Who We Are
Vermeer equips customers doing important work around the world. We are global, driven by innovation and growing. The equipment we make manages natural resources, connects people and feeds and fuels communities. We live out a caring culture, we demonstrate agility, we keep a focus on customers and are stewards of our resources. These beliefs drive our culture, determine how we treat others and steer our business.
Job Summary
Are you the type of person who enjoys leading a cross-functional team to identify, organize and deliver the work to keep and organization secure? In this role you will oversee all aspects of planning, execution and delivery of Vermeer’s global technology threat landscape while leading a team focused on global IT security risk and compliance. We’re looking for a results-oriented, influential leader to set the vision, execute and lead IT Security, Risk & Compliance across all Vermeer entities.
What You’ll Do
1. Lead teams to plan, execute, and deliver IT risk and compliance strategies that align and enable Vermeer strategic business objectives.
2. Develop and design the framework to ensure technology controls are well understood and executed with the primary goal of mitigating cybersecurity concerns.
3. Develop IT risk & compliance strategies and processes and ensure compliance. Identify relevant IT regulations, standards, and best practices that should influence business processes and technology controls to address those that would pose significant risk to Vermeer. This includes data privacy laws, cybersecurity regulations, industry-specific guidelines, and other related items.
4. Lead a cybersecurity team that proactively creates, implements, and monitors Vermeer policies and procedures that improve overall cybersecurity posture.
5. Lead Vermeer’s IT disaster recovery planning design and exercises that are crucial to Vermeer’s Business Continuity Plan.
6. Develops and ensures the cybersecurity and compliance budgets deliver strong return on investment through the portfolio of security hardware and security software technologies.
What We’re Looking For
-Bachelor’s degree in Cyber Security, Information Technology, or other related field with a minimum of seven years of related experience, or equivalent combination of education and experience required.
– Experience in risk management, data governance, policy management, information security compliance, privacy compliance, internal audit, external audit, and/or information security experience.
– Strong knowledge and understanding of IT systems, IT risks, business needs, and the ability to establish and maintain a high level of trust and confidence.
– Expertise in securing computer, network, and application architectures.
– Expert understanding of NIST Framework and CIS Controls.
Travel
– No travel is expected of this position.