Building a Security Program from Zero: First 90 Days as a Solo Security Hire
Photo by Jakub Ε»erdzicki on Unsplash
The Reality Nobody Warns You About
Being the first security hire is not the same as joining a security team. There's no playbook, no inherited processes, no second opinion down the hall. You're simultaneously the CISO, the analyst, the architect, and the awareness trainer. Everyone expects results, but nobody can tell you exactly what those results should look like.
The biggest trap? Trying to do everything at once. You'll burn out inside six weeks and have nothing to show for it. Instead, structure your first 90 days around three phases: listen, prioritize, deliver.
Days 1β30: Listen and Map
Your first month is about understanding the business, not fixing it. Resist every urge to deploy tools or write policies.
Have Five Conversations
Meet with these people and ask open-ended questions:
- CEO / Founder β What's the business strategy for the next 12 months? Where does security fit in their mental model? What triggered hiring you?
- CTO / VP Engineering β What does the tech stack look like? Where are they most worried? What security-adjacent things have they already done?
- Head of Sales / Customer Success β What security questions are prospects asking? Have you lost deals over security concerns?
- Finance / Legal β What contracts contain security clauses? Are there insurance requirements? Regulatory obligations?
- IT / DevOps Lead β Who has admin access to what? How are credentials managed? What monitoring exists today?
Write everything down. These conversations tell you what the organization values, what's keeping people up at night, and where the political landmines are buried.
Build Your Asset Map
You don't need a fancy CMDB. Open a spreadsheet and document:
- Every SaaS product in use (check SSO logs, expense reports, and browser bookmarks)
- Every cloud account (AWS, GCP, Azure β you'd be surprised how many exist)
- Where customer data lives and flows
- Who has admin access to critical systems
- What authentication mechanisms exist (or don't)
This inventory becomes the foundation for everything that follows.
Days 31β60: Prioritize Ruthlessly
You now have context. Time to decide what matters most.
Create a Simple Risk Register
Three columns: what could go wrong, how likely it is, how bad it would be. Don't overthink the methodology β a simple High/Medium/Low scale works fine at this stage.
Common findings for organizations that have never had a security hire:
- No MFA on critical accounts
- Shared credentials for production systems
- No incident response plan
- Former employee accounts still active
- No data backup verification
- Customer data in unexpected places (developer laptops, Slack channels, shared drives)
Pick Three Quick Wins
From your risk register, identify three items that are high-impact and low-effort. These are your credibility builders. Common choices:
- Enable MFA on all admin accounts β Immediate risk reduction, visible to leadership
- Offboard former employees properly β Usually a few hours of access revocation, enormous risk reduction
- Set up basic alerting β Failed login attempts, new admin accounts, changes to critical configs
Execute these in weeks 5β8. Document the before and after. Share the results with leadership. You're building a track record of delivering measurable improvements.
Days 61β90: Build the Foundation
Now you've earned some trust. Use it to establish the structures that will scale.
Write Three Policies (Not Thirty)
Start with:
- Information Security Policy β Two pages, plain language. Defines scope, responsibilities, and core principles. This is your mandate.
- Acceptable Use Policy β What employees can and can't do with company resources. Keep it short enough that people actually read it.
- Incident Response Plan β Who to call, what to do, how to communicate. Even a basic one-pager saves hours of chaos during a real incident.
Every additional policy can wait. Three solid, enforced policies beat thirty that nobody reads.
Propose Your Roadmap
By Day 90, present a 12-month security roadmap to leadership. Include:
- What you found (sanitized risk summary)
- What you fixed (quick wins with metrics)
- What's next (prioritized by risk, not by what's trendy)
- What you need (budget, tools, headcount β be specific)
The roadmap is a contract with the business. It sets expectations and gives you a framework for saying no to reactive requests that don't align with priorities.
Mistakes That Sink Solo Security Hires
Starting with a framework. ISO 27001, SOC 2, NIST CSF β these are useful tools but terrible starting points. They'll consume months of effort on documentation that doesn't reduce risk. Start with actual risks, then map to frameworks when compliance becomes a business requirement.
Buying tools before understanding problems. That SIEM won't help if you don't know what to monitor. That vulnerability scanner won't help if nobody owns remediation. Understand the problem first, then evaluate tools.
Working in isolation. Security that happens in a silo gets ignored. Attend engineering standups. Sit with customer success. Understand how the business actually works, not how org charts say it should work.
Trying to be the security police. You're one person. If your approach is enforcement-first, people will route around you. Be the person who makes secure choices easy, not the person who blocks everything.
Ignoring politics. Every organization has informal power structures. The CTO who doesn't believe in security, the VP who controls budget, the engineer whose opinion everyone trusts. Identify these people and bring them in early.
The 90-Day Gut Check
At the end of Day 90, you should be able to answer these questions:
- What are the top five risks to this organization?
- What have I measurably improved?
- Does leadership understand what security looks like here in 12 months?
- Do I have the support and resources to execute the roadmap?
If you can answer all four, you've succeeded. You haven't built a mature security program β that takes years. But you've built something harder to create: organizational trust in security as a function that delivers value.
That trust is the foundation everything else gets built on.