At a Glance
- Tasks: Lead security strategy, manage controls, and respond to incidents in a dynamic environment.
- Company: Join a forward-thinking company in a dog-friendly London office.
- Benefits: Competitive salary, inclusive culture, and opportunities for professional growth.
- Other info: Collaborative team environment with hands-on involvement from day one.
- Why this job: Make a real impact on security while working with cutting-edge technology.
- Qualifications: Experience in security leadership, incident response, and threat intelligence.
The predicted salary is between 80000 - 100000 ÂŁ per year.
About the role
You’ll handle executive‑level strategy, build and run security controls, protect the business, and be the go‑to person for security across engineering, executives, auditors, and customers. The role is based in our dog‑friendly office in London.
What you’ll own
- Security strategy and roadmap: Shape the security strategy together with the VP – translating executive direction into realistic, technical plans. Own the security roadmap, deciding what to build, retire, or defer and why. Make day‑to‑day investment decisions on tooling, headcount, external services, and automation within the agreed envelope. Translate the roadmap into clear, executive‑readable funding proposals.
- Controls and protections: Deploy and run security controls across endpoints, network, cloud, identity, and applications. Ensure controls are operational, not just installed, through continuous validation. Partner with Engineering and IT to integrate controls early in the development lifecycle.
- Penetration testing and vulnerability management: Run regular external penetration testing for applications and infrastructure, triaging and closing findings. Own the vulnerability management program, covering scanning, prioritisation, SLAs, and closure. Collaborate with the Head of Compliance on audit evidence, ensuring clean data on both ends.
- Incident response: Own the incident response process end‑to‑end: detection, triage, containment, eradication, recovery, and post‑incident review. Run the on‑call model, playbooks, tabletop exercises, and necessary tooling. Be the person on‑scene during real incidents and author thorough post‑mortems.
- Threat intelligence and threat modelling: Establish a threat intelligence capability that captures incidents, near‑misses, industry reports, and telemetry. Create a threat intelligence data warehouse that informs decisions on threat modelling, control design, roadmap prioritisation, and simulations. Run threat modelling routinely, including automated AI‑driven modelling against designs, code, and infrastructure changes.
- Emerging threats: Maintain a forward view on threat landscapes, especially LLM‑related risks such as prompt injection and AI‑augmented vulnerability scanning. Proactively prepare the organization for future threats beyond current incidents. Translate insights into concrete roadmap items rather than slide decks.
- Security training and awareness: Deliver security‑specific training: phishing simulations, secure coding, threat modelling, incident response tabletop participation, and role‑based learning for sensitive material handling. Partner with Compliance to align training cadence and evidence, ensuring relevance to evolving threats. Ensure training is impactful, not merely tick‑box.
- Automation and AI: Identify recurring manual tasks for automation: triage, alert enrichment, vulnerability prioritisation, evidence gathering, threat modelling, and incident response runbooks. Extend existing tooling and fill gaps with scripts, workflows, or AI where appropriate. Use large language models responsibly for drafting, reviewing, analysing, and automating, while managing introduced risks. Treat the function’s operating model as a product, reducing manual rituals and enhancing coverage and speed.
- Security advisory: Serve as the go‑to for security questions across the business, including architecture reviews, vendor assessments, new product evaluations, acquisitions, and other risks. Provide engineers with clear, actionable guidance rather than policy references or ticket queues.
What we’re looking for
- Experience leading security in a regulated, payment‑centric, or healthcare environment.
- Hands‑on incident response experience with real incidents and authored post‑mortems.
- Deep understanding of modern attack surfaces across cloud, SaaS, identity, supply chain, and application.
- Experience building or significantly improving threat intelligence or threat modelling capabilities.
- Fluency with AI tools and a mindset that balances building automation against managing new risks.
- Comfort co‑owning strategy with a VP, challenging opinions, and aligning once a direction is set.
- Ability to engage effectively with engineers on technical depth and with executives on business framing.
- Bonus: experience in PCI environments, offensive security, or measurable reductions in manual security work through automation.
How you’ll work
You’ll lead a team from day one and work closely with the VP, Head of Compliance, IT, Engineering, Infrastructure, and Product on execution. Expect significant hands‑on involvement in tooling, incidents, and design reviews, not just management.
Inclusive workforce
We do not discriminate based on race, colour, religion, sex, sexual orientation, age, marital status, gender identity, national origin, disability, or any other legally protected characteristics in the location of application. All candidates will receive fair consideration for employment. We welcome accessibility requests for the interview process and beyond.
Head of Security employer: Fresha
Contact Detail:
Fresha Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Head of Security
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the security field. Attend meetups, conferences, or even online webinars. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! If you’ve got hands-on experience with incident response or threat modelling, make sure to highlight that in conversations. Share specific examples of how you’ve tackled challenges in previous roles – it’ll make you stand out!
✨Tip Number 3
Don’t just apply anywhere; apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in being part of our team.
✨Tip Number 4
Prepare for interviews by brushing up on your knowledge of emerging threats and AI tools. Be ready to discuss how you’d approach building a security strategy or handling an incident. Confidence and clarity will go a long way in making a great impression!
We think you need these skills to ace Head of Security
Some tips for your application 🫡
Tailor Your Application: Make sure to customise your CV and cover letter to highlight your experience in security, especially in regulated environments. We want to see how your skills align with our needs, so don’t hold back on showcasing your relevant achievements!
Showcase Your Strategy Skills: Since this role involves shaping security strategy, it’s crucial to demonstrate your strategic thinking. Share examples of how you've translated executive direction into actionable plans in your previous roles. We love seeing a clear thought process!
Be Specific About Your Experience: When detailing your past experiences, be specific about your hands-on incident response work and any post-mortems you've authored. We’re looking for concrete examples that show your ability to handle real incidents effectively.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it gives you a chance to explore more about our company culture!
How to prepare for a job interview at Fresha
✨Know Your Security Strategy
Before the interview, make sure you understand the company's security strategy and how it aligns with their business goals. Be ready to discuss how you would shape and implement a security roadmap that translates executive direction into actionable plans.
✨Showcase Your Hands-On Experience
Prepare to share specific examples of your hands-on incident response experience. Discuss real incidents you've managed, the post-mortems you've authored, and how you've improved security controls in previous roles. This will demonstrate your practical knowledge and leadership capabilities.
✨Engage with Technical Depth
Be prepared to dive deep into technical discussions with engineers while also being able to frame these conversations for executives. Practice explaining complex security concepts in simple terms, as this will show your ability to bridge the gap between technical and non-technical stakeholders.
✨Stay Ahead of Emerging Threats
Research current trends in security threats, especially those related to AI and cloud environments. Be ready to discuss how you would proactively prepare the organisation for future risks and translate insights into concrete actions rather than just theoretical discussions.