VP of Cyber Security
Listed on 2026-01-15
-
IT/Tech
Cybersecurity, Systems Engineer, IT Consultant
By bringing together next-gen technology and the finest live data available, Genius Sports is enabling a new era of sports for fans worldwide, delivering experiences that are more immersive, interactive and personalized than ever before. Learn more at
The Role:VP of Cyber Security
Genius Sports is elevating its global security foundation. As VP of Cyber Security, you’ll design and execute the multi-year program that transforms how Genius protects its people, data, and technology… modern, automated, and embedded in everything we build.
You will be both a system architect and a practical operator, leading the transformation of our controls, processes, and trust model, while shaping a future‑ready security strategy that seamlessly blends robustness with simplicity.
Your mission: embed security as an invisible, intuitive, and empowering part of how our teams work… guiding the IT/Cyber function toward its north star of Simple, Safe, Secure, Scalable, Human.
What You’ll Do:Optimize and Mature Security Operations
- Build and deliver a rolling 3-year strategy that advances security maturity across people, process, and technology.
- Assess and continuously improve Security Operations capabilities across internal teams and managed partners.
- Enhance detection quality by reducing noise and improving signal fidelity across SIEM, EDR, email, identity, and cloud platforms.
- Design, test, and operationalize incident response playbooks and escalation models.
- Improve detection and response outcomes through tuning, automation, and clearly defined ownership.
- Lay the groundwork for a zero‑trust identity architecture, delivering adaptive MFA and passwordless access that balance security with a frictionless user experience.
- Enhance endpoint security through automation, consistent patching, and transparent, in‑product messaging that builds user trust.
- Promote “secure by default” experiences that empower, not burden, users.
- Secure collaboration suites (Google Workspace/M365), SaaS platforms, and Dev Ops environments through least‑privilege access and automated governance.
- Define and maintain secure configuration baselines in device‑management platforms (Intune, Jamf, MDM).
- Partner with IT and Engineering to enable frictionless productivity in a secure environment.
- Guide a lean security engineering function focused on automation, tooling effectiveness, and operational scale.
- Improve telemetry quality and visibility across cloud, SaaS, endpoint, and identity platforms.
- Rationalize and consolidate security tools to maximize value, reduce complexity, બં comply? improve usability.
- Support secure software delivery by embedding practical security guardrails into CI/CD workflows.
- Maintain and evolve alignment with ISO 27001 and SOC 2 standards.
- Use NIST CSF and risk frameworks to inform prioritization and decision‑making.
- Automate evidence collection, reporting, and assurance processes wherever possible.
- Strengthen third‑party and supplier security practices through pragmatic, risk‑based approaches.
- Lead with transparency, empathy, and accountability.
- Foster a culture where security is viewed as a business enabler, not a blocker.
- Encourage continuous learning, collaboration, and shared ownership of risk.
- Establish strong, trust‑based partnerships with Product Engineering, ensuring security is embedded early in design, architecture, and delivery life cycles.
- Collaborate closely with Legal, Compliance, and the Chief Privacy Officer to align privacy, regulatory, and security requirements into unified, unmanaged controls.
- Proven track record leading multi‑year security modernization programs in global, fast‑moving environments.
- Deep understanding of zero‑trust architectures, cloud‑native security, identity management (WorkOS/Entra), endpoint protection, and Dev Sec Ops .
- Experience aligning to NIST and ISO 27001 frameworks while integrating automation and UX metrics.
- Strong communicator who can translate complex…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).