Register Here to Apply for Jobs or Post Jobs. X

Partner: Head of Security

Job in San Francisco - San Francisco County - CA California - USA
Contract position
Listed on 2019-10-11
Job specializations:
  • Security
    Data Security, Information Security, Private Security
  • IT/Tech
    Database Administrator
Job Description & How to Apply Below
{{PLEASE NOTE: Apply through our company recruiting portal: (Please contact us using the "Apply for this Job Posting" box below)}}

DO NOT CONTACT ANY INV TEAM MEMBER DIRECTLY - IF YOU DO, YOUR APPLICATION WILL BE DISQUALIFIED RIGHT AWAY

..............

The right “Head of Security” doesn’t need this job description, and won’t wake up in the morning with the thought “I am the Head of Security at Invisible,” but with the thought: “Have we taken over the world yet?” The right person already called me, and told me these words:

You should bring me on as a partner, because without me, your data is not safe and you will fail. 's what I will bring to the table.

Threat Modeling. You need to know all the potential threats to your operations and your tech. You need someone who thinks like the bad guys and is not afraid to get their hands dirty. I will find all the existing weak spots in your armor, and proactively safeguard against new ones.

Risk Assessment. Once the potential threats have been identified, you need someone who can estimate the relative likelihood of those threats happening (nearly 100% given a long enough time horizon), and the potential impact. I will appraise these threats so that we can decide what to do about them, in a ruthlessly prioritized order.

Building Your Round Table. I am but one knight, protecting your kingdom. Eventually, I too will need to build an army. You can count on me to attract like-minded individuals to fill out our elite security team.

Processes. Security is not something you bolt on to your current operations. Security is a mindset, and it is part of everything we do. You need someone who gets that, and is willing to do the hard work to integrate that mindset into your existing tech and operations.

Policies. The best security tech cannot defend against social engineering or poor personal security hygiene. You need someone who deeply understands this and can craft security policies for all your employees and educate them on how to protect themselves should an attacker circumvent our other safeguards.

Monitoring. Your operations run 24/7, all around the world. The bad guys don't sleep, either. You need someone who can work with the tech team to build robust monitoring and alerts, so that we can catch potential problems before they happen.

Incident Response. In the rare occasion that shit hits the fan, you will need someone who can assemble the troops, isolate the problem, prevent further damage, and ultimately clean up the mess so as to prevent future incidents.

Speed. Security is like armor, and at a startup you want the lightest possible armor so that you can move the fastest. I will provide you armor that is both strong and light. I will take a layered approach and go for the easiest wins first that give us the most protection.

The Will to Lead. Finally, you need someone who is obsessed with security and will push their agenda through. At a fast-moving startup, I understand that the security team is going to be unpopular. In some cases, I will have to tell people what they can and cannot do. It's OK, I'm used to getting what I want, because I know how to craft the narrative to get everyone aligned. Your team will understand the importance of what I want to accomplish, and they will follow me willingly.

Skills We’re Looking For:
Associate's or bachelor's degree in digital security, network security, computer science or a related field/equivalent experience.
Previous experience leading internal and external security teams. Start up experience is a plus!
Superior attention to detail
Analytical and critical thinking skills
Can articulate ideas concisely, clearly, and creatively

Qualities We’re Looking For:


Romantic capitalists
Obsessed with the company
Demonstrated ability to learn quickly and be adaptable
Understands the nuances between security and functionality. An iron box is secure; an iron box also isn’t very useful.
Honesty and integrity
Ability to give and take feedback
Care about quality performance and professional work standards

Please only apply through our company recruiting portal:
Position Requirements
College,   3 to 4 Years work experience
Risk Assessment, Security, Management, Leadership, Network Security
Required Language Skills:
  • English - Very good
Contact Information
Contact Name: Invisible Technologies, Inc.
Contact Phone: (615) 581-1235
Preferred method of contact: Email with CV via Application Box below.
Apply for this Job Posting Here:
To apply for this job, you need to provide some contact details for the employer or HR recruiter. Begin your free application by entering your email address (If already registered, you'll be asked to enter your password). Otherwise, you will initially need to enter some basic details with your first application.
Email Address Please enter a valid Email address.
How this Free Jobsite works - How to apply for jobs.
• To apply for any job, you must provide some contact details for the employer or HR recruiter. When you Register Here or Above with your first application (if you have not already done so), you will be asked to confirm your contact email address is valid via your email inbox.
• You will be asked to confirm a login password so to be able to make further applications in future visits.
• Once registered, you may also save CV / Resume summary details into the optional Resume format (This default format is easy for companies to read, and when available, it is sent as part of your application to a company to assist your application).
• Alternatively or additionally, you may attach your own original Resume document and 2 other supporting files as part of your application (Those files must be within the maximum combined size stated, and are not stored on this jobsite when you submit them).
• You must write or paste an introduction / cover letter into the application box.
• When you click the "Apply" button, your cover letter, Resume summary (if you have saved one on this site), contact details, and/or your own attached files are submitted as part of your application.
• Once you submit an application for any job on this site, it is solely the responsibility and decision of the company or employer you have applied to on whether they accept, review, process or respond to that application.
Search for further Jobs Here:
Location Job Location
Employment Category Job Category
Education (minimum level)
LOGIN Area - Jobsite