We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Director of Product Security Operations

Dematic
$ $161,625 - $247,825
United States, Texas, Fort Worth
11200 Harmon Road (Show on map)
Feb 25, 2025
As the Director of Product Security Operations for Dematic you will be critical to the advancement of security throughout the company, enabling the success and growth of the business in an environment of increasing demands for comprehensive and robust product security. Under the Vice President of Global Product Security, you will be responsible for the continuous operational security of all Dematic-hosted products, providing 24x7 security monitoring and response capabilities, ensuring the confidentiality, integrity, and availability of Dematic products, services, data, and support structures. You will closely collaborate with technology and product leadership to strengthen Dematic's cloud security posture, respond to cyber threats, and implement compliance with all relevant regulatory requirements. You will provide best-in-class security operations guidance and vision, while passionately pursuing personal and organizational excellence in the field of security. As an invaluable member of a highly collaborative organization that is dedicated to serving with the utmost in excellence and integrity, you will be ever growing in technical expertise and the skills necessary to equip our team to protect our organization, our customers, and our communities. What we offer:
  • Career Development
  • Competitive Compensation and Benefits
  • Pay Transparency
  • Global Opportunities

Learn More Here: https://www.dematic.com/en-us/about/careers/what-we-offer

Dematic provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.

This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.

The base pay range for this role is estimated to be $ $161,625 - $247,825 at the time of posting. Final compensation will be determined by various factors such as work location, education, experience, knowledge, and skills.

    Tasks and Qualifications: What You Will do in This Role:
    • Provide strategic and authoritatively informed cloud and operational security leadership to globally distributed product development, execution, sales, and support organizations across Dematic.
    • Design, lead, and optimize the Dematic product security operations center (PSOC), encompassing security operations technology and all security operations staff and third-party security operations services.
    • Oversee cloud security architecture and ensure alignment with enterprise security frameworks.
    • Collaborate with technology, product, legal, and compliance to define product security operations policies, standards, and best practices that align with industry standards while enabling the business.
    • Drive advancement of technical and operational capabilities necessary to implement a robust, highly automated product security strategy - one that is worthy of the trust placed in us by our customers and business partners.
    • Partner with third-party vendors, cloud service providers, and security solution providers to enhance security capabilities.
    • Continuous engagement with security industry, keeping abreast of emerging and imminent security threats as well as the optimal and most effective defensive strategies and techniques.
    • Provide guidance and leadership for all efforts to build highly efficient security methods and mechanisms into every aspect of the operating environments of Dematic products.
    • Define and lead product security incident response strategy, processes, and people.
    • Work closely with a team of security staff, in conjunction with product development, to ensure company products and services withstand all foreseen attacks.
    • Build and maintain high-trust, highly collaborative relationships with teams and individuals in product development, product management, corporate security and compliance, and across the organization in general.
    • Engage with product management, customer sales/support, and other functions as needed to further business development from a security perspective.
    • Potentially engage with customers directly as required by project leadership.
    • Internationally and domestically travel as required to meet business objectives, up to 20%.
    What We Are Looking For:
    • 12+ years hands-on experience working within and in support of modern software development/deployment environments, including at least 5 years in a security leadership role and at least 5 years in high availability, cloud-based operations.
    • Highly capable of effectively building, leading, teaching, mentoring, and inspiring a globally distributed team of diverse, extraordinarily skilled security engineers and analysts.
    • Extensive experience with and expert knowledge of GCP, Azure, and/or AWS security environments, including a very broad spectrum of the services offered and the characteristics of those services.
    • Expertise in public cloud security models, standard methodologies, and compliance frameworks/regulations.
    • High proficiency in current and emerging cloud security technologies and techniques such as CSPM, CWPP, CASB, CIEM, and CNAPP.
    • Expert understanding of the application of efficient zero trust security models to meet security and compliance requirements while providing the flexibility needed to enable the business to flourish.
    • Deep knowledge of cloud security operations principles, patterns, and techniques, along with the ability to apply this knowledge to analyze complex architectures and system behaviors to uncover significant threats and operational weaknesses.
    • Outstanding project management skills, with the ability to lead security initiatives across multiple teams.
    • High adaptability to rapidly evolving cybersecurity threats and cloud technology landscapes.
    • High proficiency in identity and access management technology, principles, and patterns, particularly from a security operations perspective.
    • High proficiency in container-based / Kubernetes deployments, serverless architectures, and DevSecOps continuous deployment principles, practices, and philosophy.
    • Extensive knowledge of SIEM, SOAR, threat intelligence platforms, and other emerging security operations infrastructure technologies, especially as applied to public cloud environments.
    • Deep knowledge of common networking technologies, protocols, and operating systems.
    • Working knowledge of cryptographic technology, methods, and protocols.
    • Working knowledge of digital forensics.
    • Proficiency in the methods, tools, and processes of offensive security.
    • Proven ability to successfully lead in the face of complex risk environments.
    • Strong ability to recognize the relative value of various contending risk mitigation strategies and make wise, business-conscious tradeoffs.
    • Highly flexible and comfortable making decisions in environments with various degrees of uncertainty.
    • Preference for and ability to thrive in highly collaborative work environments.
    • Passionate and quick learner.
    • Dedicated, highly motivated, enthusiastic and relentless pursuer of quality and successful outcomes that benefit the broader team, organization, and community.
    • Resilient and ever optimistic in the face of challenges and significant obstacles.
    • Open and direct communicator.
    • Outstanding written and spoken communication skills.
    • Strong ability to distill complex technical concepts and systems into clear and concise language that can be grasped by less technical and non-technical staff.
    • Proven ability to present persuasive arguments and complex information before technical and non-technical leadership, including executive leadership.
    • Experience giving industry conference presentations a significant plus.
    • Bachelor's degree in computer science or other STEM field is desired, however, equivalent experience may be substituted.
    • Industry recognized and highly respected technical security certifications (such as GIAC certifications or Offensive Security certifications) are highly desirable.
    • Public cloud certifications highly desirable.

    #LI-DP1

    Applied = 0

    (web-7d594f9859-2nzb9)