Responsibilities
- Security Operations (SecOps) Leadership
- SOC Management: Direct the 24/7 Security Operations Center (internal or MSSP/MDR), ensuring rapid detection and containment of threats.
- Incident Response: Serve as the primary commander during high-severity security incidents. Develop and maintain the Incident Response Plan (IRP) and conduct regular tabletop exercises.
- Tooling & Architecture: Oversee the deployment and optimization of security tooling, including SIEM, SOAR, EDR/XDR, and IDS/IPS systems.
- Automation: Drive the adoption of automation to reduce alert fatigue and decrease Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).
- Threat Intelligence & Hunting
- Intelligence Program: Build and mature a Cyber Threat Intelligence (CTI) program that aggregates strategic, operational, and tactical intelligence.
- Threat Hunting: Lead proactive threat hunting initiatives to identify indicators of compromise (IOCs) that evade automated detection tools.
- Adversary Analysis: Map threat actor TTPs (Tactics, Techniques, and Procedures) against the MITRE ATT&CK framework to identify gaps in coverage.
- Vulnerability Management: Collaborate with engineering teams to prioritize patching based on active threat intelligence rather than just CVSS scores.
- Key responsibilities include:
- Strategy & Leadership: Develop and execute the Cybersecurity Operations and Threat Intelligence strategy. Lead a team of security professionals and foster a security-aware culture.
- Cloud Native Defenses: Lead the monitoring and defense of our AWS environment. Oversee the configuration of AWS Security Hub, GuardDuty, Shield, and container security tools (EKS/K8s).
- SaMD Monitoring: Establish post-market surveillance and monitoring for our Software as a Medical Device (SaMD) platforms, ensuring alignment with FDA pre- and post-market cybersecurity guidance.
- Data Integrity: Implement specific monitoring controls to detect unauthorized changes to genomic datasets (integrity attacks) and analysis pipelines.
- Lab Ops Defense: Secure the "physical" edge. Monitor and protect Laboratory Information Management Systems (LIMS), DNA sequencers, and liquid handling robots.
- Network Segmentation: Ensure the segmentation between corporate IT, the Cloud Product environment, and the high-sensitivity Lab OT network signal are feeding into SoC.
- Legacy Device Management: Develop "compensating controls" and monitoring strategies for lab equipment that cannot be patched or runs on legacy OS.
- Bio-Espionage Focus: Develop a Threat Intelligence program specifically tuned to detect IP theft, industrial espionage, and state-sponsored threats targeting genomic data.
- Proactive Hunting: Lead threat hunts across petabytes of genomic data storage and compute environments to identify dormant threats or supply chain compromises.
- Vulnerability Prioritization: Contextualize vulnerabilities based on clinical risk. (e.g., “Does this vulnerability impact the accuracy of a patient report?”).
- Clinical Continuity: Design Incident Response (IR) plans that prioritize patient safety and lab uptime. Run tabletop exercises simulating ransomware in the lab or data corruption in the cloud.
- Forensics: Lead forensic investigations with a chain-of-custody approach suitable for regulatory reporting (HIPAA/GDPR) and potential legal action.
- Compliance & Governance: Ensure product adherence to relevant security regulations and industry standards. Stay updated on security trends and work with security, IT and legal teams.
- Incident Management: Work with the Incident Management team to integrate Lab, Software and Enterprise cyber threats into incident response procedures into enterprise Cyber Incident Response Plan (C-IRP).
- Reporting and Performance Monitoring: Define product security KPIs and present Cybersecurity operations and threat intelligence reports to senior management.
- Collaboration & Communication: Partner with various teams to integrate security into the cybersecurity operations and threat intelligence roadmap. Communicate security topics effectively and build relationships with internal and external partners.
- Collaboration with Stakeholders: Build strong relationships with IT, product, software, quality and security team, internal departments and external parties, and third-party vendors, to ensure effective governance and compliance practices.
- Continuous Improvement: Evaluate current product security processes, and identify opportunities for enhancements to improve efficiency and effectiveness.
- Strategic Execution & Business Impact
- Translate business objectives into technical strategies that reduce risk, align with regulations, and enable innovation.
- Build and evolve stakeholder and team relationships across business units and geographies, ensuring the delivery of tailored, high-value solutions.
- Serve as lead for key cybersecurity initiatives and milestones, while ensuring stakeholder preparedness and training for execution.
