✦ Luna Orbit — Executive & General Management

Senior Director of IT and Security

at Security On-Demand

📍 Remote, US Remote Posted April 15, 2026
Type Full-Time
Experience executive
Exp. Years Not specified
Education Not specified
Category Executive & General Management

Senior Director of IT & Security responsible for modernizing enterprise IT, strengthening the security posture, and owning compliance and audit readiness. The role bridges technology operations with regulatory governance and board-level risk reporting.

  • Own and evolve the enterprise IT roadmap
  • Manage compliance programs (SOC 2, ISO 27001, CMMC contemplated) and audit readiness
  • Oversee IAM, endpoint security, data loss prevention, and vulnerability management
  • Lead enterprise risk assessments and third-party/vendor risk management
  • Report compliance and risk posture to executive leadership and the Board

Own enterprise IT strategy and infrastructure, including cloud infrastructure and end-user computing, while enforcing security-by-design across systems and procurement. Lead compliance programs (SOC 2, ISO 27001, CMMC contemplated) and manage IAM, endpoint security, data loss prevention, vulnerability management, and third-party/vendor risk programs.

The ideal candidate is an executive IT and security leader with ownership of enterprise IT strategy, compliance programs, and security posture. They have practical experience managing SOC 2 and ISO 27001, operating IAM, endpoint security, data loss prevention, and vulnerability management, and leading third-party/vendor risk and audit readiness.

own and evolve the enterprise IT roadmapstrengthen enterprise security postureown compliance programsmanage compliance programs including SOC 2 and ISO 27001oversee identity and access management (IAM)endpoint securitydata loss preventionand vulnerability management programslead enterprise risk assessments and third-party/vendor risk management programsmaintain the IT risk register and drive remediationtranslate complex regulatory requirements into actionable programs
CMMC (contemplated)
SOC 2ISO 27001CMMC
IT strategyenterprise IT roadmapcloud infrastructureend-user computingnetworkingvendor relationshipsSLAsdigital transformationuser provisioningde-provisioningusage managementrenewal strategycost optimizationSaaS licensingM&A integrationcompliance programsSOC 2ISO 27001CMMCaudit readinessenterprise policiesidentity and access management (IAM)endpoint securitydata loss preventionvulnerability managementsecurity by designenterprise risk assessmentsthird-party/vendor risk managementIT risk registerexecutive leadership reportingBoard reporting
IT strategyenterprise IT roadmapcloud infrastructureend-user computingnetworkingtoolingvendor managementservice level agreements (SLAs)IT systems ownershipuser provisioningde-provisioningusage managementrenewal strategycost optimizationSaaS licensing managementM&A integration (ITSecurityCompliance)SOC 2ISO 27001CMMCcompliance programsaudit readinessenterprise policiesidentity and access management (IAM)endpoint securitydata loss preventionvulnerability managementsecurity by designenterprise risk assessmentsthird-party/vendor risk managementIT risk registerexecutive leadership reportingBoard reportingcompliance and risk posture reporting
strategic leadershiphands-on leadershiprisk management translationtrusted advisor to executive leadershipcross-functional collaborationteam building and mentoringoperational excellence culturecontinuous improvementcommunication with auditors and regulatorsstakeholder management
Industry SaaS
Job Function Executive ownership of IT strategy, security posture, and compliance governance.
Role Subtype Director of IT
Tech Domains Cybersecurity, ITSM / ServiceNow
Senior Director of IT & SecurityIT Strategyenterprise IT roadmapcloud infrastructureend-user computingnetworkingvendor relationshipsSLAsdigital transformationuser provisioningde-provisioningusage managementrenewal strategycost optimizationSaaSlicensingM&A integrationCompliance & Regulatory GovernanceSOC 2ISO 27001CMMCaudit readinessexternal auditorsidentity and access management (IAM)endpoint securitydata loss preventionvulnerability managementsecurity by designenterprise risk assessmentsthird-party vendor risk managementIT risk registerexecutive leadershipBoard reportingthird-party/vendor risk management

Must be able to own and manage compliance programs including SOC 2 and ISO 27001, Must be able to oversee IAM, endpoint security, data loss prevention, and vulnerability management

Apply for this Position →

Get matched to jobs like this

Luna finds roles that fit your skills and career goals — no endless scrolling required.

Create a Free Profile