Chief Information Security Officer; CISO
Listed on 2026-03-05
-
IT/Tech
Systems Engineer, Cybersecurity
Location:
Remote (U.S. or Canada)
Type: US Applicants – Full-Time;
Canadian Applicants – Independent Contractor
We're scaling rapidly and have a growing pipeline of opportunities that demand exceptional talent across disciplines. Our mission is to bring on individuals, from creative producers to technical experts to entrepreneurial leaders, who can help us realize this next chapter of growth.
We are a company of doers. Leaders roll up their sleeves, teams work flat, and everyone contributes to what ships. Titles don't insulate us from feedback or basics. We invite critique, learn quickly, and keep raising the bar. The best ideas win here, no matter where they come from, because clients trust us to deliver the strongest outcomes every time.
Our clients' missions, products, and bottom lines are sacred. We immerse ourselves in their world, becoming stewards of their goals and partners in solving big problems. Every product, strategy, or asset we create must be both beautiful and functional; practical, usable, and designed for real-world impact.
Humans are our most valuable resource, and we only grow by hiring people who push us forward. Across strategy, engineering, design, data, and operations, we seek out teammates who raise the bar and make us better. Always hire up, never down.
We partner with organizations of all sizes to explore, design, and implement AI strategies that are secure, scalable, and human-centered. We believe AI should amplify human potential, not replace it, and we build with that conviction in every engagement. From advisory and tooling to implementation and education, we meet clients where they are and help them integrate AI in ways that align with their mission and values.
Our goal is to empower teams to work smarter, move faster, and unlock new possibilities through thoughtful, responsible innovation.
And through it all, we lead with purpose, love, and adventure. We do meaningful work with people we care about, and we make the ride an adventure worth taking. Because at Human Agency, who we are and how we work are one and the same.
OpportunityThis is not a traditional enterprise CISO role where you inherit a legacy infrastructure, manage a large team, and maintain the status quo. This is a hands‑on, entrepreneurial builder role. You are joining at the frontier of AI security — designing systems that don't yet exist, solving problems the industry is only beginning to name, and treating security not as a cost center but as a strategic and commercial advantage.
We're deploying AI agents at scale across client environments, building our own AI‑powered tools, and advising organizations on how to safely integrate autonomous systems into mission‑critical workflows. That creates a unique security mandate: you must secure our internal operations, embed security directly into the AI products we build, and help clients deploy agents safely in regulated, high‑stakes environments. You are architect, operator, and evangelist all at once.
You’ll have the rare opportunity to shape how an entire category of technology gets secured. We’re not asking you to retrofit old playbooks onto new problems — we’re asking you to write the playbook. If you’ve been looking for a role where security is core to the product, where you can build things that matter, and where your work influences the broader conversation around AI safety and governance, this is it.
WhatYou’ll Own
- Define and execute our security strategy from the ground up. You will architect our internal security posture across infrastructure, data, and AI systems, establish governance models for how we deploy agents safely, and ensure we’re prepared for compliance frameworks like SOC 2, ISO, and potentially FedRAMP as we scale into enterprise and government clients.
- Build security into AI agent systems as a first‑class product feature. You’ll design guardrails, monitoring, and policy enforcement for autonomous agents — ensuring they operate within defined boundaries, audit their own actions, and surface anomalies in real time. This isn't theoretical; you implement these systems in production environments where they directly impact…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).