<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hiring on Matt Goodrich</title><link>https://mattgoodrich.com/tags/hiring/</link><description>Recent content in Hiring on Matt Goodrich</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Fri, 22 May 2026 11:28:29 -0700</lastBuildDate><atom:link href="https://mattgoodrich.com/tags/hiring/index.xml" rel="self" type="application/rss+xml"/><item><title>The First Security Hire Is a Unicorn Hire</title><link>https://mattgoodrich.com/posts/first-security-hire-unicorn-hire/</link><pubDate>Fri, 22 May 2026 11:28:29 -0700</pubDate><guid>https://mattgoodrich.com/posts/first-security-hire-unicorn-hire/</guid><description>&lt;img src="https://mattgoodrich.com/posts/first-security-hire-unicorn-hire/header.png" alt="Featured image of post The First Security Hire Is a Unicorn Hire" />&lt;p>&lt;strong>The first security hire at a company is asked to be seven specialists at once.&lt;/strong>&lt;/p>
&lt;p>Read the job description for a head of security role, especially at a company making its first dedicated security hire, and you&amp;rsquo;ll find a wish list that spans the entire field. Governance. Risk and compliance. Third-party risk management. Cloud security. Identity and access management. Product security. Security architecture. Each of those is a career. Each one has people who have spent fifteen years going deep on that single discipline and still feel like they&amp;rsquo;re learning. The req asks for one person who can do all of them well.&lt;/p>
&lt;p>The industry has a word for the person who can: a unicorn. It gets said half as a compliment and half as a quiet admission that the role, as written, might not be fillable. And once you&amp;rsquo;ve reached for that word, the honest question is the one the hiring side would rather not sit with. How many unicorns actually exist?&lt;/p>
&lt;h2 id="seven-jobs-one-headcount">Seven Jobs, One Headcount
&lt;/h2>&lt;p>When a company makes its first dedicated security hire, it isn&amp;rsquo;t hiring a specialist. It&amp;rsquo;s hiring a function. There is no team to absorb the parts of the job the new person isn&amp;rsquo;t strong at, because the new person &lt;em>is&lt;/em> the team. Whatever they can&amp;rsquo;t do well enough either doesn&amp;rsquo;t get done, or gets done badly by someone whose actual job is something else.&lt;/p>
&lt;p>That&amp;rsquo;s what makes the breadth real instead of aspirational. In a mature security org, the head of security sits above seven or eight specialist functions, and the depth lives in the people below them. As the first hire, there is no below. The governance program, the vendor reviews, the cloud posture, the identity model, the product security questions coming out of engineering, the architecture decisions getting made with or without them. All of it lands on one desk.&lt;/p>
&lt;p>And these aren&amp;rsquo;t variations on a single theme. Governance is mostly a writing-and-influence job. Cloud security is a hands-in-the-console job. Third-party risk management lives in process and negotiation. Product security is, genuinely, an engineering job. The skills don&amp;rsquo;t transfer cleanly between them. Being excellent at one tells you remarkably little about whether someone is even competent at the next.&lt;/p>
&lt;h2 id="the-job-doesnt-stay-inside-security">The Job Doesn&amp;rsquo;t Stay Inside Security
&lt;/h2>&lt;p>The seven domains, as broad as they are, are all still &lt;em>security&lt;/em>. The job doesn&amp;rsquo;t stay inside that boundary. At most companies, and especially at any company selling software to other businesses, the first security hire ends up spending real time in two places that appear on no security domain list: revenue and legal.&lt;/p>
&lt;p>Start with revenue. Modern enterprise deals have a security gate. Before a prospect signs, someone on their side wants to know how your company protects their data, and they want to hear it from a person who owns security, not from an account executive reading a script. So the first security hire becomes a part-time sales engineer. They join customer calls, walk prospects through the security posture, and answer the hard follow-up questions in a way that keeps the deal moving. When the deal reaches paper, they&amp;rsquo;re in the contract negotiation: the security exhibit, the data processing addendum, the breach-notification windows, the audit rights, the liability language tied to a security incident. The deal often cannot close until those terms are settled, which makes the head of security part of the sales team in a real and recurring way.&lt;/p>
