At a Glance
- Tasks: Lead and own information security, managing vulnerability, compliance, and incident response.
- Company: Join Reach, a disruptive force in global ecommerce with innovative currency exchange solutions.
- Benefits: Enjoy competitive pay, flexible remote work, and comprehensive benefits.
- Other info: Be part of a dynamic team in a fast-growing company with exciting career opportunities.
- Why this job: Make a direct impact on a global commerce platform while building your own security function.
- Qualifications: 8+ years in information security with leadership experience and strong technical skills.
The predicted salary is between 80000 - 100000 ÂŁ per year.
About Reach
At Reach, we believe that the global ecommerce space is ripe for disruption. Our strategic partnerships with currency exchange providers allow us to offer direct and guaranteed, real‑time currency exchange rates. We help retailers grow by understanding global consumers and how changes in their shopping experience affect their business.
Role Overview
We’re looking for a Head of Security to own and lead information security at Reach. This is a hands‑on leadership role: you will set the strategy, own the program end‑to‑end, and stay actively in the work alongside your team. In a given week you might be writing a policy, triaging a pen‑test finding, running a phishing campaign, responding to a customer security questionnaire, and presenting the quarterly security update to leadership. The right person is energized by owning an entire domain end‑to‑end, is comfortable moving between strategy and execution, and is equally credible with a senior engineer and a SOC 2 auditor. You believe security is most effective when it is practical, measurable, and built into how the business operates.
Key Responsibilities
- Vulnerability management and offensive testing: Own the vulnerability lifecycle end‑to‑end — intake, triage, prioritization, risk acceptance, ticketing to dev teams, and remediation within SLA — and manage external pen tests and targeted assessments. Report regularly on status, SLA performance, and trends.
- Security operations and incident response: Manage our MSSP partner for 24/7 SIEM and SOC monitoring; ensure telemetry, detections, and playbooks match our threat model. Serve as incident commander for real events, and run regular tabletops and post‑incident reviews.
- Policy, controls, and risk: Define and maintain Reach’s security policies and control framework. Design, implement, and measure the effectiveness of controls; maintain a risk register; and surface material risk decisions to leadership.
- Compliance and audits: Own SOC 2 Type II and PCI DSS end‑to‑end with continuous control monitoring and evidence collection between audits. Serve as the primary contact for external auditors.
- Application and cloud security: Partner with engineering on secure SDLC, threat modeling for new products and features, SAST/DAST/SCA coverage, and cloud security posture (IAM, configuration, workload protection).
- Identity and access management: Own IAM policy, periodic access reviews, privileged access, and joiner/mover/leaver processes, in partnership with IT and People.
- Third‑party and customer security: Run Reach’s vendor risk program (due diligence, questionnaires, DPAs, ongoing monitoring) and own responses to customer and prospect security reviews.
- Security awareness and training: Run phishing simulations, ongoing and role‑targeted training, and regular company‑wide sessions on new threats and best practices.
- Executive reporting: Provide regular security posture updates with meaningful metrics (MTTD/MTTR, patch latency, control coverage, phishing outcomes, audit readiness).
- People, budget, and tooling: Act as a mentor for your report; own the security budget and tool stack — evaluating, procuring, rationalizing, and retiring tools as the program matures.
Qualifications
- 8+ years in information security, with 3+ years leading a security program or a major security function.
- Direct experience owning SOC 2 Type II audits end‑to‑end; PCI DSS experience strongly preferred.
- Proven, hands‑on ownership of vulnerability management programs at scale.
- Experience managing an MSSP/MDR relationship for SIEM and 24/7 SOC.
- Strong application and cloud security fundamentals, with hands‑on experience in AWS, GCP, or Azure, and the ability to partner credibly with engineering.
- Experience leading incident response end‑to‑end, including cross‑functional coordination and working with external parties.
- Experience writing and operationalizing security policies against recognized frameworks (NIST CSF, ISO 27001, CIS Controls).
- Excellent written and verbal communication — credible with engineers, executives, auditors, and customers.
- Comfortable as a player‑coach in a lean environment, with a strong sense of ownership and bias for action.
Additional Assets
- Experience in fintech, payments, or ecommerce — ideally cross‑border or merchant‑of‑record.
- Prior experience standing up or scaling a security program at a growth‑stage company.
- Familiarity with GRC/continuous compliance platforms (e.g., Vanta, Drata, Secureframe).
- AWS experience (our primary cloud) and Atlassian suite (Jira, Confluence) for workflow and documentation.
- Formal people‑management experience.
- Relevant certifications (e.g., CISSP, CISM, CCSP).
Why Join Reach
- Competitive compensation
- Flexible remote work
- Comprehensive benefits
- Opportunity to build and own a security function
- Direct impact on a global commerce platform
Head of Security employer: Reach
Contact Detail:
Reach Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Head of Security
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend security meetups, and connect with people on LinkedIn. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a portfolio that highlights your past projects, especially those related to vulnerability management and incident response. This will give potential employers a taste of what you can bring to the table.
✨Tip Number 3
Prepare for interviews by brushing up on your knowledge of SOC 2 Type II and PCI DSS. Be ready to discuss how you've handled security policies and risk management in previous roles. Confidence is key!
✨Tip Number 4
Don't forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, it shows you're genuinely interested in joining our team at Reach.
We think you need these skills to ace Head of Security
Some tips for your application 🫡
Tailor Your Application: Make sure to customise your CV and cover letter to highlight your experience in information security, especially around SOC 2 Type II audits and vulnerability management. We want to see how your skills align with our needs at Reach!
Show Your Hands-On Experience: In your application, emphasise your hands-on leadership style and any direct experiences you've had managing security programs. We love candidates who can demonstrate their practical approach to security, so don’t hold back!
Be Clear and Concise: When writing your application, keep it clear and to the point. Use straightforward language to describe your achievements and responsibilities. We appreciate a well-structured application that’s easy to read!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team at Reach!
How to prepare for a job interview at Reach
✨Know Your Stuff
Make sure you brush up on your information security knowledge, especially around SOC 2 Type II and PCI DSS. Be ready to discuss your hands-on experience with vulnerability management and incident response, as these are key areas for the role.
✨Show Your Leadership Skills
This role is all about leading a team and owning the security program. Prepare examples of how you've successfully led security initiatives in the past, and be ready to talk about your approach to mentoring and managing a team.
✨Be Practical and Measurable
Reach values practical security measures that integrate into business operations. Think about how you've implemented effective controls and policies in previous roles, and be prepared to share metrics that demonstrate their success.
✨Engage with the Interviewers
Don’t just answer questions; engage with your interviewers. Ask insightful questions about their current security challenges and how they measure success. This shows your genuine interest in the role and helps you assess if it's the right fit for you.