Job Summary
We at Delta6Labs are seeking a Head of IT & Security to lead and integrate enterprise IT operations and cybersecurity for a high-growth, fast-paced, fintech / white-label product environment. This is a deep-technical leadership role, and a successful candidate must be able to lead from the front during major incidents, make sound engineering and risk decisions, and maintain strong operational control over both IT and Security.
The role will own secure and resilient service delivery across infrastructure, endpoints, cloud, identity, application security alignment, vendor management, and cyber defense. It must also unify priorities across SOC, VAPT, DevSecOps, GRC, IAM, and IT, consistent with the operating model, while ensuring patching, endpoint baselines, asset lifecycle, and service quality remain tightly aligned with security outcomes.
Key Responsibilities
- Own enterprise IT and cybersecurity strategy, operating model, roadmap, and execution.
- Lead security governance, risk prioritization, incident command, and executive reporting.
- Own end-to-end IT operations, service delivery, vendor performance, SLAs, asset lifecycle, endpoint standards, patching, and business availability.
- Align and coordinate priorities across SOC, GRC, IAM, VAPT, DevSecOps, and IT.
- Act as executive owner for major cyber incidents, crisis communications, and recovery decisions.
- Build and enforce secure operating standards across cloud, endpoint, identity, network, email, SaaS, and application delivery layers.
- Oversee MSSP/MDR relationships, escalation models, service quality, and operational accountability.
- Drive secure delivery practices across web, API, mobile, cloud, and white-label platform environments.
- Own budgeting, workforce planning, security tooling strategy, vendor rationalization, and cost optimization.
- Ensure audit readiness, control traceability, and effective collaboration with compliance, legal, engineering, operations, and leadership.
- Lead red-team, blue-team, and purple-team assessments, and informed improvement across prevention, detection, response, and resilience.
- Maintain strong business continuity, cyber recovery, and service continuity readiness.
Mandatory Skills
- The candidate must have deep expertise across all major enterprise cyber areas, including:
- Broad enterprise cybersecurity leadership, including security architecture, security operations, engineering, resilience, and enterprise risk.
- Governance, risk management, compliance, audit readiness, and control ownership.
- Cloud security, especially secure design, hardening, logging, monitoring, IAM patterns, and incident response in cloud environments.
- SOC / blue-team operations, including monitoring, detection, escalation, runbooks, metrics, MDR/MSSP oversight, and incident coordination.
- Incident response, including major incident command, crisis management, breach handling, stakeholder communication, and containment/recovery leadership.
- Digital forensics, including evidence handling, scoping, host/log review, and forensic decision-making.
- Offensive security, including penetration testing, adversary simulation, attack path thinking, and exploitability-based prioritization.
- Application security / secure SDLC, including web, API, mobile, authentication, secrets/key management, CI/CD, and release-risk oversight.
- Identity and access management, including SSO, MFA, PAM/JIT, access governance, privileged controls, and directory-integrated security.
- Red-team, blue-team, and purple-team experience.
- Fintech / payments / crypto / brokerage / high-availability platform experience.
- White-label or multi-tenant product security experience.
- Budgeting, service delivery, vendor management, and MSSP/MDR management.
- Hands-on experience with the CrowdStrike Falcon platform in an operational environment.
- Hands-on experience with Microsoft AD / Active Directory/ Entra ID/ Intune / Admin portals.
- Strong working knowledge of enterprise security tooling, operating systems, networks, endpoint security, cloud security, and security engineering.
Good to Have Skills
- Cloud-native and SaaS-heavy operating model experience.
- Experience with AWS, Cloudflare, FortiGate, Mimecast, Netskope, Vercel, and Sentry.
- Secure service delivery for web, mobile, API, and customer-facing platforms.
- Exposure to regulated or audit-heavy environments with board or regulator engagement.
- Experience leading security transformation from traditional enterprise security to fintech-/crypto-aware security operations.
Mandatory Certifications
At least one of the following is required:
Good to Have Certifications
- ISO/IEC 27001 certification or strong implementation/audit experience
- Security+
- AWS Certified Security – Specialty
- SC-200
- GCIH
- GCFA
- OSCP / OSCP+
- CSSLP
- SC-300
Required Relevant Work Experience
- 15-20+ years of overall experience across cybersecurity and enterprise IT
- Proven leadership experience running both operational IT and cybersecurity programs
- Strong hands-on experience in core cybersecurity, not just governance
- Experience leading major cyber incidents and recovery efforts
- Experience managing enterprise vendors, managed services, service delivery, and budgets
- Experience working with security architecture, engineering, operations, and risk functions together
- Experience building and leading high-performing cross-functional teams
- The ideal candidate is:
- Deeply technical and operationally credible
- Willing to support IT and Cyber-Security related incidents and tasks in a highly dynamic and fast-paced 24×7 environment
- Able to challenge engineers, vendors, and security teams with substance
- Comfortable leading during active incidents
- Equally strong in enterprise IT discipline and advanced cybersecurity judgment
- Capable of turning fragmented IT and security functions into one accountable operating model
- Able to balance resilience, speed, security, and business practicality without losing control of quality
Key Success Measures
- Stable, secure, and measurable IT and cybersecurity service delivery
- Stronger alignment between IT operations and security controls
- Faster, better-governed incident response and recovery
- Improved patching, endpoint baselines, and privileged access hygiene
- Better detection, testing, and remediation outcomes across cyber functions
- Improved audit readiness and risk governance
- Clear executive visibility into technology and cyber risk