VP of Cybersecurity


New York Metro Area
Permanent
USD175000 - USD200000
Cybersecurity
PR/578190_1770158688
VP of Cybersecurity

Our client is a long‑established fiber‑based network services provider currently looking to fill the position of Director of Cybersecurity. This leadership role is ideal for someone who combines strong technical depth with the ability to build and mature an enterprise security program. The position will oversee security strategy, daily operations, compliance initiatives, and a small technical team while partnering with internal stakeholders and external security providers.

The ideal candidate has a track record of strengthening organizational security posture, implementing scalable controls, leading incident response efforts, and guiding teams through complex technical and compliance challenges.


Key Responsibilities

Security Strategy & Governance

  • Define and execute a comprehensive cybersecurity strategy aligned with organizational goals and risk tolerance.
  • Develop and maintain security policies, standards, and operational procedures.
  • Lead preparedness and documentation efforts for security audits and assessments (e.g., SOC 2, NIST-based frameworks, ISO).
  • Conduct ongoing risk assessments, threat modeling, and control maturity evaluations.
  • Oversee enterprise security awareness programs and drive cultural adoption of secure practices.
  • Present risk metrics, program updates, and strategic recommendations to executive leadership.

Technical Security Operations

  • Manage and optimize core security technologies including SIEM platforms, identity security, endpoint detection/response, and email threat protection.
  • Support secure network architecture and operations including firewalls, segmentation, VPNs, and monitoring controls.
  • Act as the escalation point for security incidents, leading analysis, containment, remediation, and post‑incident reviews.
  • Enhance detection capabilities through improved logging, automation, analytics, and alerting fidelity.

Leadership & Vendor Management

  • Lead, mentor, and develop a small team of security engineers/analysts.
  • Manage relationships with external security providers and service partners, ensuring alignment with SLAs and organizational requirements.
  • Oversee third‑party security reviews, vendor assessments, and contractual security expectations.

Required Qualifications

  • 10+ years of cybersecurity experience, including 5+ years in a leadership capacity.
  • Significant hands‑on experience with SIEM engineering, threat detection tuning, and log analysis.
  • Strong knowledge of email defense technologies and authentication controls (SPF, DKIM, DMARC).
  • Advanced understanding of endpoint security platforms (EDR/XDR) and response playbooks.
  • Deep expertise in network security fundamentals including firewalls, IPS/IDS, routing/switching, and access control.
  • Experience contributing to compliance efforts such as SOC 2 or similar frameworks; familiarity with NIST and ISO controls.
  • Strong grounding in incident response, vulnerability management, access management, and data protection best practices.
  • Comfortable with scripting/automation using languages such as Python or PowerShell.
  • Strong communication skills and ability to articulate technical risk to business audiences.

Preferred Qualifications

  • Experience working in multi‑tenant or high‑availability environments (telecom, MSP, SaaS, or similar).
  • Familiarity with packet analysis, NetFlow, and network forensic tools.
  • Exposure to Zero Trust, ZTNA, or SASE architectures.
  • Relevant certifications (CISSP, CISM, GIAC, OSCP, etc.).
  • Cloud security experience across AWS/Azure/GCP and knowledge of cloud-native security tooling.
  • Understanding of privacy regulations (GDPR, CCPA) and customer compliance assessments.

Success Measures

  • Reduction in detection and response timelines.
  • Improved audit performance and control maturity.
  • Vulnerability remediation timeliness and risk reduction.
  • Quality and accuracy of security detections.
  • Employee engagement and reduced phishing susceptibility.
  • Vendor SLA performance and cost-effectiveness.
  • Delivery of security requirements across organizational initiatives.

Compensation

A competitive compensation package is available and will be tailored based on candidate experience and seniority. Further details will be shared during the recruiting process.

FAQs

Congratulations, we understand that taking the time to apply is a big step. When you apply, your details go directly to the consultant who is sourcing talent. Due to demand, we may not get back to all applicants that have applied. However, we always keep your resume and details on file so when we see similar roles or see skillsets that drive growth in organizations, we will always reach out to discuss opportunities.

Yes. Even if this role isn’t a perfect match, applying allows us to understand your expertise and ambitions, ensuring you're on our radar for the right opportunity when it arises.

We also work in several ways, firstly we advertise our roles available on our site, however, often due to confidentiality we may not post all. We also work with clients who are more focused on skills and understanding what is required to future-proof their business. 

That's why we recommend registering your resume so you can be considered for roles that have yet to be created. 

Yes, we help with resume and interview preparation. From customized support on how to optimize your resume to interview preparation and compensation negotiations, we advocate for you throughout your next career move.

Handpicked roles for you