Logo
Rehlko

Vice President - IT, Cybersecurity, Risk

Rehlko, Milwaukee, Wisconsin, United States, 53244

Save Job

Vice President - IT, Cybersecurity, Risk

Join to apply for the

Vice President - IT, Cybersecurity, Risk

role at Rehlko. Job Requirements: Number of Openings: 1 Job Title: Vice President - IT, Cybersecurity, Risk and Compliance Occupational Category: Please choose the most appropriate choice based on the Job Title and Description. Location: Hybrid (2-3 days) in our Glendale, WI office. The Vice President, IT - Cybersecurity, Risk & Compliance is responsible for implementing and running the enterprise cybersecurity program. That will involve identifying, evaluating and reporting on some or all of legal and regulatory, IT, and cybersecurity risk to information assets, while supporting and advancing business objectives and the development of the organization’s cybersecurity strategy/program and investment plan aligned with the strategy, required capabilities and risk exposure and posture of the enterprise. This position requires a visionary leader with sound knowledge of business management and a working knowledge of cybersecurity technologies covering the corporate network as well as the broader digital ecosystem. This position is responsible for establishing and maintaining the company cybersecurity program to ensure that information assets and associated technology, applications, systems, infrastructure and processes are adequately protected in the digital ecosystem in which we operate. A key element of this role is working with executive management to determine acceptable levels of risk for the organization and will proactively work with business units and ecosystem partners to implement practices that meet agreed‑on policies and standards for cybersecurity. The leader should understand and articulate the impact of cybersecurity on (digital) business, and be able to communicate this to the board of directors and other senior stakeholders. This leader must be knowledgeable about both internal and external business environments, and ensure that information systems are maintained in a fully functional and secure mode and are compliant with legal, regulatory and contractual obligations. This role serves as the process owner of the appropriate second‑line assurance activities not only related to confidentiality, integrity and availability of information owned or processed by the business, but extend their expertise to aid the organization in meeting safety, privacy, reliability and resilience requirements. This leader understands that securing information assets and associated technology, applications, systems and processes in the wider ecosystem in which the organization operates is as important as protecting the organization’s core technology and resilience functions.

#J-18808-Ljbffr