Principal Security Risk & Posture Lead
Location
United States
Posted
10 days ago
Salary
Not specified
Job Description
Role Description
We are seeking a Principal Security Risk & Posture Lead to establish and maintain a defensible, evidence-based understanding of the organization’s current security posture across a complex, uneven, and rapidly evolving technology environment. This role is foundational to the cybersecurity operating model and exists to ensure leadership can make confident stop/go decisions based on reality, not assumption.
- Establish baseline security truth across identity, cloud, SaaS, network, and third-party domains.
Work Location: US Nationwide Work From Home/Remote
Main Responsibilities
- Maintain a living view of enterprise security posture
- Validate operational effectiveness of controls
- Identify material weaknesses and inconsistencies
- Support risk acceptance and exception decisions
- Provide clear executive posture narratives
Qualifications
- Bachelor’s degree (BS/BA) in Cybersecurity, Information Systems, Computer Science, Risk Management, or a related field is desired, or equivalent practical experience.
- 8–12+ years of progressive experience in cybersecurity risk, security assurance, security operations, audit, or control effectiveness roles within large, complex environments.
- Demonstrated experience operating at a senior or principal individual contributor level, with responsibility for enterprise‑wide risk visibility, posture assessment, or control validation across multiple technology domains.
- Direct experience translating technical and operational reality into executive‑level risk narratives, including support for risk acceptance, exception, and prioritization decisions.
- Hands‑on exposure to security control implementation, operations, or engineering sufficient to independently assess whether controls are working as intended, not merely whether they exist.
- Professional certifications such as CISSP, CISM, CRISC, or equivalent are preferred but not required.
Requirements
- Enterprise security posture assessment across identity, cloud, SaaS, network, and third‑party risk domains
- Control effectiveness validation (design vs. operating effectiveness)
- Evidence‑based risk analysis under incomplete or conflicting data
- Comfort operating without clean inventories, perfect telemetry, or mature processes
- Credibility with both executives and deeply technical practitioners
Compensation
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges: $145,000 - $220,000
Benefits
Forged Fiber offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing.
What to Expect Next
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements.
Forged Fiber 37 Services, LLC participates in E‑Verify and will provide the federal government with your Form I‑9 information to confirm that you are authorized to work in the United States. Employers can only use E‑Verify once you have accepted a job offer and completed the Form I‑9.
Equal Employment Opportunities
It is the policy of Forged Fiber to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital
Job Requirements
- Bachelor’s degree (BS/BA) in Cybersecurity, Information Systems, Computer Science, Risk Management, or a related field is desired, or equivalent practical experience.
- 8–12+ years of progressive experience in cybersecurity risk, security assurance, security operations, audit, or control effectiveness roles within large, complex environments.
- Demonstrated experience operating at a senior or principal individual contributor level, with responsibility for enterprise‑wide risk visibility, posture assessment, or control validation across multiple technology domains.
- Direct experience translating technical and operational reality into executive‑level risk narratives, including support for risk acceptance, exception, and prioritization decisions.
- Hands‑on exposure to security control implementation, operations, or engineering sufficient to independently assess whether controls are working as intended, not merely whether they exist.
- Professional certifications such as CISSP, CISM, CRISC, or equivalent are preferred but not required.
- Enterprise security posture assessment across identity, cloud, SaaS, network, and third‑party risk domains
- Control effectiveness validation (design vs. operating effectiveness)
- Evidence‑based risk analysis under incomplete or conflicting data
- Comfort operating without clean inventories, perfect telemetry, or mature processes
- Credibility with both executives and deeply technical practitioners
- Compensation
- This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
- Location Based Pay Ranges: $145,000 - $220,000
Benefits
- Forged Fiber offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing.
- What to Expect Next
- If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements.
- Forged Fiber 37 Services, LLC participates in E‑Verify and will provide the federal government with your Form I‑9 information to confirm that you are authorized to work in the United States. Employers can only use E‑Verify once you have accepted a job offer and completed the Form I‑9.
- Equal Employment Opportunities
- It is the policy of Forged Fiber to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital
Related Guides
Related Categories
Related Job Pages
More Security Operations Jobs
Security Operations Lead
Council on Legal Education Opportunity (CLEO)CLEO, Inc. was founded in 1968 to expand opportunities for minority and low-income students to attend #lawschool.
Security Operations Lead protecting cloud infrastructure at Cleo
The Security Operations Lead will be responsible for building, operating, and continuously improving security detection, response, and operational resilience capabilities across cloud infrastructure, SaaS platforms, and corporate environments. Key duties include owning the detection strategy, leading incident investigations, managing vulnerability exposure, and defining security operations KPIs.
Security Operations Lead
CleoJoin. Grow. Lead the Future of Supply Chain. At Cleo, we don’t just integrate supply chains—we orchestrate them. As the pioneer and global leader of the Supply Chain Orchestration software category, Cleo is helping thousands of companies around the globe drive transformation, deliver excellence, and shape the future of their global operations. Whether you're joining us from outside or growing within, Cleo is your platform to lead with purpose, innovate with impact, and thrive in a culture that champions your growth. Why Join Us? Strategic Influence: Be at the helm of global supply chain strategy, driving decisions that impact customers, partners, and communities worldwide. Innovation-Driven Culture: Work with the latest in AI, automation, and digital supply chain platforms to solve complex challenges. End-to-End Visibility: Lead across planning, sourcing, logistics, and fulfillment—connecting dots others can’t see. Sustainability at the Core: Help build ethical, transparent, and sustainable supply chains that make a difference. Why Grow with Us? Leadership Development: Access world-class programs, executive mentorship, and rotational opportunities to accelerate your career. Internal Mobility: We prioritize internal talent—your next big opportunity could be just one conversation away. Recognition & Impact: Your ideas matter. Your leadership is visible. Your success is celebrated. Inclusive Community: Thrive in a diverse, collaborative environment where every voice is heard and respected. Our Promise We are a top talent destination for supply chain leaders technology who want to make bold moves, solve real-world problems, and grow without limits. Whether you’re stepping into your first leadership role or scaling new heights, your journey starts here. Cleo … never stops
The Security Operations Lead will develop security detection strategies, oversee incident response, manage vulnerabilities, ensure cloud security, and mentor a team to enhance security operations.
Cybersecurity Incident Response Coordinator for Indian Health Service's EHR system