Director of Cybersecurity

Virgin Hotels Central Services LLCMiami, FL
13d

About The Position

The Director of Cybersecurity oversees the secure implementation and maintenance for the Virgin Hotel Collection’s IT Cybersecurity needs, ensuring its reliability, performance, and compliance. This role involves managing assets, security protocols [https://www.google.com/search?rlz=1C1RXQR_enUS1152US1152&cs=0&sca_esv=8e3d2956bcc651bb&sxsrf=AE3TifPkZWXaXPAuZWCvi74OcL7MoSo9pA%3A1748890538441&q=security+protocols&sa=X&ved=2ahUKEwi9-Yb6tNONAxWJkO4BHS8YMaIQxccNegQIBBAB&mstk=AUtExfBv48ugmq0ptaSVBTsf43tILffDqeUQxpQ3MjrMk05mB16XZosYOexaoat5BUZjdcagAmVD0ztDnUh2_TriZrImtDW-citbkuVcA8OQuraO49WVkXs8ncOXvSxY-TXV5Hjj-9i8S-UeOUe0HOKbIky4EDtbUoUGKryZfX7QR9FrOU0&csui=3], and security operations needs while also ensuring compliance with relevant regulations and industry standards. This role will play an important part in guiding the deployment and oversight of security technologies for Virgin Hotels Collection. They will continue to work with and guide the business to ensure they remain compliant with industry standards, best practices, and security protocols as needed. This will be done by performing property visits, assisting with property budgets (P&L and Capital) and working with the home offices regarding new capabilities and security needs being introduced into the business.

Requirements

  • Current, legal and unrestricted ability to work in the USA.
  • Deep understanding of network security, cloud architecture (AWS/Azure/GCP), SIEM, EDR, and zero-trust models is a must.
  • 5–10 years of progressive technology experience, with at least 3 years in a leadership or management role required.
  • University degree in Information Technology or, an equivalent combination of education and experience sufficient to successfully perform the essential duties of the job is required.
  • Certifications: Industry-recognized credentials such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or CISA is preferred.
  • Ability to travel domestically and internationally.
  • Willingness to work evenings, weekends, and holidays, as needed.

Nice To Haves

  • Experience in Hospitality IT Operations, Infrastructure and Security is strongly preferred.
  • Knowledge of on-property hospitality technologies and how they interact with each other is preferred.
  • Knowledge of desktop computing environment in a hotel and/or resort is preferred.
  • Knowledge of hotel networking environment is preferred.

Responsibilities

  • Develop and execute multi-year cybersecurity strategies and roadmaps aligned with business objectives.
  • Manage, mentor, and maintain the security team including analysts, partners, and incident responders.
  • Lead major crisis management efforts, from investigating breaches to implementing long-term recovery solutions.
  • Ensure adherence to regulatory frameworks like PCI-DSS, ISO 27001, GDPR, HIPAA, and industry best practices.
  • Oversee vulnerability audits, penetration testing, and third-party risk assessments.
  • Prepare and manage the cybersecurity budget, justifying capital and operational expenses to executive leadership.
  • Manage security operations, including incident response [https://www.google.com/search?rlz=1C1RXQR_enUS1152US1152&cs=0&sca_esv=8e3d2956bcc651bb&sxsrf=AE3TifPkZWXaXPAuZWCvi74OcL7MoSo9pA%3A1748890538441&q=incident+response&sa=X&ved=2ahUKEwi9-Yb6tNONAxWJkO4BHS8YMaIQxccNegQIOBAB&mstk=AUtExfBv48ugmq0ptaSVBTsf43tILffDqeUQxpQ3MjrMk05mB16XZosYOexaoat5BUZjdcagAmVD0ztDnUh2_TriZrImtDW-citbkuVcA8OQuraO49WVkXs8ncOXvSxY-TXV5Hjj-9i8S-UeOUe0HOKbIky4EDtbUoUGKryZfX7QR9FrOU0&csui=3], vulnerability management [https://www.google.com/search?rlz=1C1RXQR_enUS1152US1152&cs=0&sca_esv=8e3d2956bcc651bb&sxsrf=AE3TifPkZWXaXPAuZWCvi74OcL7MoSo9pA%3A1748890538441&q=vulnerability+management&sa=X&ved=2ahUKEwi9-Yb6tNONAxWJkO4BHS8YMaIQxccNegQIOBAC&mstk=AUtExfBv48ugmq0ptaSVBTsf43tILffDqeUQxpQ3MjrMk05mB16XZosYOexaoat5BUZjdcagAmVD0ztDnUh2_TriZrImtDW-citbkuVcA8OQuraO49WVkXs8ncOXvSxY-TXV5Hjj-9i8S-UeOUe0HOKbIky4EDtbUoUGKryZfX7QR9FrOU0&csui=3], and threat detection [https://www.google.com/search?rlz=1C1RXQR_enUS1152US1152&cs=0&sca_esv=8e3d2956bcc651bb&sxsrf=AE3TifPkZWXaXPAuZWCvi74OcL7MoSo9pA%3A1748890538441&q=threat+detection&sa=X&ved=2ahUKEwi9-Yb6tNONAxWJkO4BHS8YMaIQxccNegQIOBAD&mstk=AUtExfBv48ugmq0ptaSVBTsf43tILffDqeUQxpQ3MjrMk05mB16XZosYOexaoat5BUZjdcagAmVD0ztDnUh2_TriZrImtDW-citbkuVcA8OQuraO49WVkXs8ncOXvSxY-TXV5Hjj-9i8S-UeOUe0HOKbIky4EDtbUoUGKryZfX7QR9FrOU0&csui=3].
  • Implement Operational policies [https://www.google.com/search?rlz=1C1RXQR_enUS1152US1152&cs=0&sca_esv=8e3d2956bcc651bb&sxsrf=AE3TifPkZWXaXPAuZWCvi74OcL7MoSo9pA%3A1748890538441&q=security+policies&sa=X&ved=2ahUKEwi9-Yb6tNONAxWJkO4BHS8YMaIQxccNegQILxAB&mstk=AUtExfBv48ugmq0ptaSVBTsf43tILffDqeUQxpQ3MjrMk05mB16XZosYOexaoat5BUZjdcagAmVD0ztDnUh2_TriZrImtDW-citbkuVcA8OQuraO49WVkXs8ncOXvSxY-TXV5Hjj-9i8S-UeOUe0HOKbIky4EDtbUoUGKryZfX7QR9FrOU0&csui=3] and procedures, ensuring they are aligned with industry best practices and regulatory requirements.
  • Manage relationships with IT Security vendors, ensuring they adhere to requirements and provide timely support.
  • Monitor the performance of IT infrastructure and security systems, identifying areas for optimization and improvement.
  • This role reports to the Vice President of Information Technology, Support and Infrastructure.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service