Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
IT Infrastructure & Cybersecurity Lead/in house IT Lead
Overview
A private Family Office is seeking a trusted IT infrastructure and cybersecurity professional or specialist provider to design, implement, and maintain a secure and discreet technology environment.
The organization is small (approximately 5–6 users) and operates in a security-sensitive context, requiring a highly reliable, privacy-focused, and right-sized IT architecture aligned with established cybersecurity best practices.
The selected partner will provide end-to-end services, including infrastructure design, procurement guidance, implementation, migration, documentation, user training, and ongoing system management.
Scope of Responsibilities
Secure Infrastructure Design
- Design and deploy a secure IT architecture suitable for a small, security-focused environment, either:
- On-premises server infrastructure located at the office, or
- Dedicated single-tenant hosted infrastructure (no shared multi-tenant systems).
- Oversee system configuration, data migration, and secure environment setup.
Secure Communications & Information Management
- Implement secure email with encryption in transit and a defined approach to message-level encryption where appropriate.
- Deploy secure file storage with encryption at rest, role-based access controls, activity auditing, and secure remote access.
- Implement a secure, encrypted messaging platform hosted within the environment.
Business System Integration
- Implement or securely integrate an accounting solution in coordination with the financial controller.
Device & Endpoint Management
- Establish device provisioning and lifecycle management for Windows, macOS, iOS, and Android.
- Implement centralized device management, configuration standards, and compliance controls.
Identity & Network Security
- Implement identity and access management controls including:
- Multi-factor authentication for all users and privileged accounts
- Role-based access controls
- Configure secure networking including firewall, VPN, and remote access capabilities.
- Deploy a secure password management platform with controlled credential sharing.
Security Monitoring & Incident Response
- Implement centralized logging, monitoring, and security alerting.
- Establish a defined incident response process.
System Maintenance & Resilience
- Manage patching and system maintenance across infrastructure and endpoints.
- Implement backup, disaster recovery, and business continuity procedures appropriate for the organization.
Deliverables
- Secure infrastructure architecture and implementation
- Migration and system configuration documentation
- Security and operational procedures
- User onboarding and training
- Ongoing monitoring, maintenance, and managed services
Ideal Profile
- Demonstrated experience supporting family offices, private investment offices, or similarly security-sensitive organizations.
- Strong expertise in secure infrastructure design, endpoint management, and cybersecurity best practices.
- Ability to deliver discreet, reliable, and end-to-end IT support in a small, high-trust environment.
Key Skills
Ranked by relevanceReady to apply?
Join Black Swan Group and take your career to the next level!
Application takes less than 5 minutes

