First month at Brights — what an ISO 27001 ISMS function actually does day-to-day

I've been at Brights for a month as their first cybersec hire. The ISO 27001 ISMS work is way less bureaucracy and way more cross-team negotiation than I expected. Notes for future-junior-me.

I joined Brights as a Junior Cybersecurity Specialist in early September — their first dedicated cybersec hire after they got ISO/IEC 27001:2022 certified earlier in the year. I’d been here as a summer intern in 2024 doing OWASP Top 10 review on three internal apps, so this isn’t a green-fields onboarding. But the full-time cybersec role is its own distinct shape, and I want to write down what I’ve actually been doing this month before it starts feeling normal and I forget how new it all felt.

The thing I had wrong about ISMS work

I expected ISO 27001 ISMS work to be document-shuffling and policy maintenance. Bureaucracy. Update the risk register, file the audit-evidence folders, write a new policy when something breaks, repeat.

It’s not zero of that. But the actual day-to-day is much more cross-team negotiation — translating between what the standard requires, what the team’s existing practices actually do, and what’s realistic to change without breaking working processes.

A concrete example from this month: ISO 27001 Annex A.5.7 (Threat intelligence) says the org should “collect and analyse information relating to information security threats”. Brights had nothing formal in place — informal Slack channels where senior engineers occasionally shared CVE alerts, but no structured intake / triage / action loop.

The ISO-checkbox version of “fix this gap” would be: write a threat-intel policy, create a SharePoint page, declare done.

The actually-useful version is: figure out what threat intel a 50-person shop can realistically consume (we’re not staffing a 24/7 SOC team), how to triage it with junior-level effort (i.e. mine), what specific CVE/IOC subscriptions matter for our stack (Node, .NET, AWS, Azure, the specific OSS dependencies the dev teams use), and how to push something actionable to dev leads when something matters for our actual code.

The ISO checkbox is downstream of doing the practical thing. If you do the practical thing, the documentation writes itself. If you do the documentation thing first, you have a binder full of policies that nobody references. (Senior cybersec friends have been telling me this for years and I half-believed them. Now I believe them.)

The split

Roughly:

The 25% on AI risk is what justifies the conference-travel sponsorship I got — Brights is positioning to add AI-services to their offering and the founders correctly identified that going from “27001 cert” to “42001 cert” requires real work, not just an additional binder. I’m the person doing that work, which is fortunate because it’s the most intellectually interesting part of the role.

Practical things I did this month

A few specific items that landed:

  1. Migrated the Suricata + ELK lab from my BSc thesis docker-compose into the Brights staging environment, on a dedicated VLAN. The ruleset is ~30 thesis rules + ~10 Brights-specific (we have a few Node + .NET specific ones now). Filebeat ships eve.json into the Elastic cluster. Nothing fancy, working baseline.

  2. Wrote a one-page “ISO 27001 control → engineering practice” crosswalk for the dev leads. Most engineering teams don’t have time to read the full standard. I read it, summarised the 93 Annex A controls into “what does this actually mean for someone writing Node code at a 50-person agency”, attached examples. Got useful feedback (“we already do this implicitly”, “we don’t do this at all”, “we do a worse version of this”) that’s now driving the gap-track.

  3. Built a quarterly threat-intel digest template. Sources: CERT- UA bulletins (UA threat angle), CISA KEV catalog (urgent CVE), our AWS/Azure security advisories, npm/NuGet security advisories (matched to our actual dependency tree). Triaged outputs go to dev leads in a 1-page Friday email. First issue ships next Friday.

  4. Started the ISO 42001 readiness gap analysis. This is going to take months. I’ve spent the September window reading the standard cover-to-cover, mapping the 38 controls, and starting the AI-RMF crosswalk. Not done. Probably won’t be done by Christmas.

What I’m still bad at

A short and humbling list:

Small joys

I’ll write more as I have more to say. Probably the next post is either the November surveillance-audit retrospective, or whatever I take away from BSides SF in March.

(I picked Brights specifically because the cybersec function was nascent enough that I’d get to build parts of it, not just operate parts of it. That call has held up after one month — first-junior-hire roles trade ambiguity for ownership, and I’m getting both in appropriate doses.)

Слава Україні. 🇺🇦