For Candidates
For Candidates

I am...

Cybersecurity sales talent

Technical talent

Have you ever?

01
02
03
04
/
04
how we work
01
/
04
Started a new job, only to find it wasn't what you were expecting?
how we work
02
/
04
Wasted time with recruiters that ghost you or bring you jobs that don't fit?
how we work
03
/
04
Submitted a bunch of job applications with little to no response or feedback?
how we work
04
/
04
Wondered where to go for data-backed career advice?

You have found the right place

We take long term perspective, and want to be a resource throughout your career, not just to fill an open rec today
We want you to find incredible opportunities that are a good fit for you, whether they come from within or outside our jobs network
We look deeper than what’s on your resume, and want to get to know your personality, aspirations, and what makes you tick
Our goal: help you find work you love

How it works

service image
01.
Join Crux
service image
02.
Help us get to know you
service image
03.
Access jobs custom tailored to you
we stand
04.
Receive ongoing career resources and guidance
service
05.
Find work you love
05.
Find work you love

Recent Jobs

Chief Information Security Officer
ElectronX
State
Illinois
Remote Elig.
Hybrid
Seniority
Senior
Domain
GRC
Salary ($K)
-
Not disclosed
Vice President of Information Security CISO
Driscoll's
State
California
Remote Elig.
On-site
Seniority
Executive
Domain
Cross-domain
Salary ($K)
248.00
-
Not disclosed
300
Cybersecurity Senior Engineer
Truist
State
North Carolina
Remote Elig.
On-site
Seniority
Senior
Domain
Network Security
Salary ($K)
-
Not disclosed
Hybrid
State
Ohio
Remote Elig.
Hybrid
Not disclosed
Seniority
Executive
Domain
GRC
Salary ($K)
-
Not disclosed
Oversee and Govern

About the job

This role will be in our Cleveland-based Headquarters. All applicants must be currently residing in Northern OH, or, be willing to relocate to Cleveland. A liberal relocation package is available.

Who We Are:

Park Place Technologies is a global data center and networking optimization firm. Powered by the world’s largest on-the-ground engineering team, a robust group of advanced engineers and our fully staffed, 24x7x365 Enterprise Operations Center, we offer a robust portfolio of IT solutions to optimize networking and data center Uptime and performance. As the industry leader, our 2500 Park Place Associates provide support to 21,000+ customers in more than 154+ countries. We are proud to service 90% of Fortune 500 companies and 40% of Forbes 100 clients.

Top Rated Benefits We Offer:

  • Executive benefits package
  • We cover 100% of your Healthcare benefits!
  • Flexible Vacation to promote work-life balance.
  • 12 weeks of Paid Maternity Leave
  • Annual Profit Sharing
  • 401K matching contributions and earnings are always 100% vested.
  • Plus, much more!!!

Position Overview:

The CISO is responsible for maintaining the Park Place Technologies information security program, including our security and risk policies, to ensure that information assets and associated technology, applications, systems, infrastructure and processes are adequately protected for our employees and our customers. The CISO will develop and implement effective information security policies and procedures to secure sensitive systems and data as well as oversee the security of systems, data, and activities. The CISO is responsible for identifying, evaluating and reporting on legal and regulatory, IT, and cybersecurity risk to information assets, while supporting and advancing business objectives.

What you’ll be doing:

Manage the Information Security Program:

  • Provide strategic leadership for risk and compliance programs, IT systems, and security programs.
  • Ensure compliance with our chosen information security standards, based upon the NIST Cybersecurity Framework.
  • Report on compliance and security metrics to senior business leaders both internal and external.
  • Continuously improve our information security awareness training program for all employees and contractors.
  • Participate in business and technology projects to ensure the standards of the Information Security Program are considered and in place for all projects.

Lead the Organization:

  • Lead the information security function across the company to ensure consistent and high-quality information security management in support of the business goals.
  • Determine the information security approach and operating model in consultation with stakeholders and aligned with the risk management approach and compliance monitoring of nondigital risk areas.
  • Manage the budget for the information security function, monitoring and reporting discrepancies.
  • Coordinate an effective information security organization, consisting of direct reports and dotted line reports (such as individuals in business continuity and IT operations). This includes hiring (and conducting background checks), training, staff development, performance management and annual performance reviews.

