Hi, We're Centerfield!
Supercharged customer acquisition. Centerfield delivers outcome-based digital marketing solutions and personalized omnichannel experiences for the world’s leading brands. Powered by our proprietary Dugout platform, Centerfield acquires customers at scale for leading residential service, insurance, e-commerce, and B2B brands. Centerfield’s digital experiences and digital brands, such as Business.com and BroadbandNow.com, reach more than 150 million in-market shoppers annually. Centerfield is headquartered in Silicon Beach and is proud to be recognized by Built in LA as a Best Place to Work in Los Angeles.
The Opportunity...
The Vice President (VP) of Cybersecurity is a senior executive responsible for the overall strategy, leadership, and management of an organization’s cybersecurity program. This individual plays a pivotal role in safeguarding the enterprise’s digital assets, information, and reputation against a rapidly evolving threat landscape. The VP of Cybersecurity reports directly to the SVP of IT.
As organizations become increasingly reliant on digital technology and data, the importance of a dedicated executive overseeing cybersecurity operations cannot be overstated. The VP of Cybersecurity not only manages teams and technologies but also serves as a strategic advisor and partner to business leadership, ensuring that cybersecurity considerations are woven into the fabric of business planning and innovation.
The VP of Cyber Security collaborates closely with executive leadership, business unit heads, IT and technology teams, compliance and legal departments, and external stakeholders such as auditors, regulators, and partners. They may represent the organization at industry forums, regulatory meetings, and in discussions with law enforcement or government agencies regarding major security incidents.
How You'll Contribute...
Strategic Leadership: Develop and execute the organization’s cybersecurity strategy, aligning security initiatives with business objectives and regulatory requirements.
Risk Management: Identify, assess, and prioritize cyber risks to the organization. Lead efforts to mitigate risks through technology, policy, and process improvements.
Policy Development: Oversee the creation, maintenance, and enforcement of information security policies, standards, and guidelines.
Security Operations: Direct the operation and continuous improvement of 24/7 security monitoring, incident response, vulnerability management, and threat intelligence functions.
Governance, Risk, and Compliance (GRC): Ensure compliance with relevant laws, regulations, and frameworks (e.g., GDPR, HIPAA, PCI DSS, NIST). Lead internal and external audit activities related to cybersecurity.
Team Leadership and Development: Build, lead, and mentor a high-performing cybersecurity team, establishing a culture of accountability, innovation, and continuous learning.
Incident Response and Crisis Management: Oversee the preparation and execution of incident response plans. Lead the organization during major security incidents, coordinating with legal, communications, and executive stakeholders.
Stakeholder Engagement: Serve as a key advisor to executive leadership and the board on cybersecurity matters. Communicate complex security issues and strategies in clear, business-focused language.
Technology Evaluation and Implementation: Assess, select, and implement advanced security technologies and services to protect against emerging threats.
Vendor and Third-Party Risk Management: Oversee the assessment and management of security risks associated with third-party vendors, partners, and service providers.
Budget and Resource Management: Develop and manage the cybersecurity budget, ensuring effective allocation of resources to mitigate key risks.
Awareness and Training: Drive organization-wide cybersecurity education and awareness programs to foster a culture of security awareness and compliance.
Continuous Improvement: Stay abreast of the latest cyber threats, vulnerabilities, and industry trends. Continuously evaluate and evolve the cybersecurity program to address new challenges.
What We're Looking For...
Education: Bachelor’s degree in Computer Science, Information Technology, Cyber Security, or a related field required; Master’s degree or MBA preferred.
Professional Certifications: CISSP, CISM, CISA, CRISC, or other relevant certifications are highly desirable.
Experience: Minimum 10 years of progressive experience in cyber security or information security, with at least 5 years in a senior leadership role.
Technical Expertise: Deep knowledge of security technologies (e.g., firewalls, SIEM, IAM, endpoint protection), cloud security, threat intelligence, and red/blue team operations.
Risk Management: Track record of developing and executing enterprise risk management strategies.
