Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Head of Information Security image - Rise Careers
Job details

Head of Information Security

What We Do

Gecko Robotics is helping the world’s most important organizations ensure the availability, reliability, and sustainability of critical infrastructure. Gecko's complete and connected solutions combine wall-climbing robots, industry-leading sensors, and an AI-powered data platform to provide customers with a unique window into the current and future health of their physical assets. This enables real-time decision making to increase the efficiency and safety of operations, promote mission readiness, and protect the environment and civilization from the effects of infrastructure failure.

Role at a Glance 

As the Head of Information Security, you will be responsible for all of the strategic and operational decisions that impact the Information Security of the people, process,  Hardware and Software that powers Gecko. As the Head of InfoSec,  you will embed deeply with Information Technology, Software Platform and in the business to understand challenges and gaps in workflows, and ensure the security, stability, and scalability of Geckos infrastructure. The Head of InfoSec will also be a key driver of internal data and working with Gecko leadership to help maximize resources. Additionally, you are process minded but action oriented, and know how to walk the line of immediate fixes and scaling for the future. 

What you will do 

  • Identify and assess security risks, and develop strategies to mitigate them.

  • Conduct regular security audits and penetration testing to ensure the robustness of systems.

  • Manage the response to security incidents and coordinate recovery processes.

  • Create, update, and enforce security policies, standards, and guidelines.

  • Ensure compliance with industry standards and regulations such as ISO 27001, GDPR, etc.

  • Embed deeply with Business Stakeholders to define InfoSec Roadmap and OKRs.

  • Create processes and infrastructure to respond quickly and effectively to the evolving CyberSecurity needs of the business.

  • Build the Information Security team at Gecko, hiring, managing performance and promoting Information Security  team members.

  • Negotiate and manage relevant vendors as well as budgets to ensure optimal investments.

  • Provision and management of Gecko corporate devices.

  • Support of the technical operations and maintenance needs of remote offices.

  • Define and monitor security controls on Gecko infrastructure managed by IT.

Technologies We Use

We use a variety of technologies, but we primarily operate using Python, React, and Typescript with Google Cloud Platform (GCP) as our cloud provider. Workstations are Mac and Windows.  This is a non-exhaustive list and we are tech agnostic in our interview process, so we encourage you to apply regardless of your background.

About You

You are a forward-thinking information security professional with a strong technical background and a strategic mindset. Your experience and passion for cybersecurity are matched by your ability to lead and inspire teams in a collaborative environment. You thrive in dynamic, fast-paced settings and are excited by the opportunity to build and guide information security initiatives from the ground up in a small but growing company.

Required Skills

  • Deep understanding of security protocols, cryptography, authentication, authorization, and security frameworks

  • Experience establishing and maintaining Information Security compliance with a relevant framework (NIST, ISO27001, SOC…)

  • Associate or Bachelor's degree in Computer Science, Information Technology, System Administration, or a closely related field (or equivalent experience)

  • 5-7 years of Information Security  experience with advancing responsibilities

  • Outstanding oral and written communication skills

  • Operational and People  leadership experience, with proven experience managing people

  • 1-3 years of startup experience

  • 1-3 years of experience administering a rapidly scaling network infrastructure

  • Effective stakeholder management

  • Proven experience in a senior information security role, preferably within the technology or robotics industry.

  • Experience managing MSSP

Preferred Skills

  • Certifications such as CISSP, CISM, or equivalent

  • Familiarity with emerging Information Security Technologies and paradigms

Who We Are

At Gecko, our people are our greatest investment. In addition to competitive compensation packages, we offer company equity, 401(k) matching, gender-neutral parental leave, full medical, dental, and vision insurance, mental health and wellness support, ongoing professional development, family planning assistance, and flexible paid time off. 

Gecko values collaboration, innovation, and partnership, and we believe we do our best work when we're together in person. We’re an office-first culture but understand that sometimes you may need to work from home. Many people are in the office five days a week, others need a bit more flexibility. Ultimately, we care about the outcomes we achieve - and creating a culture of autonomy and trust that enables that impact.

