Director, Cybersecurity
USA - Remote
BLOCKCHAINS
At Blockchains, we envision a world transformed by blockchain technology, innovating with unlimited velocity; so, our efforts do not stop at software.Blockchains will only consider candidates who reside in the U.S. and do not require any VISA support.
OUR VISION
In the transformative world of Web3, it is an individual’s fundamental right to own and control their digital identity. To ensure that the individual is paramount in Web3, we are developing tools that enable everyone to engage and transact online in a safe and trusted way. Individuals are in control of what information they choose to share and with whom they choose to share it. We are developing a pioneering platform that combines the power of social experiences with Web3 Identity. This platform will provide individuals with access to interactive 3D experiences, verified communities, trusted transactions, the ability to prove ownership of their creations, and visibility and control over the data collected about them -- all designed to empower and benefit every Web3 user.
We believe that the decentralized nature of Web3 creates an opportunity for everyone to challenge the digital status quo—to own and control their identity, data, finances, creations, and future. This is the chance to get it right – to rally a movement of individuals focused on ensuring that Web3 belongs to everyone, not just to trillion-dollar companies. To fulfill this vision, we are seeking dynamic people who want to join us in leading the way to this new world.
WHAT YOU WILL DO
As the Director, Cybersecurity Program, you will provide expertise in governance, program management, project management, and hands on work supporting the cybersecurity engineering and operations team members. This is a hand-on role that involves technical work as well as documentation for process and standards. Responsibilities include, but are not limited to:
- Being a leader in the implementation of the company’s cybersecurity strategy, leading engineering and architecture activities, performing internal ongoing evaluations of cloud and data center infrastructure, applications, and computing resources.
- Partnering closely with information technology, devops, and product teams to effectively implement the technology, platform, and product.
- Periodically performing technical activities such as vulnerability assessment, auditing access administration technologies, tuning intrusion prevention tools, assessing firewalls, configuring web application firewalls, integrating logging into security event management technologies.
- Being proactive on threats to integrate countermeasures into the design of defensive strategies.
- Evaluating infrastructure changes for security implications and recommend enhancements through research and analysis.
- Periodically reviewing drafted cyber security policies, building process and engineering documentation, and working with the operations team members to construct run books and knowledge bases.
- Demonstrate emotional intelligence and strong communication skills through effective collaboration
- Show an aptitude for managing budgets, projects and project based work
- Assisting our company with achieving and maintaining compliance with various information security frameworks (i.e. NIST, SOC2, ISO 27001, etc.) and with industry and government rules and regulations.
WHAT YOU WILL NEED TO SUCCEED
To succeed in this role, you should have a mixed background in leading and performing hands-on technical work as well as cybersecurity program management, governance, and architecture. Having a background in operating and working with operational security solutions and building processes for vulnerability assessment, remediation, event analysis, incident management, and threat identification will be incredibly beneficial for the role. Ideally, you will have some experience working with virtualization, Kubernetes, cloud platforms, and SaaS solutions security. You will also need to be familiar with implementing security frameworks such as NIST-CSF, CIS, and/or ISO.
Additionally, you can collaborate effectively with cross-functional teams and all levels of management to positively affect business objectives. You are an empathetic leader who sets the team up for success and an innovative leader with a bias for action.
YOUR EDUCATION AND EXPERIENCE
This role requires a bachelor’s degree in engineering, Computer Science, MIS, CIS, or related. You have a minimum of 12 years of experience in escalating cybersecurity practitioner positions. A background in technical cybersecurity work, compliance, assessments, experience in cloud and data centers, and a deep understanding of cybersecurity technologies is required. Prior consulting experience is a major plus. You are experienced in hiring, developing, and recognizing talent.
Blockchains, Inc. (“Blockchains”) is proud to be a diverse workforce, and we are committed to inclusion and diversity to ensure equal opportunity for all applicants. Blockchains provides equal employment opportunities to all employees and applicants regardless of race, color, religion, sex, sexual orientation, gender identity and/or expression, national origin, age, marital status, physical or mental disability, veteran status, or any other characteristic protected by federal, state, or local laws.
When you apply to a job on this site, the personal data contained in your application will be collected by Blockchains, Inc. (“Controller”), which is located at 610 Waltham Way, Sparks, NV 89437 and can be contacted by emailing privacy@blockchains.com. Controller’s data protection officer is Edward O'Connor, who can be contacted at privacy@blockchains.com. Your personal data will be processed for the purposes of managing Controller’s recruitment related activities, which include setting up and conducting interviews and tests for applicants, evaluating and assessing the results thereto, and as is otherwise needed in the recruitment and hiring processes. Such processing is legally permissible under Art. 6(1)(f) of Regulation (EU) 2016/679 (General Data Protection Regulation) as necessary for the purposes of the legitimate interests pursued by the Controller, which are the solicitation, evaluation, and selection of applicants for employment.
Your personal data will be shared with Greenhouse Software, Inc., a cloud services provider located in the United States of America and engaged by Controller to help manage its recruitment and hiring process on Controller’s behalf. Accordingly, if you are located outside of the United States, your personal data will be transferred to the United States once you submit it through this site. Because the European Union Commission has determined that United States data privacy laws do not ensure an adequate level of protection for personal data collected from EU data subjects, the transfer will be subject to appropriate additional safeguards under [either the standard contractual clauses or the Privacy Shield]. You can obtain a copy of the standard contractual clauses by contacting us at privacy@blockchains.com.
Your personal data will be retained by Controller as long as Controller determines it is necessary to evaluate your application for employment. Under the GDPR, you have the right to request access to your personal data, to request that your personal data be rectified or erased, and to request that processing of your personal data be restricted. You also have to right to data portability. In addition, you may lodge a complaint with an EU supervisory authority.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Audits Cloud Compliance Computer Science DevOps Firewalls GDPR Governance Intrusion prevention ISO 27001 Kubernetes NIST Privacy SaaS SOC 2 Strategy
Perks/benefits: Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Security Operations Engineer jobs
- Open Senior Cybersecurity Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Information Security Officer jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Product Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cyber Security Specialist jobs
- Open Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Network Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Analyst jobs
- Open Security Consultant jobs
- Open Senior Information Security Analyst jobs
- Open Security Operations Analyst jobs
- Open Manager Pentest H/F jobs
- Open Information Security Architect jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open SOC-related jobs
- Open Network security-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open ISO 27001-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open Threat intelligence-related jobs
- Open DevOps-related jobs
- Open DoD-related jobs
- Open Security Clearance-related jobs
- Open APIs-related jobs
- Open CEH-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open SaaS-related jobs
- Open EDR-related jobs
- Open Java-related jobs
- Open Kubernetes-related jobs
- Open PowerShell-related jobs