, and secure‑by‑design principles across all products and services.
- Lead risk assessments, gap analyses, and continuous improvement initiatives.
- Oversee enterprise risk management efforts, including vendor and supply chain security, annual posture reviews, penetration testing, bug bounty programs, and contractual compliance.
- Drive vendor risk management processes and third‑party security assessments.
- Lead the evaluation, selection, and deployment of security technologies that strengthen system, application, and data protection.
- Drive governance for AI and emerging technologies, ensuring secure and ethical adoption across business units.
- Own the incident response program, ensuring proper handling of breaches, escalation, root‑cause analysis, and corrective action.
- Lead and mentor a high‑performing security team supporting 24/7 monitoring, threat detection, and incident response tailored to a legal data environment.
- Lead cross‑functional IT and security teams through transformation initiatives.
- Develop executive dashboards and reporting mechanisms for risk posture, maturity progress, and security KPIs for board‑level visibility.
- Champion security awareness training and initiatives that are approachable, practical, and relevant to employees at every level.
- Foster strong cross‑functional relationships, helping teams understand the "why" behind security decisions and controls.
- Manage the security budget and resource strategy, balancing strong protections with business agility and client expectations.
- Identify…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).