Determine Strategy:

  • Develop an information security vision and strategy that is aligned to organizational priorities and enables and facilitates the organization's business objectives, and ensure senior stakeholder buy-in and mandate.
  • Develop, implement and monitor a strategic, comprehensive information security program to ensure appropriate levels of confidentiality, integrity, availability, safety, privacy and recovery of information assets owned, controlled or/and processed by the organization.
  • Assist in new product development, adjusting our strategy as necessary to recognize new threats introduced with new products.
  • Work with senior management to identify, define and confirm the key threats to PPT information assets, internally and externally.
  • Identify and champion projects that continuously improve our security stance.

Operate the Function:

  • Work with business units to ensure that all information owned, collected or controlled by or on behalf of the company is processed and stored in accordance with applicable laws and other global regulatory requirements, such as data privacy.
  • Collaborate and liaise with the data privacy officer to ensure that data privacy requirements are included where applicable.
  • Oversee technology dependencies outside of direct organizational control. This includes reviewing contracts and the creation of alternatives for managing risk.
  • Manage and contain information security incidents and events to protect corporate IT assets, intellectual property, regulated data and the company's reputation.
  • Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action.
  • Develop and oversee effective disaster recovery policies and standards to align with the enterprise business continuity management (BCM) program goals, with the realization that components supporting primary business processes may be outside the corporate perimeter.
  • Coordinate the development of implementation of incident response plans and procedures to ensure that business-critical services are recovered in the event of a security event; provide direction, support and in-house consulting in these areas.
  • Oversee external vendors who provide security functions to PPT.
  • Maintain, improve and drive strategy to ensure our SOC 2 and ISO 9001 certifications remain compliant.

What we’re looking for:

Required Qualifications:

  • Minimum of ten to fifteen years of experience in a combination of risk management, information security and IT jobs (at least five must be in a senior leadership role).
  • Five to ten years of information security leadership experience with a SaaS provider.
  • Excellent written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate information security and risk-related concepts to technical and nontechnical audiences at various hierarchical levels, ranging from board members to technical specialists.
  • Ability to communicate effectively with external customers, explaining our security posture for PPT products and services in both 1-1 customer meetings and general forums.
  • Proven track record and experience in developing information security policies and procedures, as well as successfully executing programs that meet the objectives of excellence in a dynamic business environment.
  • Poise and ability to act calmly and competently in high-pressure, high-stress situations.
  • Must be a critical thinker, with strong problem-solving skills.
  • Knowledge and understanding of relevant legal and regulatory requirements, such as GDPR.
  • Degree in business administration or a technology-related field, or equivalent work- or education-related experience.
  • Professional security management certification is expected, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials.
  • Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT as well as those from NIST, including 800-53 and Cybersecurity Framework.
  • Experience with contract and vendor negotiations.
  • Excellent stakeholder management skills.
  • High level of personal integrity, as well as the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity.
  • High degree of initiative, dependability and ability to work with little supervision while being resilient to change.
  • Must be willing to work four days in office (one day remote) each week.

Travel:

  • Up to 15%

If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation if you are unable or limited in your ability to access job openings or apply for a job on this site as a result of your disability. You can request reasonable accommodations by calling 1-877-778-8707.

Park Place Technologies is an Equal Opportunity Employer M/F/D/V.

Park Place Technologies has an in-house recruiting team that focuses exclusively on the hiring needs of our company. We are not currently accepting additional third-party agreements or unsolicited resumes. If you would like to be considered as a preferred partner with Park Place Technologies, please submit your detailed information to careers@parkplacetech.com. Any CVs submitted directly to hiring managers will be considered unsolicited and become the property of Park Place Technologies.

No items found.
On-site
State
California
Remote Elig.
On-site
Not disclosed
Seniority
Executive
Domain
Cross-domain
Salary ($K)
178
-
315
Not disclosed
Oversee and Govern
178

About the job

Are you a visionary leader with a passion for cybersecurity and a knack for building robust security frameworks? Do you have the expertise to protect critical assets and the strategic insight to align security initiatives with business goals? If you thrive in a high-stakes environment where your decisions directly impact the safety and security of an organization, Shield AI is the place for you!

