Director of Security and Compliance

SwinertonConcord, CA
1d$200,000 - $225,000

About The Position

The Director of Security and Compliance leads the design and oversight of cybersecurity, compliance, and privacy programs that safeguard the organization’s digital assets and data while ensuring adherence to regulatory requirements, contractual obligations, and internal policies. This position reports to the VP of IT Operations / Chief Information Security Officer.

Requirements

  • Bachelor’s or Master’s degree in business administration or technology related field
  • 15 or more years of experience in IT Operations, cybersecurity or business/industry
  • 7 or more years of leadership responsibilities, including strategy, budgeting, and staffing
  • 3 or more years of leadership responsibilities of an auditable compliance program (ex: NIST 800-171, CMMC, ISO 2700x, SOC 2, NERC-CIP, etc.)
  • Exceptional leadership skills, with the ability to develop and communicate a vision that inspires and motivates staff and aligns with the IT and business strategy
  • Effective influencing and negotiation skills and the ability to build consensus in complex environments where resources required for success may not be in direct control of this role
  • Demonstrate collaboration skills across multiple teams including business operating groups, corporate departments and other IT teams
  • Excellent analytical, strategic conceptual thinking, strategic planning, and execution skills
  • Strong business acumen, including industry, domain-specific knowledge of the enterprise and its business units
  • Developing staff including coaching, mentoring and performance management
  • Deep understanding of current and emerging security technologies and practices, and how other enterprises are employing them
  • Strong awareness of current and changing regulatory landscape
  • Maintain awareness of emerging threats and incorporate appropriate mitigation measures
  • Demonstrated ability to develop and execute a strategic staffing plan that ensures the right people are in the right roles at the right time, and employees are highly engaged and satisfied
  • Third-party management, working closely with sourcing and vendor managers
  • Security services - SaaS on-premises, Managed Security Service Providers
  • NIST 800-CSF
  • NIST 800-53
  • Cloud & Network architecture
  • Identity and access management
  • Business continuity & disaster discovery
  • Data management, classification and privacy
  • Artificial Intelligence
  • Microsoft & AWS

Nice To Haves

  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • Certified Information Systems Auditor (CISA)
  • Certified in Risk and Information Systems Control (CRISC) or other similar credentials
  • Google & Cisco

Responsibilities

  • Risk Management: Set the mission, vision, and strategy for technology risk management including cybersecurity, compliance and privacy organization. Implementing appropriate risk management and mitigation efforts while ensuring the success of business and IT initiatives, ensuring alignment with business objectives and product priorities.
  • Communication & Executive Engagement: Demonstrate exceptional communication and presentation skills, effectively conveying complex technical and compliance concepts to critical stakeholders, including senior managers and the executive leadership team, to support informed decision‑making.
  • Stakeholder & Relationship Management: Build successful stakeholder relationships with other IT , enterprise risk managers and key business stakeholders by developing a clear understanding of business needs, acting as a trusted advisor, and ensuring cost-effective delivery of security services to meet those needs.
  • Security Architecture & Operations: Direct enterprise-wide security architecture and operations across IT and OT environments, ensuring secure design, deployment, and ongoing protection of infrastructure, applications, and data systems.
  • Regulatory Compliance & Reporting: Ensure compliance with all relevant cybersecurity, compliance and privacy regulations. As part of a strategic enterprise risk management program, conduct compliance assessments and provide regular status reports to risk management teams and senior business leaders including relevant metrics, key performance and risk indicators.
  • Privacy Program Leadership: Lead cross-functional Privacy Team to develop and implement a comprehensive enterprise-wide data and personnel privacy program. Maintain current policies, facilitate publication and communication, and ensure all employees receive required privacy training.
  • Budget & Financial Management: Develop and control the annual department budget to ensure that it's consistent with the overall strategic objectives of IT and the enterprise and is within plan.
  • Security Culture & Awareness: Foster an enterprise security culture by embedding compliance and risk management practices into daily business operations. Lead organization-wide training and awareness initiatives that enable informed cybersecurity decision-making across all functions and levels.
  • Risk Assessment, Business Continuity & Incident Response: Conduct comprehensive enterprise risk assessments and develop strategies that strengthen business continuity, disaster recovery, and incident response capabilities. Build, train, and coordinate cross-functional incident response teams across security, IT, business partners, and executive leadership to ensure effective crisis response and business protection.
  • Data Retention & Archiving Compliance: Ensure digital and paper archiving (warehouse) systems are complying with corporate data retention policies. Collaborate with Product Managers to ensure they understand policies and their products and services are aligned.
  • Team Leadership & Development: Build and lead a high performing team. Work collaboratively with direct reports to support their career progression, nurture their development and to help them realize their potential. Have a documented succession plan for critical functions. Develop and actively participate in peer network groups. Stay up on trends and share lessons learned.
  • Vendor & Third-Party Management: Lead vendor management and negotiations with security service providers. Establish strong vendor relationships ensuring vendors understand and share our focus on security and are capable of meeting requirements.

Benefits

  • medical
  • dental
  • vision
  • 401(k) with company matching
  • Employee Stock Ownership Program (ESOP)
  • individual stock ownership
  • paid vacation
  • paid sick leave
  • paid holidays
  • bereavement leave
  • employee assistance program
  • pre-tax flexible spending accounts
  • basic term life insurance and AD&D
  • business travel accident insurance
  • short and long term disability
  • financial wellness coaching
  • educational assistance
  • Care.com membership
  • ClassPass fitness membership
  • DashPass delivery membership
  • additional term life insurance
  • long term care insurance
  • critical illness and accidental injury insurance
  • pet insurance
  • legal plan
  • identity theft protection
  • other voluntary benefit options
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service