VP Information Security
Listed on 2026-01-15
-
IT/Tech
Cybersecurity, Information Security
Title:
VP Information Security
Location:
Eagle,
You’ve probably enjoyed our fries without even knowing it! As a leading manufacturer in our industry, and public Fortune 500 company, we inspire and bring people together with foods they love and trust. Our customer base includes international food service providers, restaurants, and households in over 100 countries around the world.
Job Description SummaryThe VP Information Security at Lamb Weston serves as the primary point of contact for information security and is responsible for oversight of enterprise-wide IT Information Security vision, strategy, policy, operations, risk management, and business continuity. We are seeking individuals who have demonstrated success transforming, growing, and continuously improving the cyber security function within a diverse, decentralized model through expertise and influence.
The candidate should have experience working with and managing key vendor partners as part of an extended team. The ideal candidate should possess deep technical expertise with specific experience working with cybersecurity best practices and frameworks (ISO/IEC, 27001, NIST 800-53, SOX 404, COBIT) across multiple platforms. Experience working in a senior leadership security role for a publicly held company, creating and evolving an Information Security organization, and experience working for a global organization are required.
Breadth of experience in these areas, as well as strong leadership and influencing capabilities are required. Demonstrated experience leading teams in a dynamic environment while meeting customer requirements is necessary.
- Develop, implement, and maintain a comprehensive enterprise security strategy roadmap.
- Develop and mature the company’s information security program, ensuring compliance with relevant regulations and standard methodologies.
- Proactively monitor, evaluate, and implement standard methodologies related to enterprise information security practices. Provide internal guidance with respect to company response to emerging information security threats both internally and externally.
- Monitor the external threat environment for emerging threats and advise relevant business partners on the appropriate course of action that attains our goal of zero breaches.
- Collaborate with senior leaders and departments to assess risks, coordinate mitigation efforts, establish internal controls, respond to incidents, and manage shared concerns. Investigate security breaches, communicate to key business partners and executive leadership, and provide remediation and resolution.
- Serve as an expert advisor to executive leadership in the development, implementation, and maintenance of a strong information privacy and security program and infrastructure including network access and monitoring policies.
- Evaluate effectiveness of information security, privacy, and business continuity planning programs and procedures of third parties with whom the company engages as software, hardware, and/or service providers.
- Develop, maintain, and routinely exercise breach and ransomware approaches and processes.
- Identify and mitigate security events and incidents, compliance issues, operational inefficiencies, application vulnerabilities, network/infrastructure, and other vulnerabilities.
- Review and evaluate technology and incoming new vendors for future risks and opportunities to improve IT security.
- Establish Information Security guidance for the Enterprise Architecture team and approve designs and strategies.
- Provide strategic risk guidance for the company’s IT projects, including the evaluation and recommendation of technical controls. Oversee the security requirements in system development life cycle, business continuity planning, and disaster recovery.
- Continuously improve a vulnerability management program which includes automated vulnerability scanning, customized vulnerability assessment, and penetration testing.
- Create and communicate a risk-based process for vendor risk management, including assessment and treatment for risks that may result from partners, consultants, and other service providers.
- Perform risk…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).