Compliance and Regulatory Knowledge: In-depth understanding of relevant regulatory frameworks and industry standards.
Communication Skills: Excellent verbal and written communication skills, with the ability to influence stakeholders at all levels of the organization.
Project and Change Management: Proven ability to lead complex initiatives and drive organizational change in a dynamic environment.
Business Acumen: Strong understanding of business operations and the ability to balance security risk with organizational goals and innovation.
Leadership: Demonstrated ability to inspire, develop, and lead high-performing teams.
Strategic Thinking: Ability to see the big picture and anticipate future trends and threats.
Problem Solving: Resourceful and creative approach to navigating complex security challenges.
Stakeholder Management: Adept at building trust and consensus among diverse groups.
Adaptability: Comfortable operating in a fast-paced, ever-changing environment.
Ethical Judgment: Commitment to the highest standards of integrity, confidentiality, and professional conduct.
Resilience: Ability to remain focused and effective under pressure, especially during crises.
Key Challenges and Opportunities...
Evolving Threat Landscape: Cyber threats are increasingly sophisticated, requiring continuous vigilance and innovation in defense strategies.
Regulatory Complexity: Navigating a patchwork of local, national, and international regulations requires expert knowledge and flexibility.
Digital Transformation: Enabling secure adoption of AI, cloud, IoT, and emerging technologies while protecting legacy systems.
Business Alignment: Ensuring security programs enable business growth and transformation rather than hindering them.
Outcomes and Metrics of Success...
Success in the VP of Cyber Security role is measured by the organization’s ability to anticipate, withstand, and recover from cyber threats while supporting business objectives. Key metrics may include:
Reduction in security incidents and breaches
Time to detect and respond to threats (mean time to detect/resolve)
Compliance audit outcomes
Employee awareness and engagement in security programs
Third-party risk scores and remediation rates
Alignment of security investments with risk priorities and business goals
Life at Centerfield...
Competitive salary + variable commission
Unlimited PTO – take a break when you need it!
Industry-leading medical, dental, and vision plans + generous parental leave
401(k) company match plan – fully vested on day 1
Outside patio overlooking Playa Vista + cabanas, firepits & working grills
Monthly happy hours, catered lunches + daily food trucks
Award-winning culture & unprecedented team spirit (featured in LA Business Journal & Built In LA)
Fully stocked kitchens with snacks & drinks
Breakroom supplied with games, couches, workout equipment + weekly in-office exercise classes hosted by professional instructors (yoga, kickboxing & circuit training)
Free onsite gym + locker rooms
Paid charity and volunteer days (local mentor programs, adopt a pet, beach cleanup, etc.)
Monthly team outings (ball games, casino night, hikes, etc.)
Career growth – we enjoy promoting from within!
#LI-CC1
#LI-Remote
To learn more, visit us Here.
Interviews will take place after resumes have been screened for minimum requirements. Please note that this position is not restricted solely to the responsibilities listed above and that the job scope and responsibilities are subject to change.
For more information about our collection, use, and disclosure of your personal information in connection with our evaluating your candidacy, please visit our Privacy Policy at https://www.centerfield.com/privacy-policy/.
Centerfield Media is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, age, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected under federal, state or local law.
Top Skills
Similar Jobs at Centerfield
What you need to know about the Colorado Tech Scene
Key Facts About Colorado Tech
- Number of Tech Workers: 260,000; 8.5% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Lockheed Martin, Century Link, Comcast, BAE Systems, Level 3
- Key Industries: Software, artificial intelligence, aerospace, e-commerce, fintech, healthtech
- Funding Landscape: $4.9 billion in VC funding in 2024 (Pitchbook)
- Notable Investors: Access Venture Partners, Ridgeline Ventures, Techstars, Blackhorn Ventures
- Research Centers and Universities: Colorado School of Mines, University of Colorado Boulder, University of Denver, Colorado State University, Mesa Laboratory, Space Science Institute, National Center for Atmospheric Research, National Renewable Energy Laboratory, Gottlieb Institute