Reporting to the CIO with a dotted line to VPof Infrastructure, this critical impactful security leadership position willstrategically and tactically lead the overall benchmarking, execution, andvalidation of all Information Security functions for Rexnord. This hands-onposition requires a flexible, well-rounded individual, who is as comfortablewith setting the global IT Security strategy as they are with performing thework to help implement the strategy. Rexnord is seeking a strong leader with the ability to own and advancean industry leading Cyber Security program. This is a unique opportunity to build on a solid foundation, design andimplement your vision of an industry leading security program, and build a highperforming security organization with the opportunity to grow the career of youand your team.
Ownership and oversight for theimplementation and operation of Rexnord cybersecurity programs and informationsecurity tools, technologies, solutions, and methodologies.
Benchmarking and research of industryleading security practices and tools, validating the Rexnord environment isprotected with current required leading security solutions and services.
Develop, implement, and validate Rexnordsecurity strategies, security awareness programs, security architecture, andsecurity incident response.
Lead and drive security efforts,including but not limited to access control, monitoring configuration, securitypatch testing, configuration management and incident response
Educate IT and company leaders onappropriate security risk and mitigation strategies, using a risk-basedframework to priorities actions and focus.
Hire, train, coach, mentor cybersecurity personnel, including the coordination and integration of partnersolutions and services.
Responsible for the Security OperationsCenter to ensure security tools are effectively utilized and operating,identify gaps in process or procedure and implement new solutions accordingly.
Provide metrics and measures ofvalidated security effectivity across both actionable continuous improvement ITforums and governance and change management business forums
Develop and maintainappropriate response playbooks, facilitate routine exercises, and ensure asound communication process for all cyber events
Develop and oversee effective disasterrecovery policies and standards to align with company business continuitymanagement program goals. Coordinates development of implementation plans andprocedures to ensure business critical services are recovered in the event ofdisasters or other incidents, and provides direction, support, and in-houseconsulting in these areas.
Ensurethat sensitive data is protected from unauthorized modification, destruction,and disclosure.
Drives Results - Consistently achieving results,even under tough circumstances.
Strategic Mindset - Seeing ahead to futurepossibilities and translating them into breakthrough strategies.
Builds Effective Teams - Building strong-identityteams that apply their diverse skills and perspectives to achieve common goals.
Cultivates innovation - Creating new and betterways for the organization to be successful.
Four-year degree inInformation Security, IT Engineering, or Computer Science and/or relevant workexperience
10 years of progressiveexperience leading complex global cybersecurity programs, with 5 years ofdemonstrated security program leadership
CISSP, SANS, GIAC, CISM,CISA are preferred
Demonstrated experiencedesigning, architecting, and implementing Cyber Security programs andtechnology platforms in each of the following areas:
Identity, device,applications, infrastructure, network, and data controls
Vulnerability management /vulnerability response
Cyber response / incident responsemanagement
Advanced knowledge ofWindows client/server and internetworking security concepts, best practices,and procedures
"Hands on" technicalexperience is essential (firewall, Microsoft technologies), with exposure andexperience to advance security technology solutions
Experience in IntrusionProtection Systems (IPS) / Intrusion Detection Systems (IDS) technologies
Experience in IaaS/SaaSenvironments
Broad understanding of allaspects of IT and enterprise systems interoperability
Experience with DataClassification, Data Privacy (GDPR, CCPA) and Regulatory Compliance (ITAR, EAR)
Ability to communicatetechnical topics (verbal and written) to multiple organizational levels
You are not logged in. If you have an account, log in to your account. If you do not have an account, why not sign up? It only takes a minute!
You must login to use this facility.
0 Job saves