&lt;p>Then there&amp;rsquo;s the questionnaire tax. Enterprise customers send security questionnaires, sometimes a standard one, often a bespoke spreadsheet three hundred rows long, and a wrong answer is both a lost deal and a misrepresentation risk. Someone has to own answering them accurately and consistently. That someone is usually the first security hire.&lt;/p>
&lt;p>And the job spills into legal. Privacy regimes like GDPR sit right next to security, share a lot of vocabulary, and almost always land on the security person&amp;rsquo;s desk at an early-stage company, because there is no dedicated privacy counsel yet. Privacy is a genuine discipline of its own, with its own lawyers at larger companies, and the first security hire inherits it anyway. They end up negotiating legal terms, interpreting regulatory obligations, and deciding which commitments the company can actually keep.&lt;/p>
&lt;p>None of this is what people picture when they picture a security leader. It&amp;rsquo;s also, at a B2B software company, frequently where the most calendar time goes. Anyone arriving from a large company, where a security sales-enablement team handled customer calls and a privacy office handled GDPR, is in for a surprise. As the first hire, all of it is theirs.&lt;/p>
&lt;h2 id="real-unicorns-are-rarer-than-the-req-assumes">Real Unicorns Are Rarer Than the Req Assumes
&lt;/h2>&lt;p>Run the math the hiring market tends to skip. Start with one domain, say identity and access management. The number of people with genuine operator depth in IAM, the kind earned by running a real program through a real migration, is already smaller than the LinkedIn population of &amp;ldquo;IAM experts&amp;rdquo; would suggest. Call it a meaningful but modest pool.&lt;/p>
&lt;p>Now require that same operator depth in a second domain. You haven&amp;rsquo;t halved the pool. You&amp;rsquo;ve taken the intersection of two already-small pools, and intersections are unforgiving. Require a third and the number gets small enough to feel personal. By the time the req asks for real depth across all seven, plus the revenue and legal work, you&amp;rsquo;re no longer describing a labor market. You&amp;rsquo;re describing a list of named people, short enough that a well-connected CISO could probably recite most of it.&lt;/p>
&lt;p>That&amp;rsquo;s the arithmetic underneath the word &amp;ldquo;unicorn.&amp;rdquo; It isn&amp;rsquo;t a flattering exaggeration. For the literal version of the role, operator depth everywhere, it&amp;rsquo;s roughly accurate, and the pool is close to empty.&lt;/p>
&lt;p>Which would make first-security-hire roles nearly impossible to fill, if the literal version were the real one. It isn&amp;rsquo;t. The real role is fillable. You just have to be honest about what it actually asks for.&lt;/p>
&lt;h2 id="nobody-has-operator-depth-in-everything">Nobody Has Operator Depth in Everything
&lt;/h2>&lt;p>Here&amp;rsquo;s what the unicorn framing gets wrong. It implies the rare person is rare because they personally mastered all seven domains. They didn&amp;rsquo;t. Nobody did. The day isn&amp;rsquo;t long enough, and neither is a career.&lt;/p>
&lt;p>What the strong ones actually carry is a blend of two different kinds of depth, and the difference is worth naming.&lt;/p>
&lt;p>&lt;strong>Operator depth&lt;/strong> is what you get from owning the thing. You ran the program. You carried the pager. You were accountable for the metric, you made the calls that went wrong, and you lived with what followed. Operator depth is expensive. It costs years, and you can only sit in one or two of those seats at a time.&lt;/p>
&lt;p>&lt;strong>Partner depth&lt;/strong> is what you get from working closely alongside the thing. You didn&amp;rsquo;t run the IAM program, but you sat next to the person who did for three years. You depended on their work, negotiated with them, and watched what broke and what their week actually looked like. You came away knowing the operating rhythm of that domain, its processes, its failure modes, and the jobs it&amp;rsquo;s really trying to do, without ever having owned it.&lt;/p>
&lt;p>The genuine &amp;ldquo;unicorn&amp;rdquo; is not someone with operator depth in seven domains. It&amp;rsquo;s someone with operator depth in two or three, and real partner depth across the rest. That person exists in far greater numbers than the mythical seven-domain operator. They&amp;rsquo;re still not common, but they&amp;rsquo;re findable. And, more usefully, they&amp;rsquo;re &lt;em>buildable&lt;/em>, which matters once we get to the path.&lt;/p>
&lt;p>The trap is mistaking partner depth for résumé tourism. Real partner depth shows up as specific knowledge of how a domain fails and what the failure costs. Résumé tourism shows up as vocabulary. The interview question that separates the two is never &amp;ldquo;have you done X.&amp;rdquo; It&amp;rsquo;s &amp;ldquo;tell me about a time X went wrong at the desk next to yours, and what it cost to fix.&amp;rdquo;&lt;/p>
