VP, Cybersecurity

USA - Remote

Applications have closed


At Blockchains, we envision a world transformed by blockchain technology, innovating with unlimited velocity; so, our efforts do not stop at software.

View company page

Blockchains will only consider candidates who reside in the U.S. and do not require any VISA support.


In the new and exciting world of the decentralized internet, otherwise known as Web3, it is an individual’s fundamental right to own and control their digital identity. To ensure that the individual is paramount in Web3, we are developing a suite of applications to enable everyone to safely engage, take part, and transact in the emerging, decentralized world of the internet. Our platform centers on Web3 Identity and leverages that identity to provide individuals with secure digital asset storage and recovery, access to decentralized finance, the ability to prove ownership of their creations, and gateways to digital interactions and experiences – all to empower and benefit every Web3 user.

We believe that the decentralized nature of Web3 creates an opportunity for everyone to challenge the digital status quo—to own and control their identity, data, finances, creations, and future. This is the chance to get it right – to rally a movement of individuals so Web3 belongs to everyone, not to trillion-dollar companies. To fulfill this vision, we are seeking dynamic people who want to join us in leading the way to this new world.


The VP, Cybersecurity provides the direction and strategy for protecting the confidentiality and integrity of our platforms and our customers' data through policy management and application security. This role also ensures that a comprehensive Cyber Security program is effectively managed by leveraging industry best practices to protect and prevent threats based on business criticality and risk reduction. You will ensure that the cybersecurity program continues to mature by continuing to develop our cyber threat and operational capabilities, expanding our cloud security discipline, and driving down cybersecurity risk across all domains.

You will lead the development, implementation, and monitoring of enterprise-wide initiatives that include providing clear risk-mitigating directives. You will also lead the identification of security trends and evolving technologies to maintain knowledge of internal and external business environments.

You have a strong background in cybersecurity and technology life cycle deployment — including having in-house delivery, 3rd party management and cloud migration — will be important. Experience in strategy development and implementation of security and operational resilience programs and strong familiarity with core technology areas such as dev/sec/ops, identity and access management and multifactor authentication as well as exposure to production services and technical operations. Web3 experience is a huge plus.

Responsibilities include, but are not limited to:

  • Driving Blockchains cybersecurity vision, continually updating strategy to meet this vision and maintain a multi-year roadmap.
  • Developing trusted working partnerships within IT, Product Engineering, and Business Leaders
  • Managing the overall secure application process across the development lifecycle.
  • Leading the development, publishing, and compliance of up-to-date security policies, standards, and guidelines.
  • Driving identification, assessment, and remediation of strategic cybersecurity risk and compliance.
  • Proactively monitoring and escalating remediation of regulatory compliance and other risks.
  • Communicating and creating ongoing awareness with business leaders regarding cybersecurity risks, concerns, and priorities.
  • Ensuring rapid response to Cyber Security incidents from identification to eradication in the environment and advances the program based upon Incident postmortem learnings.


You have a deep understanding of the Cybersecurity and IT Security landscape, as a practitioner in progressively senior leadership positions.  You have strong familiarity with information security, risk management, and IT governance standards and frameworks (e.g., SOC2, ISO 27000, NIST 800-53, etc.) You possess knowledge of specific technologies associated with data protection, data governance, and artificial intelligence, as well as cloud technologies (IAAS, PAAS), directory, database, federation, authorization, message integrity, authentication, provisioning, mobility, mobile applications, etc. You have advanced comprehension of cryptography components, standards and protocols such as PKI, Key management (software and hardware-based), key lifecycle, digital certificates, SSL/TLS, SSH. You have a broad awareness of security protocols including identity (federated identity protocols), access management, application security, encryption (at rest, in transit, in use) and regulations including cyber security legislation practices, privacy, restrictions of geographic locations, etc. You have exceptional subject matter expertise, professional presence, communication, leadership,  decision-making skills and the ability to develop trusted relationships with executive management and other professionals throughout the company. You thrive in a team environment yet work well independently. You carry your weight in the team, learning from others and contributing in equal measure.


You have a bachelor’s degree in computer science, Computer Engineering, Information Systems, or equivalent fields. You have 10+ years of progressive leadership experience within cybersecurity/information security, with a focus on corporate and product security in a SaaS environment. You have experience developing programs, operating policies and processes, governance, and IT security processes. You have experience in designing, implementing, and managing security solutions, experience in formal risk assessment and risk management, and vulnerability analysis processes and best practices. You are experienced in managing third-party risk, business continuity risk, and IT operational risk, and leading cyber threat operations teams in the areas of emerging threat identification, incident response, and developing innovative mitigation strategies as well as demonstrated experience in the quantification and measurement of information security risks. You have large, complex implementation and deployment experience with security tools and programs. You have experience synthesizing technical concepts into practical terms for a wide audience, with prior experience interacting regularly with CEOs, CIOs, and CISOs. CISSP, CISA certification(s) preferred.

Blockchains, Inc. (“Blockchains”) is proud to be a diverse workforce, and we are committed to inclusion and diversity to ensure equal opportunity for all applicants. Blockchains provides equal employment opportunities to all employees and applicants regardless of race, color, religion, sex, sexual orientation, gender identity and/or expression, national origin, age, marital status, physical or mental disability, veteran status, or any other characteristic protected by federal, state, or local laws.

When you apply to a job on this site, the personal data contained in your application will be collected by Blockchains, Inc. (“Controller”), which is located at 610 Waltham Way, Sparks, NV 89437 and can be contacted by emailing privacy@blockchains.com. Controller’s data protection officer is Edward O'Connor, who can be contacted at privacy@blockchains.com. Your personal data will be processed for the purposes of managing Controller’s recruitment related activities, which include setting up and conducting interviews and tests for applicants, evaluating and assessing the results thereto, and as is otherwise needed in the recruitment and hiring processes. Such processing is legally permissible under Art. 6(1)(f) of Regulation (EU) 2016/679 (General Data Protection Regulation) as necessary for the purposes of the legitimate interests pursued by the Controller, which are the solicitation, evaluation, and selection of applicants for employment.

Your personal data will be shared with Greenhouse Software, Inc., a cloud services provider located in the United States of America and engaged by Controller to help manage its recruitment and hiring process on Controller’s behalf. Accordingly, if you are located outside of the United States, your personal data will be transferred to the United States once you submit it through this site. Because the European Union Commission has determined that United States data privacy laws do not ensure an adequate level of protection for personal data collected from EU data subjects, the transfer will be subject to appropriate additional safeguards under [either the standard contractual clauses or the Privacy Shield]. You can obtain a copy of the standard contractual clauses by contacting us at privacy@blockchains.com. 

Your personal data will be retained by Controller as long as Controller determines it is necessary to evaluate your application for employment.  Under the GDPR, you have the right to request access to your personal data, to request that your personal data be rectified or erased, and to request that processing of your personal data be restricted. You also have to right to data portability. In addition, you may lodge a complaint with an EU supervisory authority.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Application security Artificial Intelligence CISA CISSP Cloud Compliance Computer Science Cryptography Encryption Finance GDPR Governance IaaS IAM Incident response ISO 27000 Monitoring NIST PaaS PKI Privacy Product security Risk assessment Risk management SaaS SOC 2 SSH Strategy TLS

Perks/benefits: Career development

Regions: Remote/Anywhere North America
Country: United States
Job stats:  23  3  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.