VP of Information Technology; Austin, TX
Listed on 2025-12-31
-
IT/Tech
Cybersecurity, IT Consultant
VP of Information Technology
Location:
Downtown Austin, TX or Old Town Scottsdale, AZ (In-Office);
Remote considered for the right candidate
Type:
Full-time, Executive Leadership
Compensation:
World-class executive pay + equity + premium benefits
At , IT is a mission-critical driver of security, productivity, and operational excellence. As our VP of Information Technology, you will own the entire internal technology ecosystem that powers a fast-scaling SaaS company. This isn’t just about support—it's about strategy, systems, and building an environment where 100% of our people can do their best work every day.
This is a hands‑on executive role. You’ll set vision, but you’ll also roll up your sleeves. You’ll design systems that scale, eliminate friction in how we work, and keep our people secure without slowing them down. From device management and SaaS tools to automation, compliance, and employee experience, IT at is not an afterthought—it's a lever for growth.
We’re looking for a leader who thinks like an engineer, acts like an operator, and delivers like an owner. If you’ve ever dreamed of stepping into a VP-level role where you can shape the future of internal IT at a profitable, growing SaaS company—this is it.
Who We AreWe’re , a profitable, founder‑led SaaS company powering secure file transfer and automation for 4,000+ global brands such as Target, Canonical, UPS, Leica, Direc
TV, GoPro, Marriott, and more. We’ve built a $35M+ business with just 70 people by hiring smart, disciplined, and high‑output teammates who act fast and own outcomes. Backed by $46.5M from Riverwood Capital, we’re scaling with discipline, and this role is central to that growth.
We welcome candidates based in our Austin, TX or Scottsdale, AZ offices, and we also welcome remote candidates who bring the right level of seniority and impact. We trust our leaders to choose the environment where they do their best work.
Strategic Mandate and Clear ScopeThis role is 100% focused on internal systems, tools, and security. You’ll own:
- All internal SaaS platforms, hardware, device management, and user lifecycle tooling.
- Internal compliance, access control, and IT security measures.
- Productivity and support processes for every employee.
This role does not touch customer‑facing infrastructure. Where there’s overlap, you’ll collaborate with and ultimately defer to the Engineering organization.
Cultural and Values AlignmentThe right candidate embodies:
- Communicate well—make complex topics simple, triage with empathy, and align cross‑functionally.
- Make it effortless—remove friction. Build systems that feel seamless, not burdensome.
- Innovate constantly—be curious, proactive, and always looking for better ways forward.
- Model our people values: tenacity, personal integrity, and a deep respect for teamwork.
The right candidate also:
- Appreciates the foundation—our current systems work; respect the trade‑offs made along the way and deliver incremental improvements before major change.
- Seeks early wins—establish credibility by delivering low‑friction, high‑impact improvements within your first 30–90 days.
- Thinks like a builder—eliminate chaos, not manage it. Design scalable systems and repeatable strategies that improve with scale and stand the test of time.
- Deep comfort in an Apple‑native environment.
- Proven hands‑on experience with MDM platforms, including building custom deployment packages and scripts.
- Fluency in IT security and compliance practices: access logging, SSO/LDAP, and policy design.
- Experience building zero‑downtime onboarding/offboarding systems.
- An automation‑first mindset—if it can be scripted, it should be.
- Ability to speak engineer and collaborate with technical teams, contribute scripts, and partner effectively with Engineering leaders.
has a unique security posture: we expect to outperform companies 10 our size without sacrificing productivity. That means:
- No security theater.
- No broken experiences in the name of compliance.
- No tolerance for sloppy execution.
Your job is to protect the business as aggressively as possible, while keeping security invisible to…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).