&lt;h2 id="the-domain-you-cant-fake-depends-on-the-company">The Domain You Can&amp;rsquo;t Fake Depends on the Company
&lt;/h2>&lt;p>I don&amp;rsquo;t want to oversell partner depth. There&amp;rsquo;s a real failure mode where someone with partner depth in everything and operator depth in nothing starts making confident calls in a domain they only ever watched from one desk over. Partner depth is enough to &lt;em>understand&lt;/em> a domain. It is not always enough to &lt;em>run&lt;/em> one when the company&amp;rsquo;s risk is concentrated there.&lt;/p>
&lt;p>Which domain you genuinely cannot fake depends entirely on the company.&lt;/p>
&lt;p>At a software company, it&amp;rsquo;s product security and architecture. If the first security hire can&amp;rsquo;t read the code, can&amp;rsquo;t reason about how the product is actually built, and can&amp;rsquo;t sit in a design review and see the flaw forming, they&amp;rsquo;ll lose the engineering org inside a month. The credibility never recovers.&lt;/p>
&lt;p>At a company in a heavily regulated space (finance, healthcare, anything with an auditor on a recurring schedule), it&amp;rsquo;s governance and compliance. Partner depth there gets you someone who can talk fluently about frameworks. It does not get you someone who can survive an examination, scope an audit defensibly, or tell the CEO which regulatory commitment is about to turn into a problem. That seat needs operator depth, and partner depth quietly fails the day it&amp;rsquo;s tested.&lt;/p>
&lt;p>So the honest version of the unicorn question isn&amp;rsquo;t &amp;ldquo;can this person do all seven.&amp;rdquo; It&amp;rsquo;s &amp;ldquo;does this person have operator depth in the two or three domains where &lt;em>this&lt;/em> company&amp;rsquo;s risk actually lives, and credible partner depth across the rest.&amp;rdquo; The wish list reads the same on paper. The hire is a completely different person.&lt;/p>
&lt;p>This is also where first-hire searches quietly go wrong. The company writes the generic seven-domain req, interviews against all seven as if they were equal, and ends up optimizing for breadth of vocabulary instead of depth where it counts. The result is a hire who can speak to everything and is dangerous in the one place that actually mattered.&lt;/p>
&lt;h2 id="you-dont-have-to-hire-the-whole-unicorn">You Don&amp;rsquo;t Have to Hire the Whole Unicorn
&lt;/h2>&lt;p>There&amp;rsquo;s a move that the seven-domain req obscures. You don&amp;rsquo;t have to buy the entire unicorn as one full-time person, and at an early company you probably shouldn&amp;rsquo;t. Parts of this job can be rented, both before the first hire and after it.&lt;/p>
&lt;p>Before the hire, the vehicle is usually a virtual or fractional CISO, or a security consultancy on retainer. A vCISO can carry the function while the company is still too small, or too early, to justify a full-time security leader. They can stand up the first real controls, run the company through its first SOC 2, build the initial governance, and answer the opening wave of customer questionnaires. For a company before product-market fit, that is often exactly the right amount of security leadership: enough to not be reckless, not so much that you&amp;rsquo;ve spent a senior headcount before you have the surface area to use it.&lt;/p>
&lt;p>The outsourcing doesn&amp;rsquo;t stop once a head of security is hired. It changes shape. A good security leader keeps renting the work that is spiky, specialized, and infrequent. Penetration testing is the obvious one; you want independent testers, not your own staff grading their own homework. Audit and compliance readiness, specialized cloud reviews, and sometimes privacy counsel fall in the same bucket. The head of security becomes the orchestrator of a mix of in-house and outsourced capability, rather than the person personally doing all of it.&lt;/p>
&lt;p>The pros are real. Outsourcing buys depth you cannot hire: a vCISO firm has actual operators across several domains, and you rent their breadth for a fraction of the cost of assembling it yourself. It&amp;rsquo;s faster and cheaper than a full hire for a company that isn&amp;rsquo;t ready for one. And it de-risks the eventual hire, because a year of a fractional CISO teaches the company where its risk actually lives, which is the single hardest input to that &amp;ldquo;domain you can&amp;rsquo;t fake&amp;rdquo; calibration.&lt;/p>
