- Optimize and Mature Security Operations
- Build and deliver a rolling 3-year strategy that advances security maturity across people, process, and technology
- Assess and continuously improve Security Operations capabilities across internal teams and managed partners
- Enhance detection quality by reducing noise and improving signal fidelity across SIEM, EDR, email, identity, and cloud platforms
- Design, test, and operationalize incident response playbooks and escalation models
- Improve detection and response outcomes through tuning, automation, and clearly defined ownership
- Enhance endpoint security through automation, consistent patching, and transparent, in-product messaging that builds user trust
- Promote "secure by default" experiences that empower, not burden, users
- Modernize the Digital Workplace
- Secure collaboration suites (Google Workspace/M365), SaaS platforms, and DevOps environments through least-privilege access and automated governance
- Define and maintain secure configuration baselines in device-management platforms (Intune, Jamf, MDM)
- Partner with IT and Engineering to enable frictionless productivity in a secure environment
- Improve telemetry quality and visibility across cloud, SaaS, endpoint, and identity platforms
- Rationalize and consolidate security tools to maximize value, reduce complexity, and improve usability
- Support secure software delivery by embedding practical security guardrails into CI/CD workflows
- Apply Practical, Risk-Based Governance
- Maintain and evolve alignment with ISO 27001 and SOC 2 standards
- Use NIST CSF and risk frameworks to inform prioritization and decision-making
- Automate evidence collection, reporting, and assurance processes wherever possible
- Strengthen third-party and supplier security practices through pragmatic, risk-based approaches
- Build and Empower a High-Performing Team and Culture
- Lead with transparency, empathy, and accountability
- Foster a culture where security is viewed as a business enabler, not a blocker
- Encourage continuous learning, collaboration, and shared ownership of risk
- Cultivate Cross-Organization Relationships
- Establish strong, trust-based partnerships with Product Engineering, ensuring security is embedded early in design, architecture, and delivery lifecycles
Collaborate closely with Legal, Compliance, and the Chief Privacy Officer to align privacy, regulatory, and security requirements into unified, practical controls