As the Chief Information Security Officer (CISO) at Shield AI, you will lead the charge in fortifying our cybersecurity defenses, ensuring the protection of corporate intellectual property and classified information. This role blends strategic leadership with hands-on technical expertise to create and maintain a security-first culture across the organization.

  • Strategic Leadership: Lead and manage a high-performing cybersecurity and information security team, aligning their efforts with Shield AI’s overall strategic objectives.
  • Security Policy Development: Develop, implement, and enforce comprehensive cybersecurity policies that protect the company’s assets, data, and intellectual property at all levels of classification.
  • Risk Management: Conduct thorough risk assessments, develop and implement mitigation strategies, and ensure compliance with regulatory and legal standards.
  • Incident Response and Recovery: Oversee the monitoring, management, and resolution of security incidents, ensuring swift recovery and minimal impact on operations.
  • Cybersecurity Strategy: Develop, execute, and continuously refine a cybersecurity strategy that protects Shield AI’s infrastructure and assets from evolving cyber threats.
  • Security Operations Center Leadership: Lead the operations of the Internal SOC, ensuring it operates at peak efficiency to monitor, detect, and respond to security incidents in real time.
  • Compliance and Governance: Ensure that Shield AI’s cybersecurity practices comply with relevant regulations and standards, such as CMMC, NIST 800-171/53, and ITAR, and lead efforts to maintain these standards.
  • Stakeholder Communication: Regularly brief executives and senior management on the state of cybersecurity within the organization and provide expert guidance on new security initiatives and potential risks.
  • Security Architecture Design: Oversee the development and implementation of a robust security architecture that supports Shield AI’s growth and protects its sensitive information.
  • Cybersecurity Training and Awareness: Implement a comprehensive cybersecurity training and awareness program to cultivate a security-first culture across all levels of the organization.
  • Vendor and Third-Party Risk Management: Manage and evaluate the cybersecurity practices of third-party vendors to ensure they meet Shield AI’s security standards.
  • Cultural Alignment: Foster a cybersecurity culture that aligns with Shield AI’s mission-driven and values-focused environment, ensuring that security is embedded in every aspect of the organization.
  • Leadership Development: Mentor and develop the next generation of cybersecurity leaders within Shield AI, ensuring a strong leadership pipeline for the future.

Required qualifications:

  • Educational Background: B.S. in Cybersecurity, Information Technology, Computer Science, or a related field, or equivalent practical experience.
  • Certifications: Professional certifications such as CISSP, CISM, CISA, or GIAC (e.g., GSEC, GCIH, GCFA) are required.
  • Leadership Experience: Proven experience in leading and managing cybersecurity teams, with the ability to align security initiatives with broader business goals.
  • Technical Expertise: Strong foundational knowledge in cybersecurity principles, practices, and technologies, with hands-on experience in implementing and managing security frameworks in complex environments.
  • Compliance Knowledge: Deep understanding of compliance regulations and frameworks, including CMMC, NIST 800-171, NIST 800-53, and ITAR.
  • Risk Management: Demonstrated experience in conducting risk assessments, implementing risk mitigation strategies, and ensuring compliance with regulatory requirements.
  • Problem Solving and Incident Response: Strong analytical and problem-solving skills, with a proactive approach to identifying and addressing security challenges. Proven experience in managing cybersecurity incidents, ensuring swift and effective resolution while minimizing impact on business operations.
  • Communication Skills: Exceptional communication skills, capable of articulating complex security concepts to diverse audiences, including senior leadership and non-technical stakeholders.

