Deputy Chief Technology Officer

Apply by sending your resume to careers@mi-case.com.  Please note which position you are applying for in your email.

Apply Here

Deputy Chief Technology Officer

Company Background

Founded in 1992, Mi-Case is the industry leader in fully integrated offender management software solutions and provides industry expertise and consulting within Criminal Justice and Public Safety systems.

Mi-Case leverages a unique combination of technical, functional, and industry specialization, as well as partnerships with key software vendors, to deliver maximum value-add projects.

Position Summary

The Deputy Chief Technology Officer (Deputy CTO) for Infrastructure & Security Engineering is the CTO’s second-in-command. This executive role blends hands-on technical leadership with organizational stewardship across cloud infrastructure, advanced networking, and security engineering. The Deputy CTO ensures that all technology platforms—multi-account/multi-tenant cloud, networking interconnects, shared services, and security controls—are architected, operated, and evolved to meet the company’s performance, availability, security, compliance, and cost objectives. The role regularly represents the CTO in leadership forums, with customers, and during critical incidents. The role will require 3 days on site per week in our Desert Ridge office location.

Responsibilities

Leadership & Strategy

  • Act as the CTO’s primary delegate for decision-making, executive meetings, and customer-facing technology conversations.
  • Translate the technology vision and product roadmap into infrastructure, networking, and security strategies with measurable outcomes.
  • Establish and govern technical standards, reference architectures, and operational playbooks used across product teams.
  • Mentor and develop leaders in infrastructure, platform, networking, and security engineering.

Infrastructure & Networking

  • Own architecture and operations for cloud networking (e.g., AWS VPCs, Transit Gateway, multi-region design, route tables, NAT, security groups).
  • Design and manage hybrid connectivity (IPSec/IKEv2 VPNs, BGP, Direct Connect), DNS, load balancing (ALB/NLB), and global edge/CDN.
  • Lead network segmentation and isolation strategies for tenants/environments; enforce least-privilege network access.
  • Drive infrastructure automation and reproducibility using Infrastructure as Code (Terraform or equivalent), including environment provisioning.
  • Lead capacity planning, performance optimization, and reliability engineering for shared platforms and services.

Security Engineering

  • Architect and enforce network and platform security controls: Zero Trust, WAF, DDoS protections, IDS/IPS, secure TLS configurations, KMS/HSM key management.
  • Define hardening baselines for OS, containers, runtime, and network devices; ensure vulnerability management with SLAs.
  • Partner with the Security/GRC function to align engineering practices to frameworks such as CJIS, StateRAMP, FedRAMP, and SOC 2.
  • Direct incident response for network/infrastructure-impacting events; lead root cause analysis and corrective action plans.
  • Oversee identity-aware networking and federation integrations (e.g., SSO/MFA with Entra ID/Okta) across internal and customer-facing systems.

Operations & Reliability

  • Establish SRE-aligned practices for observability (metrics, logs, traces), SLOs/SLIs, alerting, and runbooks.
  • Ensure high availability, disaster recovery (RPO/RTO targets), and business continuity for critical services.
  • Standardize CI/CD for infrastructure and platform components; ensure secure, auditable change management.
  • Lead cross-functional readiness for peak events, cutovers, and large customer go-lives.

Cost & Vendor Management

  • Own infrastructure/network/security budgets; drive cost efficiency (rightsizing, reservations/savings plans, storage classes).
  • Manage strategic vendors and service providers; negotiate contracts and set performance expectations.

Compliance & Audit Partnership

  • Ensure engineering evidence is continuously captured for audits (design docs, change records, test artifacts, monitoring).
  • Support customer security reviews and due diligence; present architecture and controls with credibility.

People & Organization

  • Build a high-performing team culture grounded in accountability, learning, and operational excellence.
  • Define staffing plans, role expectations, and career paths for infrastructure, platform, networking, and security engineering.

Experience

  • 10+ years in progressive technology leadership roles, including 7+ years owning cloud infrastructure and networking at scale.
  • Proven ownership of complex cloud network architectures (multi-account, multi-VPC, multi-region) and hybrid connectivity.
  • Demonstrated success leading security engineering initiatives and incident response.

Technical Depth

  • Cloud & Networking: AWS (VPC, Transit Gateway, Route 53, CloudFront, ALB/NLB, PrivateLink); hybrid connectivity (IPSec/IKEv2, BGP, Direct Connect); routing, NAT, subnetting, IPv4/IPv6.
  • Edge & Security: Cloudflare/AWS WAF, DDoS protections, reverse proxying, TLS 1.2+ and modern cipher management, certificate automation/PKI.
  • Firewalls: Enterprise firewall design/operations (e.g., FortiGate, Palo Alto) and microsegmentation strategies.
  • Automation: Terraform (or equivalent IaC), Git-based workflows, policy-as-code/guardrails, secrets management.
  • Observability: SIEM/SOAR and logging platforms (e.g., Splunk, Sentinel, CloudWatch), APM/metrics tooling.
  • CI/CD & Platforms: TeamCity/Azure DevOps/GitHub Actions; container orchestration (ECS/EKS) and artifact management.
  • OS/DB/Scripting: Windows and Linux administration; Oracle/MSSQL/Postgres familiarity; scripting in PowerShell/Bash/Python.

Education & Certifications

  • Bachelor’s degree in CS, IS, or related field (Master’s preferred).
  • Preferred certifications: CISSP, CISM, CCSP; CCNP/Enterprise or equivalent; AWS Advanced Networking Specialty and/or AWS Security Specialty.

Core Competencies

  • Executive communication, customer credibility, and auditor-facing clarity.
  • High-judgment decision-making under pressure; bias for action with strong ownership.
  • Ability to operate from strategy to hands-on problem solving when required.

Success Metrics (Examples)

  • Platform uptime and SLO attainment across critical services.
  • MTTD/MTTR improvements for network/infrastructure incidents.
  • % Infrastructure managed as code and compliance drift rate.
  • Environment provisioning lead time and change failure rate (DORA metrics).
  • Cost per tenant/environment vs. plan; reservation/savings-plan coverage.
  • Audit readiness: evidence completeness and number of corrective actions.
  • Vulnerability remediation SLAs met for high/critical findings.

Reporting Structure

Reports directly to the Chief Technology Officer (CTO). Partners closely with Product, Engineering, Architecture, Program/PMO, and Security (GRC).

Compensation: $150,000 - $170,000 annual

Apply by sending your resume to careers@mi-case.com.  Please note which position you are applying for in your email.

Apply Here

Fill out the form below to apply for this position. We will reach out shortly.

Max file size 10MB.
Uploading...
fileuploaded.jpg
Upload failed. Max size for files is 10 MB.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.