Director, Cybersecurity

USA - Remote

BLOCKCHAINS

At Blockchains, we envision a world transformed by blockchain technology, innovating with unlimited velocity; so, our efforts do not stop at software.

View company page

Blockchains will only consider candidates who reside in the U.S. and do not require any VISA support.

OUR VISION

In the transformative world of Web3, it is an individual’s fundamental right to own and control their digital identity. To ensure that the individual is paramount in Web3, we are developing tools that enable everyone to engage and transact online in a safe and trusted way.  Individuals are in control of what information they choose to share and with whom they choose to share it.  We are developing a pioneering platform that combines the power of social experiences with Web3 Identity.  This platform will provide individuals with access to interactive 3D experiences, verified communities, trusted transactions, the ability to prove ownership of their creations, and visibility and control over the data collected about them -- all designed to empower and benefit every Web3 user.

We believe that the decentralized nature of Web3 creates an opportunity for everyone to challenge the digital status quo—to own and control their identity, data, finances, creations, and future. This is the chance to get it right – to rally a movement of individuals focused on ensuring that Web3 belongs to everyone, not just to trillion-dollar companies. To fulfill this vision, we are seeking dynamic people who want to join us in leading the way to this new world.

WHAT YOU WILL DO

As the Director, Cybersecurity Program, you will provide expertise in governance, program management, project management, and hands on work supporting the cybersecurity engineering and operations team members. This is a hand-on role that involves technical work as well as documentation for process and standards. Responsibilities include, but are not limited to:

  • Being a leader in the implementation of the company’s cybersecurity strategy, leading engineering and architecture activities, performing internal ongoing evaluations of cloud and data center infrastructure, applications, and computing resources.
  • Partnering closely with information technology, devops, and product teams to effectively implement the technology, platform, and product.
  • Periodically performing technical activities such as vulnerability assessment, auditing access administration technologies, tuning intrusion prevention tools, assessing firewalls, configuring web application firewalls, integrating logging into security event management technologies.
  • Being proactive on threats to integrate countermeasures into the design of defensive strategies.
  • Evaluating infrastructure changes for security implications and recommend enhancements through research and analysis.
  • Periodically reviewing drafted cyber security policies, building process and engineering documentation, and working with the operations team members to construct run books and knowledge bases.
  • Demonstrate emotional intelligence and strong communication skills through effective collaboration
  • Show an aptitude for managing budgets, projects and project based work
  • Assisting our company with achieving and maintaining compliance with various information security frameworks (i.e. NIST, SOC2, ISO 27001, etc.) and with industry and government rules and regulations.

WHAT YOU WILL NEED TO SUCCEED

To succeed in this role, you should have a mixed background in leading and performing hands-on technical work as well as cybersecurity program management, governance, and architecture. Having a background in operating and working with operational security solutions and building processes for vulnerability assessment, remediation, event analysis, incident management, and threat identification will be incredibly beneficial for the role.  Ideally, you will have some experience working with virtualization, Kubernetes, cloud platforms, and SaaS solutions security. You will also need to be familiar with implementing security frameworks such as NIST-CSF, CIS, and/or ISO.

Additionally, you can collaborate effectively with cross-functional teams and all levels of management to positively affect business objectives. You are an empathetic leader who sets the team up for success and an innovative leader with a bias for action.

YOUR EDUCATION AND EXPERIENCE

This role requires a bachelor’s degree in engineering, Computer Science, MIS, CIS, or related. You have a minimum of 12 years of experience in escalating cybersecurity practitioner positions. A background in technical cybersecurity work, compliance, assessments, experience in cloud and data centers, and a deep understanding of cybersecurity technologies is required. Prior consulting experience is a major plus.  You are experienced in hiring, developing, and recognizing talent.

Blockchains, Inc. (“Blockchains”) is proud to be a diverse workforce, and we are committed to inclusion and diversity to ensure equal opportunity for all applicants. Blockchains provides equal employment opportunities to all employees and applicants regardless of race, color, religion, sex, sexual orientation, gender identity and/or expression, national origin, age, marital status, physical or mental disability, veteran status, or any other characteristic protected by federal, state, or local laws.

When you apply to a job on this site, the personal data contained in your application will be collected by Blockchains, Inc. (“Controller”), which is located at 610 Waltham Way, Sparks, NV 89437 and can be contacted by emailing privacy@blockchains.com. Controller’s data protection officer is Edward O'Connor, who can be contacted at privacy@blockchains.com. Your personal data will be processed for the purposes of managing Controller’s recruitment related activities, which include setting up and conducting interviews and tests for applicants, evaluating and assessing the results thereto, and as is otherwise needed in the recruitment and hiring processes. Such processing is legally permissible under Art. 6(1)(f) of Regulation (EU) 2016/679 (General Data Protection Regulation) as necessary for the purposes of the legitimate interests pursued by the Controller, which are the solicitation, evaluation, and selection of applicants for employment.

Your personal data will be shared with Greenhouse Software, Inc., a cloud services provider located in the United States of America and engaged by Controller to help manage its recruitment and hiring process on Controller’s behalf. Accordingly, if you are located outside of the United States, your personal data will be transferred to the United States once you submit it through this site. Because the European Union Commission has determined that United States data privacy laws do not ensure an adequate level of protection for personal data collected from EU data subjects, the transfer will be subject to appropriate additional safeguards under [either the standard contractual clauses or the Privacy Shield]. You can obtain a copy of the standard contractual clauses by contacting us at privacy@blockchains.com. 

Your personal data will be retained by Controller as long as Controller determines it is necessary to evaluate your application for employment.  Under the GDPR, you have the right to request access to your personal data, to request that your personal data be rectified or erased, and to request that processing of your personal data be restricted. You also have to right to data portability. In addition, you may lodge a complaint with an EU supervisory authority.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  11  2  0

Tags: Audits Cloud Compliance Computer Science DevOps Firewalls GDPR Governance Intrusion prevention ISO 27001 Kubernetes NIST Privacy SaaS SOC 2 Strategy

Perks/benefits: Team events

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.