About the job
GRC Information & Security Manager
About H:
At H, we are at the forefront of advancing superintelligence through innovative agentic AI solutions. Our mission is to automate complex, multi-step tasks typically performed by humans, thereby unlocking the full potential of human capabilities.
We are on the lookout for the brightest minds in AI, individuals who are equally committed to building in a safe and responsible manner as they are to pioneering transformative agentic technologies. Our culture is one of openness, continuous learning, and collaboration, where every voice matters.
Key Responsibilities:
Security Governance & Compliance
Lead and manage certification processes to uphold SOC 2 Type 2 compliance while facilitating the adoption of ISO 27001 and ISO 27701 as the organization scales.
Ensure adherence to GDPR, the EU AI Act, and the Cyber Resilience Act, proactively addressing regulatory changes that impact our products and operations.
Maintain thorough documentation of security controls and compliance records.
Serve as the primary security liaison for enterprise clients, ensuring their needs are met.
Support sales and go-to-market teams by completing security questionnaires and effectively communicating our security posture to prospective clients.
Cloud Security & Technical Oversight
Conduct audits of cloud provider controls and security configurations (primarily AWS).
Implement strong access management practices and security controls throughout our infrastructure.
Collaborate with the engineering team to integrate secure development practices throughout the software development lifecycle (SDLC).
Security Policy & Documentation
Create, update, and enforce company-wide security policies that are practical and scalable.
Conduct security risk assessments and formulate actionable mitigation strategies.
Cultivate a robust security culture through internal guidelines, training sessions, and awareness initiatives.
Operations & Incident Response
Monitor for security incidents and ensure that response protocols are clearly defined, regularly tested, and effective.
Coordinate routine security audits and penetration tests to assess vulnerabilities.