Preferred qualifications:

  • Extensive Leadership: 15+ years in cybersecurity and information security, with at least 8+ years in leadership roles, preferably in high-growth or highly regulated environments.
  • Advanced Certifications: Possession of advanced certifications such as CISM, CISSP, or specialized GIAC certifications (e.g., GCFA, GNFA) is highly desirable.
  • Educational Background: A master's degree or higher in Cybersecurity, Information Technology, Computer Science, or a related field is preferred.
  • Defense Contracting Experience: Experience in implementing and assessing U.S. defense contracting information security requirements, including CMMC, NIST standards, and ITAR.
  • Strategic Thinking: Ability to connect cybersecurity strategies to business objectives and develop long-term plans and goals for information security.
  • Program Development: Experience building and scaling cybersecurity programs in organizations facing high-threat environments or operating under strict regulatory frameworks.
  • Cybersecurity Technology Expertise: In-depth knowledge of current and emerging cybersecurity technologies, trends, and best practices, including experience with advanced security tools and frameworks.
  • Cultural Fit: Demonstrated ability to foster a security-first culture that aligns with the mission-driven and values-focused environment of Shield AI.
  • Leadership Development: Proven experience in mentoring and developing cybersecurity professionals, ensuring a strong leadership pipeline for the future.

NA

No items found.
On-site
State
District of Columbia
Remote Elig.
On-site
Not disclosed
Seniority
Executive
Domain
Cross-domain
Salary ($K)
178
-
315
Not disclosed
Oversee and Govern
178

About the job

Are you a visionary leader with a passion for cybersecurity and a knack for building robust security frameworks? Do you have the expertise to protect critical assets and the strategic insight to align security initiatives with business goals? If you thrive in a high-stakes environment where your decisions directly impact the safety and security of an organization, Shield AI is the place for you!

As the Chief Information Security Officer (CISO) at Shield AI, you will lead the charge in fortifying our cybersecurity defenses, ensuring the protection of corporate intellectual property and classified information. This role blends strategic leadership with hands-on technical expertise to create and maintain a security-first culture across the organization.

  • Strategic Leadership: Lead and manage a high-performing cybersecurity and information security team, aligning their efforts with Shield AI’s overall strategic objectives.
  • Security Policy Development: Develop, implement, and enforce comprehensive cybersecurity policies that protect the company’s assets, data, and intellectual property at all levels of classification.
  • Risk Management: Conduct thorough risk assessments, develop and implement mitigation strategies, and ensure compliance with regulatory and legal standards.
  • Incident Response and Recovery: Oversee the monitoring, management, and resolution of security incidents, ensuring swift recovery and minimal impact on operations.
  • Cybersecurity Strategy: Develop, execute, and continuously refine a cybersecurity strategy that protects Shield AI’s infrastructure and assets from evolving cyber threats.
  • Security Operations Center Leadership: Lead the operations of the Internal SOC, ensuring it operates at peak efficiency to monitor, detect, and respond to security incidents in real time.
  • Compliance and Governance: Ensure that Shield AI’s cybersecurity practices comply with relevant regulations and standards, such as CMMC, NIST 800-171/53, and ITAR, and lead efforts to maintain these standards.
  • Stakeholder Communication: Regularly brief executives and senior management on the state of cybersecurity within the organization and provide expert guidance on new security initiatives and potential risks.
  • Security Architecture Design: Oversee the development and implementation of a robust security architecture that supports Shield AI’s growth and protects its sensitive information.
  • Cybersecurity Training and Awareness: Implement a comprehensive cybersecurity training and awareness program to cultivate a security-first culture across all levels of the organization.
  • Vendor and Third-Party Risk Management: Manage and evaluate the cybersecurity practices of third-party vendors to ensure they meet Shield AI’s security standards.
  • Cultural Alignment: Foster a cybersecurity culture that aligns with Shield AI’s mission-driven and values-focused environment, ensuring that security is embedded in every aspect of the organization.
  • Leadership Development: Mentor and develop the next generation of cybersecurity leaders within Shield AI, ensuring a strong leadership pipeline for the future.