Gecko is committed to creating a culture of inclusion and belonging, and we are proud to be an equal opportunity employer.  We believe it is our collective responsibility to uphold these values and encourage candidates from all backgrounds to join us in our mission to protect today’s infrastructure and give form to tomorrow’s. All qualified applicants will be treated with respect and receive equal consideration for employment without regard to race, color, creed, religion, sex, gender identity, sexual orientation, national origin, disability, uniform service, veteran status, age, or any other protected characteristic per federal, state, or local law. If you are passionate about what you do and want to use your talents to support our critical mission, we’d love to hear from you.

Gecko Robotics Glassdoor Company Review
3.6 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
Gecko Robotics DE&I Review
3.0 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star iconGlassdoor star icon
CEO of Gecko Robotics
Gecko Robotics CEO photo
Jake Loosararian
Approve of CEO

Average salary estimate

$140000 / YEARLY (est.)
min
max
$120000K
$160000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Head of Information Security, Gecko Robotics

Join Gecko Robotics as the Head of Information Security and make a significant impact on the sustainability and reliability of critical infrastructure! Based in the vibrant city of New York, you will be at the helm of all strategic and operational decisions affecting our information security landscape. In this hands-on role, you’ll identify and assess security risks while developing actionable strategies to mitigate them. Collaborating closely with our Information Technology and Software Platform teams, you’ll enforce security policies that are not just compliant with industry standards like ISO 27001 and GDPR, but also practical for our unique environment. You’ll conduct regular audits, manage incident responses, and build a robust Information Security team that embodies the innovative spirit of Gecko. With your strong technical background and leadership skills, you’ll help define our InfoSec roadmap and make the technology we use—primarily Python, React, Typescript, and Google Cloud Platform—more secure. We value an agile, collaborative culture where your input directly influences our future. If you’re looking to step into a forward-thinking role that balances immediate action with long-term vision, and you’re excited about protecting vital infrastructure, we’d love to have you on board!

Frequently Asked Questions (FAQs) for Head of Information Security Role at Gecko Robotics
What are the responsibilities of the Head of Information Security at Gecko Robotics?

As the Head of Information Security at Gecko Robotics, your primary responsibilities include identifying and assessing security risks, conducting regular audits, managing incident responses, and developing security policies. You will deeply collaborate with IT and software teams, ensuring the security, stability, and scalability of our infrastructure while aligning with industry standards.

Join Rise to see the full answer
What qualifications are needed for the Head of Information Security position at Gecko Robotics?

To qualify for the Head of Information Security position at Gecko Robotics, candidates should have a deep understanding of security protocols, a Bachelor's degree in a relevant field, and 5-7 years of relevant experience, ideally within technology or robotics. Certifications such as CISSP or CISM are also preferred.

Join Rise to see the full answer
How can I apply for the Head of Information Security role at Gecko Robotics?

Interested candidates can apply for the Head of Information Security role at Gecko Robotics by submitting their resume and cover letter through the company's careers page. Make sure to highlight your experience in information security and leadership skills.

Join Rise to see the full answer
What technologies will I use as the Head of Information Security at Gecko Robotics?

In the Head of Information Security role at Gecko Robotics, you'll primarily work with technologies such as Python, React, Typescript, and Google Cloud Platform (GCP). Familiarity with security frameworks and tools related to these technologies will be beneficial.

Join Rise to see the full answer
What does the culture at Gecko Robotics look like for the Head of Information Security?

The culture at Gecko Robotics emphasizes collaboration, innovation, and partnership. As the Head of Information Security, you will be part of an office-first environment that values flexibility in work arrangements, creating a culture of autonomy and trust. Inclusion and belonging are core to our values.

Join Rise to see the full answer
What is the career growth potential for the Head of Information Security at Gecko Robotics?

