Chief Information Security Officer

Boston, MA

About Charles River Associates

Charles River Associates is a leading global consulting firm that provides economic, financial, and business management expertise to major law firms, corporations, and governments around the world. CRA advises clients on economic and financial matters pertaining to litigation and regulatory proceedings, and guides corporations through critical business strategy and performance-related issues. Since 1965, clients have engaged CRA for its combination of industry experience and rigorous, fact-based analysis that provides clients with clear, implementable solutions to complex business concerns. 

The Information Technology (ITS) department at Charles River Associates is a team of 40 professionals dedicated to enhancing, maintaining, and developing the firm's technology infrastructure and security. The team comprises six functions: Enterprise Applications Services; Service Delivery & Telecom; Information Security; Infrastructure, Cloud and Networks; Project Management and Procurement; and Human Resource Information Systems. Information Technology staff are based in the Boston, Chicago, College Station, New York, Oakland, and Washington, DC offices domestically, as well as London and Munich offices internationally.

Position Overview

The Chief Information Security Officer (CISO) is responsible for developing and implementing an information security program that includes procedures and policies frameworks for application security, infrastructure security, compliance and security operations. Reporting to the Chief Information Officer, the CISO will oversee the organization’s information security strategy, manage a team of security professionals, and ensure compliance with relevant laws and regulations.

The ideal candidate will possess deep technical expertise in the field of Information Security with a successful history of delivering Enterprise-wide security programs.

  • Develop, implement, and coordinate enterprise-wide information security program that aligns with business needs and compliance responsibilities;
  • Define and execute both vision and strategy for the entire company’s security risk management program to include organizational security, information technology, application security, and compliance;
  • Build and drive a cybersecurity strategy and framework, with initiatives to secure the organization's cyber and technology assets;
  • Evaluate and prioritize risks and emergent security threats throughout our organization, recommending mitigation strategies and identifying risks associated with current and future systems;
  • Coordinate IT Security Governance activities, including monitoring, evaluating, reporting on, directing security efforts, and establishing security-related policies and procedures;
  • Coordinate internal and enterprise communications and communicate technical information in a manner that enables effective strategic decisions for both technical and non-technical stakeholders;
  • Oversee information security incident detection, response, and recovery to mitigate the impact and ensure timely resolution and communication;
  • Manage all teams involved in IT security, including hiring and developing a pipeline of talent, providing training and mentoring to security team members;
  • Lead a third-party oversight function to assess, onboard, and monitor key suppliers, ideally using a risk-based approach;
  • Oversee the security awareness programs to educate employees about information security and their role in protecting the organization's assets;
  • Perform periodic information security-related risk analyses, prioritize risks, and implement effective risk mitigation processes to protect the enterprise information assets;
  • Communicate security policies and procedures to all personnel and monitor compliance, provide periodic reporting on the information security program to leadership;
  • Coordinate with legal and compliance to ensure compliance with laws and regulatory requirements;
  • Maintain company certifications (SOC2, ISO27001 etc.);
  • Manage client compliance program including client audits, contractual compliance;
  • Lead cybersecurity operation and implement contingency plans for disaster recovery protocols and business continuity plans with business resilience in mind;
  • Stay current with emerging security trends, threats, and technology solutions to ensure the organization maintains a robust security posture; and
  • Other duties and special projects as assigned.

Desired Qualifications

  • Bachelor's Degree from an accredited institution in Computer Science, Information Technology, Engineering, Cybersecurity, Mathematics, Business, or a related field required; advanced degree in a related technical, audit, law, or security field preferred;
  • 10+ years of experience in evolving information security and IT roles, including 3+ years’ experience as a Chief Information Security Officer and 5 years’ leadership/management-level experience with enterprise-level security programs, policy, and administration;
  • Certified Information Systems Security Professional (CISSP) required; additional certifications (CRISC, CISA, CISM, CISSP or similar) desirable;
  • Deep understanding of cybersecurity principles, frameworks, standards, and best practices, including NIST 800-53 and Cybersecurity Framework (CSF), ISO 27001, SANS, OWASP, COBIT and others. High familiarity with privacy laws across all global jurisdictions;
  • Familiarity with relevant legal and regulatory compliance requirements, such as cybersecurity laws, financial regulations, data protection laws (e.g., SOC2, HIPAA, HITECH Act, GDPR), and industry-specific regulations;
  • Knowledge of network architectures, including cloud security, firewalls, and intrusion detection/prevention systems;
  • Knowledge of Cloud platforms, such as AWS, Azure, Google Cloud, and protecting data stored within such environments;
  • Strong security architecture background with experience building and driving a cybersecurity strategy and framework, with initiatives to secure the organization's cyber and technology assets and prevent, mitigate, and recover from security breaches and incidents;
  • Strong understanding of information security principles, practices, and technologies, including network security, application security, cloud security and endpoint security;
  • Excellent oral and written communication skills and the ability to adapt your communication style across various audiences – technical, executive, user;
  • Strong leadership skills, both within the information security business unit and as a collaborator with other business units and stakeholders;
  • Demonstrated success in building and leading high-performing teams in dynamic environments;
  • Strong sense of urgency, personal responsibility, accountability; self-motivated, efficient, and effective; and
  • Excellent organizational and time management skills, able to initiate, organize, prioritize, and coordinate multiple & complex projects.

