More jobs:
Field Chief Security Officer
Job in
Wichita, Sedgwick County, Kansas, 67232, USA
Listed on 2026-01-05
Listing for:
Glean
Full Time
position Listed on 2026-01-05
Job specializations:
-
IT/Tech
Cybersecurity, Data Security
Job Description & How to Apply Below
Field Chief Security Officer
Glean is seeking a Field CSO to serve as Glean's executive, customer-facing security leader for prospects and customers. You will build trust with CISOs, CIOs, Chief Risk / Privacy Officers, and security architects by translating Glean's security and AI governance model into their business, regulatory, and technical context. You'll advise on secure deployments, accelerate security reviews (DPIAs / PIAs, vendor assessments), help remove risk blockers in complex deals, and become the voice of the field back to Product, Security, Legal, and GTM.
This role is not our corporate CISO. It is an external-facing, executive advisor role aimed at helping customers successfully operationalize Glean securely and at scale.
- Act as the primary executive security advisor for named strategic accounts, partnering with Sales, SE, and CS to shape security strategy, deployment patterns, and program design for Glean's Work AI platform.
- Lead and expedite security due diligence: DPIAs / PIAs, vendor risk assessments, data flow documentation, LLM-related risk mitigations, and control mapping to frameworks (e.g., SOC 2, ISO 27001, HIPAA, GDPR, FedRAMP-adjacent asks, TX-RAMP).
- Build compelling risk narratives and decision memos for C-suite and Boards that connect security, privacy, and compliance outcomes to measurable business value and adoption.
- Serve as an executive "title match" in late-stage cycles; join roadmap and architecture reviews to clear risk blockers and accelerate time-to-value.
- Security strategy, enablement, and thought leadership.
- Publish and present Glean's AI security and governance point of view (talks, webinars, whitepapers, playbooks), with pragmatic guidance on topics like single-tenant SaaS, customer-hosted deployments, data residency, encryption and key management, permissions mirroring, and agent guardrails.
- Develop reusable artifacts for the field: RFP / RFI security templates, reference architectures, policy / control mappings, DPIA / PIA kits, incident communications templates, SIEM export and audit logging guides.
- Partner with Glean Product, Security / Privacy, and Legal on "voice of customer" for features and policies (e.g., residency, SIEM / audit integrations, data lifecycle, model controls, red-teaming, prompt-injection defenses, allow / deny model policies).
- Co-design adoption and governance programs with customer security, IT, data, and privacy teams, including role-based access, retention, redaction, secrets and PII controls, and ongoing audit practices.
- Advise on AI governance operating models: risk tiering for use cases, human-in-the-loop controls, evaluation gates, and production guardrails for agents and workflows.
- Establish success metrics tied to security and business value (e.g., security review cycle time, audit coverage, sensitive data exposure reduction, adoption growth in high-risk teams).
- Partner tightly with Sales Engineering, Customer Success, and Support to create repeatable guidance for regulated and complex environments.
- Inform roadmap priorities with field-validated requirements for security posture (e.g., model hub control, connector scopes, data egress minimization, RBAC / ABAC, audit exports).
- 10+ years in information security with executive-level customer engagement; former CISO / CSO, Deputy CISO, Security Architect / Strategist, or advisory CISO experience strongly preferred.
- Deep command of enterprise security and cloud / SaaS controls: identity / SSO, least-privilege, encryption at rest / in transit, key management, audit logging / SIEM, data residency / sovereignty, and third-party risk.
- Hands‑on familiarity with major frameworks and regulatory needs: SOC 2 Type II, ISO 27001, GDPR / DPAs, HIPAA, and public sector expectations (e.g., TX‑RAMP; familiarity with FedRAMP requirements helpful).
- Demonstrated experience guiding customers through DPIAs / PIAs, vendor assessments, and contractual security annexes; ability to compress complex risk into clear executive decisions.
- Practical understanding of AI / LLM security risks and mitigations: retrieval‑augmented generation (RAG) security, prompt injection defenses,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×