Dieses Stellenangebot ist nicht mehr verfügbar
Über
Target Range: $170,000.00 /Yr. - $200,000.00 /Yr. Actual starting pay will vary based on factors including, but not limited to, geographic location, experience, skills, specialty, and education.
Eligible for an Annual Discretionary Cash Bonus Target: 25%.
Eligible for an Annual Discretionary Restricted Stock Units Bonus Target: 25%.
About This Job The First Vice President, Cyber Security is a hands‑on technical leader responsible for driving the execution of Axos Bank's information security strategy. This is a hybrid role that demands both rolling up your sleeves to do deep technical work and building and leading a high‑performing team. You will architect solutions, write detection rules, troubleshoot complex platform issues, and drive strategic initiatives while simultaneously developing your team's capability to operate independently. This role requires a bias for action, the ability to operate at velocity in a fast‑paced environment, and comfort moving fluidly between technical execution and team leadership.
Ideal Candidate Profile The ideal candidate is a hands‑on technical leader who thrives in fast‑paced environments, loves solving complex technical problems while building team capability, and operates with urgency and accountability. You are equally comfortable writing Splunk queries, designing security architectures, coaching team members through technical challenges, and presenting to executives. You understand that this role requires both rolling up your sleeves to do deep technical work and developing others. You embrace the reality that cyber security leadership requires commitment beyond standard hours. If you are looking for a role where you can make strategic impact through a combination of personal technical execution and building a high‑performing team, this is the opportunity.
Candidates must demonstrate
Deep hands‑on technical expertise with willingness to architect, configure, troubleshoot, and build security solutions directly.
Ability to balance personal technical execution with developing team capability—knowing when to do the work yourself and when to coach others through it.
Track record of driving multiple strategic initiatives simultaneously while staying in technical details.
Demonstrated bias for action and execution velocity—candidates who work methodically at a measured pace will not succeed in this environment.
Commitment to the demands of a senior leadership role in cyber security, including availability for crisis response and emerging threats outside standard business hours.
Comfort moving fluidly between writing Splunk detection rules in the morning and presenting to senior leadership in the afternoon.
Key Responsibilities Hands‑On Technical Execution & Engineering
Architect and implement security solutions including SIEM detections, automation workflows, security tool configurations, and integration pipelines.
Troubleshoot complex technical issues across the security stack (Splunk, CrowdStrike, Azure, Cisco Secure Access, etc.).
Write and tune detection rules, correlation searches, and AI‑powered investigation prompts.
Lead technical design sessions and proof‑of‑concept evaluations for new security capabilities.
Build automation and AI agentic workflows to scale security operations.
Team Leadership & Development
Build and lead a high‑performing security team across US and international locations (Manila office).
Develop team capability through pairing on technical work, not just delegating—coach team members while solving problems together.
Know when to roll up your sleeves and execute directly versus when to invest time developing someone else's skills.
Establish clear ownership and accountability while maintaining technical quality standards.
Drive hiring, onboarding, and performance management while staying technically engaged.
Strategic Program Execution
Drive execution of security technology roadmap including platform migrations, tool consolidations, and capability enhancements.
Develop detailed project plans with milestones, dependencies, and resource allocation—proactively, not upon request.
Lead multiple concurrent strategic initiatives while maintaining velocity and quality.
Remove blockers and drive decisions quickly to maintain momentum.
Security Operations & Incident Response
Oversee 24/7 security operations and ensure readiness for incident response.
Maintain availability for critical security incidents and emerging threats outside standard business hours.
Drive continuous improvement of detection, response, and recovery capabilities.
Build autonomous SOC capabilities leveraging AI and automation.
Experience Required Qualifications
10+ years of progressive experience in information security with at least 5 years in technical leadership roles where you personally built solutions while managing teams.
Recent hands‑on work with security platforms—not just oversight. You should be able to configure a Entra Conditional Access Policy, write a CrowdStrike IoA rule, or investigate an Azure identity issue without handing it off.
History of driving large‑scale security platform migrations where you were personally in the technical weeds, not just managing from above.
Technical Knowledge
Deep expertise in security operations, Active Directory/Entra, SIEM platforms (Splunk), EDR/XDR, and cloud security.
Strong understanding of AI/ML applications in security operations and autonomous security capabilities.
Working knowledge of identity and access management, network security, application security, and data protection.
Familiarity with banking compliance frameworks (FFIEC, GLBA, PCI DSS).
Required Focus Areas
Security Incident Response: Leading complex incident investigations from detection through containment and recovery. Experience building IR playbooks, conducting tabletop exercises, managing multi‑team response efforts, and post‑incident analysis.
Microsoft Entra ID / Azure Cloud Security: Deep hands‑on experience with Entra ID (Azure AD), Conditional Access policies, PIM, identity governance, Azure security services, and securing Azure workloads at scale.
Zero Trust Architecture: Designing and implementing zero trust frameworks including identity‑based access, micro‑segmentation, least privilege access, continuous verification, and secure access service edge (SASE) architectures.
Leadership Competencies
Ability to switch rapidly between deep technical work and strategic leadership conversations.
Judgment about when to do the work yourself (speed, complexity, teaching opportunity) versus when to delegate.
Track record of staying technically sharp while managing people and projects.
Bias for action with ability to make decisions quickly and implement them directly when needed.
Comfortable with ambiguity and able to create structure through hands‑on execution.
Work Environment & Expectations
This is a demanding hybrid technical leadership role that requires significant commitment beyond standard business hours.
You will be in the technical weeds—writing code, troubleshooting platform issues, architecting solutions—while also building and leading a team. This is not a pure management role.
Cyber security threats do not operate on a 9‑to‑5 schedule. Candidates must be prepared to respond to incidents, engage with stakeholders, and drive initiatives outside traditional working hours as operational needs require.
The pace of work is fast and the volume is high. You need to move quickly between technical execution, team coaching, vendor escalations, and executive updates—often on the same day.
Success requires knowing when to roll up your sleeves and build something yourself versus when to invest time developing team capability. Both are necessary.
Axos Employee Benefits May Include
Medical, Dental, Vision, and Life Insurance.
Paid Sick Leave, 3 weeks’ Vacation, and Holidays (about 11 a year).
HSA or FSA account and other voluntary benefits.
401(k) Retirement Saving Plan with Employer Match Program and 529 Savings Plan.
Employee Mortgage Loan Program and free access to an Axos Bank Account with Self‑Directed Trading.
Equal Employment Opportunity Axos is an Equal Opportunity employer. We are committed to providing equal employment opportunities to all employees and applicants without regard to race, religious creed, color, sex (including pregnancy, breastfeeding and related medical conditions), gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship status, military and veteran status, marital status, age, protected medical condition, genetic information, physical disability, mental disability, or any other protected status in accordance with all applicable federal, state, and local laws.
Job Functions and Work Environment While performing the duties of this position, the employee is required to sit for extended periods of time. Manual dexterity and coordination are required while operating standard office equipment such as computer keyboard and mouse, calculator, telephone, copiers, etc. The work environment characteristics described here are representative of those an employee may encounter while performing the essential functions of this position. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this position.
E-Verify and Right to Work Notices Axos participates in the U.S. Department of Homeland Security E-Verify program in all facilities located in the United States. The E-Verify program is an internet‑based employment eligibility verification system operated by the U.S. Citizenship and Immigration Services.
#J-18808-Ljbffr
Sprachkenntnisse
- English
Hinweis für Nutzer
Dieses Stellenangebot wurde von einem unserer Partner veröffentlicht. Sie können das Originalangebot einsehen hier.