&lt;p>The cons are just as real. A fractional person is not in the room. They miss the hallway context, the operating rhythm, the quiet signals that something is going wrong before it shows up in a metric. Partner depth across your specific company is precisely the thing they cannot accumulate at fractional time. Accountability is thinner, too: an outsourced CISO juggling eight clients is harder to hold than an employee, and the knowledge tends to walk out the door when the engagement ends. There&amp;rsquo;s also a slow failure mode where the vCISO becomes a permanent crutch, and the company defers the real hire well past the point it was needed, because someone is nominally &amp;ldquo;handling it.&amp;rdquo; And increasingly, enterprise customers and boards want a named, full-time, accountable security leader; a shared contractor starts to read as a gap during diligence.&lt;/p>
&lt;p>The timing question usually answers itself if you watch for two signals. The first is when security becomes a deal gate. Once revenue is waiting on security answers, you need real ownership, even if a vCISO is the bridge to a permanent hire. The second is the question test: when the board or a major customer asks who owns security here, and the honest answer is &amp;ldquo;a contractor we share with eight other companies,&amp;rdquo; it&amp;rsquo;s time to hire. After the hire, the rule inverts. Outsource the spikes, the pen tests and audits and one-off reviews, and keep in-house the work that has to be in the room, which is the architecture decisions, the partnership across teams, and incident command.&lt;/p>
&lt;h2 id="in-the-seat-hands-on-follows-the-risk">In the Seat, Hands-On Follows the Risk
&lt;/h2>&lt;p>Here&amp;rsquo;s the part that&amp;rsquo;s easy to get wrong in both directions. A head of security is hands-on. As the first hire especially, there is nobody else to be hands-on for them. They are writing the policy, configuring the identity provider, reviewing the risky pull request, and filling in the security questionnaire themselves. This is not a delegate-from-a-corner-office job. But no one can be hands-on everywhere at once, not across seven domains plus the revenue and legal work. So the defining act of the role isn&amp;rsquo;t doing the work or not doing it. It&amp;rsquo;s deciding, continuously, where to put their own hands.&lt;/p>
&lt;p>That decision runs on risk. Where the company&amp;rsquo;s risk is concentrated, the domain you can&amp;rsquo;t fake, that is where the head of security goes deep personally: in the design reviews, in the cloud console, in the incident channel. Where the risk is lower, or the work is steady-state, they set direction and let whoever owns the day-to-day run it. This is where the two kinds of depth earn their keep. The domains where you have operator depth are the ones you can drop into and be useful with your own hands. The domains where you have partner depth are the ones you can direct credibly without being the person typing. Both are real work.&lt;/p>
&lt;p>Partner depth is what makes that second category possible. Understanding the operating rhythm of identity, or third-party risk, or cloud, is what lets you run those domains when your hands are busy elsewhere. It&amp;rsquo;s so you can tell when something is going sideways before the metrics say so. It&amp;rsquo;s so you can ask the engineering team for something they can actually act on instead of something that merely sounds right. It&amp;rsquo;s so that when you sit across from a vendor, a regulator, or your own CFO, you don&amp;rsquo;t get walked.&lt;/p>
&lt;p>There&amp;rsquo;s an expectation here that shows up on no domain list. The first security hire is the single accountable name for security in front of the founders and the board. Every domain&amp;rsquo;s failure becomes their failure to explain. An identity misconfiguration, a vendor breach, a product vulnerability in the news: the room doesn&amp;rsquo;t care that no reasonable person is a true expert in all three. It wants one person who can speak to all of it credibly, own the response, and say what happens next. Partner depth is what makes that survivable. It&amp;rsquo;s the difference between explaining an incident you understand and reading a statement about one you don&amp;rsquo;t.&lt;/p>
&lt;p>Much of the job also lives at the seams between domains, where the identity model meets the product roadmap, where third-party risk meets procurement&amp;rsquo;s timeline, where compliance meets what engineering can realistically ship. Partner depth is what lets you stand in those seams and still know what you&amp;rsquo;re looking at.&lt;/p>
&lt;p>The role is also expected to outgrow itself. The first security hire is the person who eventually scopes the second hire, and the third, deciding which domain gets a dedicated owner first based on where the partner depth is thinnest and the risk is highest. Knowing the operating rhythm of a domain is what lets you hire well into it. You can&amp;rsquo;t write a good req, or evaluate a candidate, for a discipline you&amp;rsquo;ve only ever heard described.&lt;/p>
