×
Register Here to Apply for Jobs or Post Jobs. X

VP Information Security

Job in Eagle, Ada County, Idaho, 83616, USA
Listing for: Lamb Weston LATAM
Full Time position
Listed on 2026-01-15
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

Title:

VP Information Security

Location:

Eagle,

About Lamb Weston

You’ve probably enjoyed our fries without even knowing it! As a leading manufacturer in our industry, and public Fortune 500 company, we inspire and bring people together with foods they love and trust. Our customer base includes international food service providers, restaurants, and households in over 100 countries around the world.

Job Description Summary

The VP Information Security at Lamb Weston serves as the primary point of contact for information security and is responsible for oversight of enterprise-wide IT Information Security vision, strategy, policy, operations, risk management, and business continuity. We are seeking individuals who have demonstrated success transforming, growing, and continuously improving the cyber security function within a diverse, decentralized model through expertise and influence.

The candidate should have experience working with and managing key vendor partners as part of an extended team. The ideal candidate should possess deep technical expertise with specific experience working with cybersecurity best practices and frameworks (ISO/IEC, 27001, NIST 800-53, SOX 404, COBIT) across multiple platforms. Experience working in a senior leadership security role for a publicly held company, creating and evolving an Information Security organization, and experience working for a global organization are required.

Breadth of experience in these areas, as well as strong leadership and influencing capabilities are required. Demonstrated experience leading teams in a dynamic environment while meeting customer requirements is necessary.

Job Description
  • Develop, implement, and maintain a comprehensive enterprise security strategy roadmap.
  • Develop and mature the company’s information security program, ensuring compliance with relevant regulations and standard methodologies.
  • Proactively monitor, evaluate, and implement standard methodologies related to enterprise information security practices. Provide internal guidance with respect to company response to emerging information security threats both internally and externally.
  • Monitor the external threat environment for emerging threats and advise relevant business partners on the appropriate course of action that attains our goal of zero breaches.
  • Collaborate with senior leaders and departments to assess risks, coordinate mitigation efforts, establish internal controls, respond to incidents, and manage shared concerns. Investigate security breaches, communicate to key business partners and executive leadership, and provide remediation and resolution.
  • Serve as an expert advisor to executive leadership in the development, implementation, and maintenance of a strong information privacy and security program and infrastructure including network access and monitoring policies.
  • Evaluate effectiveness of information security, privacy, and business continuity planning programs and procedures of third parties with whom the company engages as software, hardware, and/or service providers.
  • Develop, maintain, and routinely exercise breach and ransomware approaches and processes.
  • Identify and mitigate security events and incidents, compliance issues, operational inefficiencies, application vulnerabilities, network/infrastructure, and other vulnerabilities.
  • Review and evaluate technology and incoming new vendors for future risks and opportunities to improve IT security.
  • Establish Information Security guidance for the Enterprise Architecture team and approve designs and strategies.
  • Provide strategic risk guidance for the company’s IT projects, including the evaluation and recommendation of technical controls. Oversee the security requirements in system development life cycle, business continuity planning, and disaster recovery.
  • Continuously improve a vulnerability management program which includes automated vulnerability scanning, customized vulnerability assessment, and penetration testing.
  • Create and communicate a risk-based process for vendor risk management, including assessment and treatment for risks that may result from partners, consultants, and other service providers.
  • Perform risk…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary