{"id":5466,"date":"2026-03-10T01:30:25","date_gmt":"2026-03-09T22:30:25","guid":{"rendered":"https:\/\/mlingei.ptcholombxn.com\/pukka_jobs\/?p=5466"},"modified":"2026-03-09T09:30:44","modified_gmt":"2026-03-09T06:30:44","slug":"security-jobs-opening","status":"publish","type":"post","link":"https:\/\/mlingei.ptcholombxn.com\/pukka_jobs\/2026\/03\/10\/security-jobs-opening\/","title":{"rendered":"Security Jobs Opening"},"content":{"rendered":"<p><strong><span style=\"color: #3366ff;\">Description<\/span><\/strong><\/p>\n<p>We are committed to maintaining the highest security standards to protect our data, assets, and personnel.<\/p>\n<p>We are seeking a highly skilled and experienced\u00a0<strong>Head of Security and Compliance<\/strong> to develop, implement, and oversee comprehensive security strategies that align with our business goals.<br \/>\n<strong><br \/>\n<span style=\"color: #3366ff;\">Job Overview:<\/span><\/strong><\/p>\n<p>The\u00a0<strong>Head of Security and Compliance<\/strong>\u00a0is responsible for designing, implementing, and managing the company&#8217;s security plans, covering both physical and cybersecurity measures.<\/p>\n<p>This role encompasses cybersecurity, IT infrastructure, compliance, and physical security.<\/p>\n<p>They are responsible for setting strategic direction and implementation of a security and IT roadmap spanning both in-house development (software engineering) and operations (including remote or contractor work).<\/p>\n<p>This role involves overseeing security for a large number of employees across multiple departments and external team members.<\/p>\n<p><span style=\"color: #3366ff;\"><strong>Key Responsibilities<\/strong><\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Develop and implement comprehensive security strategies, policies, and procedures for IT and physical security.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Oversee and manage all aspects of IT security, including network security, cybersecurity threats, and data protection.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Establish robust protocols for employees and contractors in a remote-work environment, ensuring compliance with data protection standards.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Assess security risks and implement mitigation strategies to protect company assets and personnel.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Ensure compliance with industry regulations, data protection laws, and company policies.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Lead the security incident response process, including investigation, reporting, resolution, business continuity and disaster recovery planning<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Monitor and evaluate the effectiveness of security measures and update policies as needed.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Conduct regular security audits, penetration testing, tabletop exercises, and vulnerability assessments.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Collaborate with other departments to provide security awareness training for employees.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Develop and deliver security awareness programs that educate and empower employees at all levels.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Manage security budgets, resources, and vendor relationships to enhance security infrastructure.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Stay up to date with emerging security trends, threats, and technologies.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"color: #3366ff;\"><strong>Skills, Knowledge and Expertise<\/strong><\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Bachelor&#8217;s or Master&#8217;s degree in Cybersecurity, Information Technology, or a related field.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Minimum of 7-10 years of experience in IT security, risk management, or a related role.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Strong knowledge of security frameworks (ISO 27001, NIST, CIS, etc.) and compliance standards (GDPR, HIPAA, SOC 2, etc.).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Experience with network security, VPNs, firewalls, encryption, SIEM tools, and incident response.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Strong background in endpoint management, MDM (Mobile Device Management), and zero-trust network access<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Proven leadership experience with the ability to manage cross-functional teams.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Excellent problem-solving, communication, and decision-making skills.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Relevant certifications such as CISSP, CISM, CISA, or CEH are preferred.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Description We are committed to maintaining the highest security standards to protect our data, assets, and personnel. We are seeking a highly skilled and experienced\u00a0Head of Security and Compliance to develop, implement, and oversee comprehensive security strategies that align with our business goals. Job Overview: The\u00a0Head of Security and Compliance\u00a0is responsible for designing, implementing, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5469,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"class_list":["post-5466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-guards"],"_links":{"self":[{"href":"https:\/\/mlingei.ptcholombxn.com\/pukka_jobs\/wp-json\/wp\/v2\/posts\/5466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mlingei.ptcholombxn.com\/pukka_jobs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mlingei.ptcholombxn.com\/pukka_jobs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mlingei.ptcholombxn.com\/pukka_jobs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mlingei.ptcholombxn.com\/pukka_jobs\/wp-json\/wp\/v2\/comments?post=5466"}],"version-history":[{"count":3,"href":"https:\/\/mlingei.ptcholombxn.com\/pukka_jobs\/wp-json\/wp\/v2\/posts\/5466\/revisions"}],"predecessor-version":[{"id":5472,"href":"https:\/\/mlingei.ptcholombxn.com\/pukka_jobs\/wp-json\/wp\/v2\/posts\/5466\/revisions\/5472"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mlingei.ptcholombxn.com\/pukka_jobs\/wp-json\/wp\/v2\/media\/5469"}],"wp:attachment":[{"href":"https:\/\/mlingei.ptcholombxn.com\/pukka_jobs\/wp-json\/wp\/v2\/media?parent=5466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mlingei.ptcholombxn.com\/pukka_jobs\/wp-json\/wp\/v2\/categories?post=5466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mlingei.ptcholombxn.com\/pukka_jobs\/wp-json\/wp\/v2\/tags?post=5466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}