The career growth potential for the Head of Information Security at Gecko Robotics is significant. With opportunities to build and lead the information security team and shape strategic initiatives, successful candidates can develop into senior leadership roles within the organization as Gecko continues to expand.

Join Rise to see the full answer
What benefits does Gecko Robotics offer for the Head of Information Security role?

Gecko Robotics offers a comprehensive benefits package for the Head of Information Security role, including competitive compensation, equity options, 401(k) matching, and full medical, dental, and vision insurance. Additionally, there are resources for mental health, professional development, and flexible paid time off.

Join Rise to see the full answer
Common Interview Questions for Head of Information Security
What security frameworks are you familiar with that would apply to the Head of Information Security role at Gecko Robotics?

Be prepared to discuss various security frameworks like NIST, ISO 27001, and SOC compliance regulations. Explain how you have applied these frameworks in previous roles and how they could be aligned with Gecko Robotics' needs.

Join Rise to see the full answer
Can you provide an example of a security incident you managed and what was the outcome?

Share a specific incident where you took charge of the situation, outlining how you identified the problem, coordinated the response, and the lessons learned from that experience, emphasizing a focus on process improvement moving forward.

Join Rise to see the full answer
How do you prioritize cybersecurity initiatives in a fast-paced environment?

Discuss your approach to evaluating risk versus reward, how you engage with stakeholders to align on priorities, and examples of how you implement scalable solutions under tight deadlines while ensuring compliance and security.

Join Rise to see the full answer
What strategies do you implement for ongoing team training and development in cybersecurity?

Explain your philosophy on training and development, including regular workshops, certifications, and the importance of fostering a security-aware culture among employees. Provide insights on specific programs you’ve implemented in past roles if applicable.

Join Rise to see the full answer
How would you handle resistance from stakeholders when enforcing security policies?

Share an example of how you would diplomatically address concerns, focusing on communication, data-backed explanations of the importance of policies, and your strategies for ensuring stakeholder buy-in.

Join Rise to see the full answer
What methodologies do you use for conducting security audits?

Detail your approach for security audits—mentioning tools and techniques used for penetration testing, risk assessments, and the creation of action plans based on audit findings. Reference experiences where your audits led to significant improvements.

Join Rise to see the full answer
Describe your experience in building and managing an information security team.

Speak about your past experiences in recruiting, mentoring, and developing talent in information security, emphasizing your leadership style and how you foster an environment of collaboration and continuous improvement.

Join Rise to see the full answer
What is your experience with vendor management in the context of information security?

Share your experiences negotiating with vendors, managing relationships to ensure they meet service-level agreements, and how you balance the need for robust security with budget constraints and resource allocation.

Join Rise to see the full answer
How do you stay current with the latest cybersecurity trends and threats?

Convey your commitment to professional development, including conferences, webinars, and reading industry-relevant publications. Discuss how you integrate new learnings into your current security strategy.

Join Rise to see the full answer
What role does compliance play in your approach to information security?

Discuss the importance of compliance in not only protecting the organization but also in maintaining trust with stakeholders. Use examples to illustrate how you have ensured compliance in past roles.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 12 days ago
Dental Insurance
Vision Insurance
Paid Holidays
Photo of the Rise User
Dental Insurance
Vision Insurance
Paid Holidays
Photo of the Rise User
Posted 11 days ago
Photo of the Rise User
Posted 8 days ago
Dental Insurance
Vision Insurance
Performance Bonus
Paid Holidays
Photo of the Rise User
Posted 9 days ago
Photo of the Rise User
Global Healing Remote No location specified
Posted 4 days ago
Photo of the Rise User
Posted 4 days ago

We are an organization that believes in the safety and wellbeing of everyone; dangerous jobs don’t have to exist. We believe in the value of each life so much that we built a company dedicated to safety through robotics. Each year, tens of billio...

22 jobs
MATCH
VIEW MATCH
BENEFITS & PERKS
Dental Insurance
Vision Insurance
Paid Holidays
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, hybrid
DATE POSTED
November 27, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!