Senior IT & Information Security Manager

Critical LoopLong Beach, CA
1d

About The Position

Critical Loop is shaping the next generation of energy systems by building the integrated edge grid of the future. Specializing in advanced energy management and battery control systems, Critical Loop empowers businesses and communities to seamlessly unite distributed energy resources for faster, more reliable, and affordable grid access. With deep expertise in grid modernization and a passion for creating resilient, responsive energy solutions, Critical Loop drives innovation at the intersection of technology and energy. We’re seeking a Senior IT & Information Security Manager who loves helping people, thrives on new challenges, and adores automation. This role will be our first dedicated Security Compliance and IT hire, and will help us grow at least 50% in the next six months from 25 full time employees. This role will be an individual contributor in the near term with scope to lead and grow over time. This role owns the outcomes of information security and corporate IT operations at Critical Loop. You will be the primary owner of day-to-day IT systems, identity and access management, internal security controls, and information security compliance. You will work collaboratively with leadership and other teams, particularly software, on many of the company’s most important technical and risk-related decisions. A key responsibility of this role will be leading Critical Loop through ISO 27001 and similar certification processes. You will be the program manager for these certifications, and will be improving our Information Security Management System (ISMS) over time. We’re looking for someone who thinks compliance is an asset when done right, communicates clearly, can teach us and learn from us, and is excited to grow alongside the company.

Requirements

  • 5+ years of total professional experience in Information Security, Information Technology, Networking and Systems Administration, and related fields.
  • You have led a SOC2, ISO 27001, or other industry-standard certification or can demonstrate sufficient knowledge of these to run a program incl. how to document and respond to auditors.

Nice To Haves

  • You’re interested and able to help our software team build and maintain secure networking and systems administration for our edge nodes and networks.
  • Comfort supporting Linux as an end-user operating system, alongside macOS and Windows, and making pragmatic tradeoffs in a multi-OS environment.

Responsibilities

  • Lead the design, implementation, and ongoing operation of Critical Loop’s Information Security Management System (ISMS) in alignment with ISO 27001.
  • Drive the ISO 27001 certification effort end-to-end, including scope definition, risk assessment, control implementation, documentation, internal audits, and auditor coordination.
  • Own the lifecycle of corporate IT assets and services, including user devices, software and SaaS tools, licensing, procurement, access management, vendor coordination, and secure decommissioning.
  • Select, engage, and manage relationships with security vendors and service providers (e.g., MDR, EDR, and related services) to effectively scale and strengthen the organization’s security posture.
  • Maintain and support user devices for all our users, including Windows, Mac, and Linux laptops and tablets and phones for our technicians and operators in the field.
  • Ensure secure IT operations, including identity and access management (Okta, etc.), MDM, user secrets management, security training, onboarding and offboarding, and incident response.
  • Create, enforce, update, explain, and lead training sessions for IT and security policies, such as those regarding Acceptable Use, Access Control, Data Protection, and many more.
  • Own compliance-related reviews and evidence collection, including access reviews, least-privilege audits, risk registers, change management records, and corrective actions.
  • Design and implement corporate/office networks, including working with product teams to correctly implement boundaries with product networking and systems.
  • Build and maintain internal IT documentation and self-service resources to reduce friction and empower teammates.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service