VP, Chief Information Security Officer


On Site
Full Time


IT infrastructure
Information security
Information Technology
IT strategy
Strategic planning
Strategic leadership
Intellectual property
Business operations
Risk management
Incident management
Team leadership
Security awareness
Continuous improvement
IT management
Resource management
Computer science
ISO/IEC 27001:2005
Team management
Problem solving
Attention to detail
Regulatory Compliance
Cloud computing
Cyber security
National Institute of Standards and Technology
Analytical skill
Certified Ethical Hacker

Job Details

At Five Below our growth is a result of the people who embrace our purpose: We know life is way better when you are free to Let Go & Have Fun in an amazing experience, filled with unlimited possibilities, priced so low, you can always say yes to the newest, coolest stuff! Just ask any of our over 17,000 associates who work at Five Below and they'll tell you there's no other place like it. It all starts with our purpose and then, The Five Below Way, which is our values and behaviors that each and every associate believes in.

It's all about culture at Five Below, making this a place that can inspire you as much as you inspire us with big ideas, super energy, passion, and the ability to make the workplace a WOWplace!


The Vice President, Chief Information Security Officer (VP CISO) will be responsible for developing and implementing a comprehensive information security strategy to safeguard the company's digital assets, data, and operations. Partnering with other senior leaders across the company, you'll translate information technology capabilities into strategic business decisions. You'll build a strong long-term technology strategy that aligns with the company's strategic plan and influences the overall company direction.


Strategic Leadership

  • Develop, implement, and monitor a comprehensive enterprise information security and IT infrastructure management strategy.
  • Align security initiatives with enterprise business strategy and objectives.
  • Lead the development and execution of an enterprise-wide information security strategy and roadmap, ensuring the protection of information assets, intellectual property, and business operations.

Risk Management and Incident Response

  • Oversee the identification, assessment, and prioritization of risks across the organization, recommending appropriate mitigation and control strategies.

Policy and Compliance

  • Develop, implement, and maintain security policies, procedures, and standards to ensure compliance with applicable laws, regulations, and industry standards.
  • Ensure compliance with regulatory requirements related to information security and privacy, including but not limited to GDPR, CCPA, SOX, and HIPAA.
  • Liaise with legal and regulatory bodies as necessary.

Team Leadership and Development

  • Lead, mentor, and develop a high-performing Information Security and Infrastructure team.
  • Foster a culture of security awareness and continuous improvement within the IT and broader organization.
  • Oversee the recruitment, development, and retention of a talented security and infrastructure workforce.

Technology Management

  • Oversee the design, implementation, and management of secure IT infrastructure, including networks, servers, storage, and cloud environments.
  • Ensure the reliability, scalability, and security of the company's IT infrastructure.
  • Stay abreast of emerging security threats and technologies, ensuring the company's IT infrastructure is protected against current and future threats.

Budget and Resource Management

  • Develop and manage the Information Security and Infrastructure budgets, ensuring efficient allocation of resources.
  • Evaluate and procure security and infrastructure technologies and services, ensuring cost-effective solutions that meet the company's needs.

Communication and Reporting

  • Communicate security risks, incidents, and strategies to senior management, the board of directors, and other stakeholders as necessary.
  • Prepare and present regular reports on the status of information security and IT infrastructure initiatives, compliance, and risk management efforts.



  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Master's degree preferred.


  • Minimum of 10 years of experience in information security and IT infrastructure management.
  • Proven experience in a senior leadership role within a large, complex organization.
  • Experience in a publicly traded company and understanding of relevant regulatory environments.

Skills and Competencies

  • In-depth knowledge of information security frameworks, standards, and best practices (e.g., ISO 27001, NIST, CIS).
  • Strong understanding of IT infrastructure components and their security implications.
  • Excellent leadership and team management skills, with the ability to inspire and drive change.
  • Exceptional communication and interpersonal skills, with the ability to communicate complex security issues to non-technical stakeholders.
  • Strong analytical and problem-solving skills, with a strategic and detail-oriented mindset.


  • Relevant industry certifications such as CISSP, CISM, CISA, CEH, or equivalent.

Work Environment

  • This is a high-profile, high-responsibility role that requires the ability to manage multiple priorities and respond to rapidly changing security and infrastructure needs. The CISO will work closely with various departments and stakeholders across the organization, requiring strong collaboration and communication skills.

Five Below is an Equal Opportunity Employer

If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us!

Five Below is an Equal Opportunity Employer.

BE AWARE OF FRAUD! Please be aware of potentially fraudulent job postings or suspicious recruiter activity by persons that are posing as a Five Below recruiters. Please confirm that the person you are working with has an @ fivebelow.com email address. Additionally, Five Below does NOT request financial information or payments from candidates at any point during the hiring process. If you suspect fraudulent activity, please visit Five Below's Careers Site at to verify the posting.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.