&lt;h2 id="becoming-one-is-a-lateral-move-not-a-climb">Becoming One Is a Lateral Move, Not a Climb
&lt;/h2>&lt;p>The standard security career ladder runs vertically inside a single domain: analyst, senior analyst, lead, manager, all of it in, say, GRC. That path produces deep operator depth in one domain and partner depth in almost nothing. It&amp;rsquo;s the wrong shape for this role, no matter how high you climb it.&lt;/p>
&lt;p>The path to a first-security-hire role is lateral. It&amp;rsquo;s a deliberate sequence of moves that trades some vertical depth for adjacency. You spend a few years owning a domain, earning your operator depth, and that part is non-negotiable. &lt;strong>You cannot skip having genuinely owned something.&lt;/strong> Then you move sideways into a role that sits next to a domain you don&amp;rsquo;t have yet, and then you do it again.&lt;/p>
&lt;p>A couple of patterns manufacture that adjacency faster than the org chart will. Consulting and advisory work is unusually good at it: you&amp;rsquo;re exposed to a dozen companies&amp;rsquo; identity programs, vendor processes, and architecture decisions in the time it would take to see one of each from the inside. Security architecture roles do something similar by design. They sit structurally at the seams, and they force you to build a working model of every domain you touch.&lt;/p>
&lt;p>The other lever is company size, used deliberately. At a 5,000-person company you&amp;rsquo;ll be a specialist whether you like it or not; the org is large enough to keep you in a lane. At a 200-person company you&amp;rsquo;ll be pulled into partner depth across half the field because there&amp;rsquo;s nobody else to do it. The breadth is a property of the environment, and the environment is something you get to choose.&lt;/p>
&lt;p>What doesn&amp;rsquo;t work is shortcutting the years with certifications or vocabulary. You cannot read your way to partner depth. It comes from time spent next to the work while something was going wrong, and there&amp;rsquo;s no version of the path that skips that.&lt;/p>
&lt;p>There&amp;rsquo;s one more honest thing to say about the path: it&amp;rsquo;s long. The shape I&amp;rsquo;ve described, operator depth in two or three domains and real partner depth across the rest, is usually fifteen to twenty years of deliberate moves. That&amp;rsquo;s not a discouragement so much as a calibration. If you&amp;rsquo;re five years into the field and a first-security-hire role is on the table, the most likely explanation is that the company has under-scoped the role and is about to learn something expensive. The timeline is part of the definition.&lt;/p>
&lt;h2 id="what-the-word-actually-means">What the Word Actually Means
&lt;/h2>&lt;p>I used to think the word &amp;ldquo;unicorn&amp;rdquo; did some quiet damage, and I would have retired it if I could. I&amp;rsquo;ve come around. The word is fine. Plenty of people, and I&amp;rsquo;ll include myself, wear it with some pride. The problem was never the word. It was the assumption underneath it: that a unicorn is a single uniform creature, and that any one of them would do.&lt;/p>
&lt;p>They wouldn&amp;rsquo;t. Every unicorn has a different set of powers. One has operator depth in product security and architecture and can see the flaw forming in any design review. Another came up through compliance and governance and can carry a company through a regulatory exam without flinching. A third has lived in identity and cloud. They are all unicorns. They are not the same unicorn, and they are not interchangeable.&lt;/p>
&lt;p>That is the part worth getting right. The person who can fill a first-security-hire role isn&amp;rsquo;t someone who did all seven jobs. It&amp;rsquo;s someone who did two or three of them for real, got close enough to the rest to know how they work and how they fail, and learned to operate in the seams between them. Which two or three is the whole question. A software company needs the unicorn whose powers run to product and architecture. A regulated company needs the one who can survive the exam. Hiring a unicorn is easy to feel good about. Hiring the unicorn whose powers match your risk is the part that actually matters.&lt;/p>
&lt;p>If you&amp;rsquo;re hiring one, calibrate the wish list to where your risk actually lives, interview hardest there, and rent the rest until you&amp;rsquo;re ready. If you&amp;rsquo;re trying to become one, stop climbing and start moving sideways. Notice which powers you&amp;rsquo;re collecting along the way, because those are what a company will eventually hire you for. The role rewards the shape of a career far more than the height of it.&lt;/p></description></item></channel></rss>