- Team Leadership & People Development
- Inspire and build inclusive, high-performing teams that thrive in fast-paced and ambiguous environments.
- Mentor future leaders, create growth pathways, and embed feedback-rich, talent-building practices.
- Promote a collaborative culture that empowers individuals and celebrates curiosity and impact.
- LEADership Attributes in Action
- This Director level role is expected to lead through the LEAD framework:
- L: Lead by Example - Model trust, consistency, and resilience. Navigate ambiguity and manage conflict constructively.
- E: Engage Others - Inspire mission alignment, communicate effectively across all levels, and develop talent through coaching and feedback.
- A: Achieve Results - Drive execution through accountability, collaboration, and a clear sense of ownership—even when facing setbacks.
- D: Develop the Business - Address complex problems with clarity and innovation. Balance the needs of patients, clients, and partners in every decision.
- GRAIL Core Values & Expected Behaviors
- This Director level leader must live GRAIL’s values in every engagement:
- Be Courageous - Challenge the status quo, step up to address difficult issues, and support others who do the same.
- Solve Problems Together - Collaborate across boundaries, bring in diverse skillsets, and work with rigor, speed, and a data-driven mindset.
- Think BIG! - Pursue ambitious goals with focused execution and bring in external perspectives to shape future solutions.
- Embrace Change - Navigate ambiguity, anticipate the future, and turn complexity into opportunity.
- Bring an Open Mind - Cultivate curiosity, listen actively to diverse voices, and challenge assumptions to unlock innovation.
Required Qualifications
- 12+ years in Information Security, with significant leadership experience in Biotech, Pharma, MedTech or Healthcare. We may also consider individuals with experience in innovative manufacturing backgrounds (like Tesla).
- Cloud Expertise: Deep operational experience with AWS (Amazon Web Services) security stacks and serverless/containerized architectures.
- Regulatory Knowledge: Strong familiarity with HIPAA, GDPR, FDA Cybersecurity Guidance for Medical Devices, and GxP (Good Practice) requirements.
- Hybrid Environments: Experience securing mixed environments containing both modern cloud tech and on-premise hardware/IoT (Lab equipment, manufacturing, or OT).
- SIEM/SOAR: Experience architecting detection logic in modern platforms (e.g., Splunk, Sumo Logic, Datadog Security, or AWS Lake Formation).
- Frameworks: Deep understanding of MITRE ATT&CK (specifically for Cloud and ICS/Medical) and NIST CSF.
- DevSecOps: Ability to integrate security operations into CI/CD pipelines to monitor infrastructure-as-code (IaC).
- Bachelor’s degree in Computer Science, Bioinformatics, or Cybersecurity or equivalent.
- Certifications: CISSP or CISM required. Specialized Certifications (Highly Preferred): AWS Certified Security – Specialty, HCISPP (Healthcare), or GICSP (Industrial Cyber Security).
- Strong communication and stakeholder management skills—from technical leads to C-suite executives
- Global perspective from working with international stakeholders or teams
Preferred Qualifications
- Experience leading cyber innovation initiatives across government and commercial sectors
- Skilled at building cross-functional alignment and translating technical risks into business implications
- Strong interpersonal, coaching, and influence skills
What We Offer
- What We Offer
- A leadership platform with the ability to shape cybersecurity strategy at scale
- Meaningful work in a company that values courage, impact, and inclusion
- Competitive compensation, executive bonus structure, and global exposure
Top Skills
What We Do
GRAIL is a healthcare company whose mission is to detect cancer early, when it can be cured. GRAIL is using the power of high-intensity sequencing, population-scale clinical studies, and state-of-the-art computer science and data science to enhance the scientific understanding of cancer biology, and to develop and commercialize pioneering products.
Why Work With Us
Everything we do is guided by our mission to detect cancer early, when it can be cured. It’s the reason we’re here, and it’s no small task. The right people make all the difference. That’s why we’re looking for those who strive to share their knowledge, contribute their skills, inspire each other and commit to something bigger than themselves.
Gallery
GRAIL Offices
Hybrid Workspace
Employees engage in a combination of remote and on-site work.
GRAIL has a variety of work types depending on the roles. Some roles are onsite like a lab role, some are fully remote like our Galleri Sales Consultant roles. Others are hybrid with 2-3 days onsite. Typically Tuesday and Thursday.












.png)