Work Location Flexibility

CRA creates a work environment that enables our colleagues to benefit from being together in the office to best deliver on our promise of career growth, mentorship and inclusivity. At the same time, we recognize that individuals realize a range of benefits when working from home periodically. We currently ask that individuals spend 3 to 4 days a week on average working in the office (which may include traveling to another CRA office), with specific days determined in coordination with your team. At certain times of the year (e.g. holiday periods), additional remote work options are offered to those whose work commitments permit it, although our offices remain open for those who choose or need to be there.

Our Commitment to Equal Employment Opportunity

Charles River Associates is an equal opportunity employer (EOE). All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, status as a protected veteran, or any other protected characteristic under applicable law.

Apply for this job

*

indicates a required field

Resume/CV*

Accepted file types: pdf, doc, docx, txt, rtf


Education

Select...
Select...
Select...
Select...

Select...

Please indicate below any languages with which you have business-level fluency.

Select...
Select...
Select...
Privacy Notice *

CRA is committed to maintaining the accuracy, confidentiality and security of your personal information. CRA’s Privacy Notice describes the personal data that CRA collects from or about you, how it is used and with whom it is disclosed to. Please click to view CRA’s Privacy Notice, and acknowledge receipt.

Voluntary Self-Identification

For government reporting purposes, we ask candidates to respond to the below self-identification survey. Completion of the form is entirely voluntary. Whatever your decision, it will not be considered in the hiring process or thereafter. Any information that you do provide will be recorded and maintained in a confidential file.

As set forth in Charles River Associates’s Equal Employment Opportunity policy, we do not discriminate on the basis of any protected group status under any applicable law.

Select...
Select...
Race & Ethnicity Definitions

If you believe you belong to any of the categories of protected veterans listed below, please indicate by making the appropriate selection. As a government contractor subject to the Vietnam Era Veterans Readjustment Assistance Act (VEVRAA), we request this information in order to measure the effectiveness of the outreach and positive recruitment efforts we undertake pursuant to VEVRAA. Classification of protected categories is as follows:

A "disabled veteran" is one of the following: a veteran of the U.S. military, ground, naval or air service who is entitled to compensation (or who but for the receipt of military retired pay would be entitled to compensation) under laws administered by the Secretary of Veterans Affairs; or a person who was discharged or released from active duty because of a service-connected disability.

A "recently separated veteran" means any veteran during the three-year period beginning on the date of such veteran's discharge or release from active duty in the U.S. military, ground, naval, or air service.

An "active duty wartime or campaign badge veteran" means a veteran who served on active duty in the U.S. military, ground, naval or air service during a war, or in a campaign or expedition for which a campaign badge has been authorized under the laws administered by the Department of Defense.

An "Armed forces service medal veteran" means a veteran who, while serving on active duty in the U.S. military, ground, naval or air service, participated in a United States military operation for which an Armed Forces service medal was awarded pursuant to Executive Order 12985.

Select...

Voluntary Self-Identification of Disability

Form CC-305
Page 1 of 1
OMB Control Number 1250-0005
Expires 04/30/2026

Why are you being asked to complete this form?

We are a federal contractor or subcontractor. The law requires us to provide equal employment opportunity to qualified people with disabilities. We have a goal of having at least 7% of our workers as people with disabilities. The law says we must measure our progress towards this goal. To do this, we must ask applicants and employees if they have a disability or have ever had one. People can become disabled, so we need to ask this question at least every five years.

Completing this form is voluntary, and we hope that you will choose to do so. Your answer is confidential. No one who makes hiring decisions will see it. Your decision to complete the form and your answer will not harm you in any way. If you want to learn more about the law or this form, visit the U.S. Department of Labor’s Office of Federal Contract Compliance Programs (OFCCP) website at www.dol.gov/ofccp.

How do you know if you have a disability?

A disability is a condition that substantially limits one or more of your “major life activities.” If you have or have ever had such a condition, you are a person with a disability. Disabilities include, but are not limited to:

  • Alcohol or other substance use disorder (not currently using drugs illegally)
  • Autoimmune disorder, for example, lupus, fibromyalgia, rheumatoid arthritis, HIV/AIDS
  • Blind or low vision
  • Cancer (past or present)
  • Cardiovascular or heart disease
  • Celiac disease
  • Cerebral palsy
  • Deaf or serious difficulty hearing
  • Diabetes
  • Disfigurement, for example, disfigurement caused by burns, wounds, accidents, or congenital disorders
  • Epilepsy or other seizure disorder
  • Gastrointestinal disorders, for example, Crohn's Disease, irritable bowel syndrome
  • Intellectual or developmental disability
  • Mental health conditions, for example, depression, bipolar disorder, anxiety disorder, schizophrenia, PTSD
  • Missing limbs or partially missing limbs
  • Mobility impairment, benefiting from the use of a wheelchair, scooter, walker, leg brace(s) and/or other supports
  • Nervous system condition, for example, migraine headaches, Parkinson’s disease, multiple sclerosis (MS)
  • Neurodivergence, for example, attention-deficit/hyperactivity disorder (ADHD), autism spectrum disorder, dyslexia, dyspraxia, other learning disabilities
  • Partial or complete paralysis (any cause)
  • Pulmonary or respiratory conditions, for example, tuberculosis, asthma, emphysema
  • Short stature (dwarfism)
  • Traumatic brain injury
Select...

PUBLIC BURDEN STATEMENT: According to the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless such collection displays a valid OMB control number. This survey should take about 5 minutes to complete.