VP Information Security
Listed on 2026-03-01
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, IT Project Manager
About Lamb Weston
You’ve probably enjoyed our fries without even knowing it! As a leading manufacturer in our industry, and public Fortune 500 company, we inspire and bring people together with foods they love and trust. Our customer base includes international food service providers, restaurants, and households in over 100 countries around the world.
Title: VP Information Security
Location: Eagle,
Job Description SummaryThe VP Information Security at Lamb Weston serves as the primary point of contact for information security and is responsible for oversight of enterprise-wide IT Information Security vision, strategy, policy, operations, risk management, and business continuity. We are seeking individuals who have demonstrated success transforming, growing, and continuously improving the cyber security function within a diverse, decentralized model through expertise and influence.
The candidate should have experience working with and managing key vendor partners as part of an extended team. The ideal candidate should possess deep technical expertise with specific experience working with cybersecurity best practices and frameworks (ISO/IEC, 27001, NIST 800-53, SOX 404, COBIT) across multiple platforms. Experience working in a senior leadership security role for a publicly held company, creating and evolving an Information Security organization, and experience working for a global organization are required.
Breadth of experience in these areas, as well as strong leadership and influencing capabilities are required. Demonstrated experience leading teams in a dynamic environment while meeting customer requirements is necessary.
This role will provide vision and leadership necessary to manage information security risk to the organization to ensure business alignment, effective governance, operational efficiency, performance monitoring and measurement, and business continuity. Provide executive level decision support through both informal and formal means, including but not limited to executive level metrics, dashboards, risk analysis and mitigation, risk acceptance, and risk reporting.
This role will also report, elevate, and remediate IT risk and compliance related issues, working in collaboration with corporate compliance, internal audit, and various technical teams in the design, maturity, and implementation of audit, risk assessment, and regulatory compliance practices and documentation for IT.
This position will advise and lead a matrixed direct and indirect team of IT professionals and analysts knowledgeable in business activities to meet user information needs and the strategic goals of the organization.
Responsibilities- Develop, implement, and maintain a comprehensive enterprise security strategy roadmap.
- Develop and mature the company’s information security program, ensuring compliance with relevant regulations and standard methodologies.
- Proactively monitor, evaluate, and implement standard methodologies related to enterprise information security practices. Provide internal guidance with respect to company response to emerging information security threats both internally and externally.
- Monitor the external threat environment for emerging threats and advise relevant business partners on the appropriate course of action that attains our goal of zero breaches.
- Collaborate with senior leaders and departments to assess risks, coordinate mitigation efforts, establish internal controls, respond to incidents, and manage shared concerns. Investigate security breaches, communicate to key business partners and executive leadership, and provide remediation and resolution.
- Serve as an expert advisor to executive leadership in the development, implementation, and maintenance of a strong information privacy and security program and infrastructure including network access and monitoring policies.
- Evaluate effectiveness of information security, privacy, and business continuity planning programs and procedures of third parties with whom the company engages as software, hardware, and/or service providers.
- Develop, maintain, and routinely exercise breach and ransomware approaches and processes.
- Identify and mitigate…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).