Role Summary
This is a senior leadership opportunity to build and lead a centralized Information Technology function within a rapidly scaling SaaS organization. The role will serve as the first executive owner of internal IT, responsible for the technology ecosystem employees rely on every day—collaboration tools, end?user devices, identity and access management, endpoint security, IT operations, and the security posture of corporate SaaS applications. This leader will also own the organization’s IT compliance program, including external security audits such as PCI DSS.
This is a foundational role. Historically, IT responsibilities have been distributed across other teams. As the organization grows, this position will establish a dedicated IT function, define standards, and scale systems and processes to support expansion. The role reports to the CTO and partners closely with Engineering, Cloud Operations, HR, Finance, and Legal.
Some systems are already in place and functioning well; others require maturation to support growth, acquisitions, and increased compliance requirements. This role owns strategy, vendor selection, and execution across those areas.
The ideal candidate brings a strong technical foundation and sound engineering judgment. Success in this role requires more than vendor management—it calls for hands?on understanding of systems, thoughtful architectural decisions, and pragmatic problem solving.
Key Responsibilities
1. Identity & Access Management
- Own the enterprise identity platform, including directory services, single sign?on, and multi?factor authentication
- Design and enforce joiner/mover/leaver automation across corporate and production?adjacent systems
- Conduct regular access reviews and certify user entitlements across SaaS platforms and infrastructure
- Define and maintain role?based access control (RBAC) standards for internal systems
- Partner with Cloud Operations to align access policies that span internal and production environments
2. Endpoint Security & Device Management
- Define and enforce endpoint security standards for both company?issued and BYOD devices
- Deploy and manage MDM/UEM and endpoint detection and response (EDR) tooling
- Own device provisioning and deprovisioning, including large?scale onboarding related to acquisitions
- Maintain workstation hardening standards and ensure patching and update compliance
- Manage encryption, remote wipe capabilities, and comprehensive asset inventory
3. Corporate SaaS & Productivity Platforms
- Own administration of collaboration and productivity platforms
- Manage the SaaS application portfolio, including procurement, licensing, renewals, and cost optimization
- Partner with business system owners (e.g., HR, Finance, Sales) while retaining responsibility for security and access controls
- Evaluate, approve, and onboard new SaaS tools with appropriate security and compliance review
- Maintain a complete SaaS vendor inventory and oversee vendor risk assessments
4. Compliance Program Management
- Serve as the owner of the IT compliance program, including PCI DSS and potential future SOC 2 audits
- Author and maintain information security policies, standards, and procedures
- Build and manage audit evidence collection processes across IT and Cloud Operations
- Manage auditor relationships, timelines, remediation efforts, and gap closure
- Implement and operate a GRC platform to automate control monitoring and evidence tracking
- Own organization?wide security awareness training
- Lead vendor risk management and third?party security assessments
5. IT Operations & End?User Support
- Build and manage the IT help desk function to support a growing employee base
- Own IT onboarding and offboarding workflows integrated with HR processes
- Manage office network infrastructure, audiovisual systems, and meeting room technology where applicable
- Develop self?service documentation and maintain an internal IT knowledge base
6. M&A Technology Integration
- Lead IT workstreams for mergers and acquisitions
- Assess acquired environments, identify risks, and drive remediation to internal standards