Projects you might work on:

  • Lead the Internal Security Operations Center (SOC): Establish, manage, and continually enhance the in-house SOC, ensuring 24/7 monitoring and rapid response capabilities to defend against potential threats.
  • Develop a Comprehensive Cybersecurity Strategy: Create and implement a multi-year cybersecurity roadmap that aligns with business objectives, enhances security posture, and prepares the organization for emerging threats.
  • Enhance Cyber Defense Mechanisms: Deploy and integrate advanced security technologies, such as next-generation firewalls, intrusion detection systems, and SIEM platforms, to strengthen the company's cyber defense.
  • Governance, Risk, and Compliance: Lead initiatives to ensure ongoing compliance with relevant cybersecurity regulations, such as CMMC, NIST 800-171/53, and ITAR, and implement a continuous risk management framework.
  • Cybersecurity Awareness and Training: Develop and execute a company-wide security awareness program to build a culture of security, ensuring all employees understand their role in protecting the organization's assets.
  • Vendor and Third-Party Risk Management: Oversee the evaluation and management of third-party vendors and partners to ensure they meet Shield AI’s stringent cybersecurity standards.
  • Incident Response and Recovery: Lead the development and continuous improvement of incident response protocols, ensuring the organization is prepared to swiftly and effectively recover from any security incidents.
  • Security Architecture Design: Oversee the design and implementation of a resilient security architecture that protects sensitive data and supports the organization’s growth.

Required qualifications:

  • Educational Background: B.S. in Cybersecurity, Information Technology, Computer Science, or a related field, or equivalent practical experience.
  • Certifications: Professional certifications such as CISSP, CISM, CISA, or GIAC (e.g., GSEC, GCIH, GCFA) are required.
  • Leadership Experience: Proven experience in leading and managing cybersecurity teams, with the ability to align security initiatives with broader business goals.
  • Technical Expertise: Strong foundational knowledge in cybersecurity principles, practices, and technologies, with hands-on experience in implementing and managing security frameworks in complex environments.
  • Compliance Knowledge: Deep understanding of compliance regulations and frameworks, including CMMC, NIST 800-171, NIST 800-53, and ITAR.
  • Risk Management: Demonstrated experience in conducting risk assessments, implementing risk mitigation strategies, and ensuring compliance with regulatory requirements.
  • Problem Solving and Incident Response: Strong analytical and problem-solving skills, with a proactive approach to identifying and addressing security challenges. Proven experience in managing cybersecurity incidents, ensuring swift and effective resolution while minimizing impact on business operations.
  • Communication Skills: Exceptional communication skills, capable of articulating complex security concepts to diverse audiences, including senior leadership and non-technical stakeholders.

Preferred qualifications:

  • Extensive Leadership: 15+ years in cybersecurity and information security, with at least 8+ years in leadership roles, preferably in high-growth or highly regulated environments.
  • Advanced Certifications: Possession of advanced certifications such as CISM, CISSP, or specialized GIAC certifications (e.g., GCFA, GNFA) is highly desirable.
  • Educational Background: A master's degree or higher in Cybersecurity, Information Technology, Computer Science, or a related field is preferred.
  • Defense Contracting Experience: Experience in implementing and assessing U.S. defense contracting information security requirements, including CMMC, NIST standards, and ITAR.
  • Strategic Thinking: Ability to connect cybersecurity strategies to business objectives and develop long-term plans and goals for information security.
  • Program Development: Experience building and scaling cybersecurity programs in organizations facing high-threat environments or operating under strict regulatory frameworks.
  • Cybersecurity Technology Expertise: In-depth knowledge of current and emerging cybersecurity technologies, trends, and best practices, including experience with advanced security tools and frameworks.
  • Cultural Fit: Demonstrated ability to foster a security-first culture that aligns with the mission-driven and values-focused environment of Shield AI.
  • Leadership Development: Proven experience in mentoring and developing cybersecurity professionals, ensuring a strong leadership pipeline for the future.

$178,000 - $315,000 a year

No items found.
Chief Information Security Officer
ElectronX
State
Illinois
Remote Elig.
Hybrid
Seniority
Senior
Domain
GRC
Salary ($K)
-
Not disclosed
Vice President of Information Security CISO
Driscoll's
State
California
Remote Elig.
On-site
Seniority
Executive
Domain
Cross-domain
Salary ($K)
248.00
-
Not disclosed
300
Cybersecurity Senior Engineer
Truist
State
North Carolina
Remote Elig.
On-site
Seniority
Senior
Domain
Network Security
Salary ($K)
-
Not disclosed