Job added in hotlist
Applied job
Contract job
90-day-old-job
part-time-job
Recruiter job
Employer job
Expanded search
Apply online not available
View more jobs in Detroit, TN
View more jobs in Tennessee

Job Details

Director Cyber Security for Governance Risk and Compliance

Company name
Detroit Tigers, Inc.

Location
Detroit, TN, United States

Employment Type
Full-Time

Industry
It, Executive, Manager, Business Analyst

Posted on
Jun 20, 2021

Apply for this job






Profile

:text,ActualValueFromSolar:null},{QuestionName:Job Description,AnswerValue:\u003cp\u003e\u003cspan\u003e\u003cb\u003eJob Summary \u003c/b\u003e\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003eThe main objectives of the Director, Cyber Security -Governance, Risk and Compliance are to lead the design, development, documentation and communication of governance, risk management and compliance-related policies, standards, procedures, and enablers in order to drive consistency in approach and output that results in improved decision making. This role will be responsible for the design and development of operations in support of risk management (including third parties), compliance and security training, and awareness. They will oversee the governance, risk, and compliance function to ensure key compliance metrics and reports are consistently generated, aggregated, and reported to the VP of Information Security, CIO and other executive stakeholders. Additionally, this role is responsible for the broader vision of how these functions must continue to evolve and improve over time by maintaining a multi-year capability improvement roadmap of prioritized projects and associated resource and funding requirements for inclusion into the broader cybersecurity strategy and roadmap.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003e\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003e\u003cb\u003eKey Responsibilities \u003c/b\u003e\u003c/span\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eDevelop and oversee the adoption of a policies and standards framework. In addition, ensure these policies and standards (and any exceptions to them) are maintained current and relevant and appropriately managed over their lifecycle.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eMonitor, analyze, and track requests for policy exceptions and support the assessment and qualification of risks associated with deviations.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eCollaborate with legal and data privacy functions in the interpretation of regulatory requirements and compliance expectations.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eLead the development of an information management framework, ensuring the proper application of security controls in a manner that is commensurate with the associated risks.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eCollaborate with IT Infrastructure and other relevant stakeholders to identify existing capabilities and processes for maintaining the critical asset inventory.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eDevelop enablers and processes to identify critical assets and perform assessments consistently across all entities.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eCoordinate with business and IT stakeholders to ensure the timely identification of cyber risks across markets as well as compliance with all appropriate regulatory requirements and internal cybersecurity policies and standards.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eEstablish a third-party risk management program to ensure proper vetting and due diligence of third-party suppliers and partnerships.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eDevelop and drive a cybersecurity training and awareness program to ensure proper education of cybersecurity topics to embed in the organization. Educate business and IT stakeholders, including high-risk groups.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eReport on the effectiveness of governance and compliance activities by collecting and aggregated key risk and compliance metrics.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eDevelop standard metrics and KPIs for reporting compliance with policies, standards, and regulatory requirements.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eAggregate, analyze, and report risks and compliance metrics to the VP of Information Security, CIO, and other executive stakeholders.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eActively communicate and keep abreast of the latest trends in cybersecurity, governance, risk, and compliance management.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eActively contribute to request for input and feedback into Governance, Risk, and Compliance initiatives.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eFacilitate meetings with business members and participate in projects relating to changes in regulatory requirements and audit for examination of findings.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003cspan\u003e\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003e\u003cb\u003eMinimum Knowledge, Skills and Abilities \u003c/b\u003e\u003c/span\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eBachelor’s degree in Business Administration, Management Information Systems, Information Security, Cyber Security, or a related field is required.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eMinimum of 10 years of relevant work experience in cybersecurity policy, standards, compliance, legal, or risk management functions.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eExperience with governance, risk, and compliance technologies, and developing policies and standards.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eExperience identifying, evaluating, and managing risk.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eExperience developing risk management processes and associated reporting models. Including developing and implementing third-party risk management frameworks and processes.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eExperience discerning and designing an organization’s protection needs (i.e. security controls) for information systems and networks.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eExperience with the interpretation of regulatory requirements and guidance with support from legal.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eExperience developing impactful cybersecurity awareness materials and campaigns. Strong understanding of organizational training and education policies, processes, and procedures.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eExperience in effectively communicating business risks related to cybersecurity threats.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eDeep understanding of cybersecurity and the relationship between threat, vulnerability, and information value in the context of governance, compliance, and risk management.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eKnowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security tools and procedures.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eAn understanding of emerging technology and digital trends and their impacts on cybersecurity.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eHigh proficiency with common cybersecurity management frameworks, regulatory requirements, and industry-leading practices.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eStrong knowledge of third-party risk management leading practices and the potential cybersecurity risks involved in third-party relationships.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eDeep understanding of risk-based decision-making (i.e. risk analysis, mitigation, resolution, acceptance, etc.).\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eStrong process design, time management and organizational skills.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eProven ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. The ability to build consensus and support.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eAt least one of the following certifications is required CRISC, CISA, CISM or CISSP.\u0026nbsp;\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003cspan\u003e\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003e\u003cb\u003ePreferred Skills, Knowledge and Abilities \u003c/b\u003e\u003c/span\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eMaster of Information Security, Master of Cybersecurity and Information Assurance, Master of Business Administration, or related field.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eRestaurant and/or Retail cybersecurity leadership experience.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eExperience working on a global team is preferred.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e,VerityZone:jobdescription,QuestionType:textarea,ActualValueFromSolar:null},{QuestionName:Req Number,AnswerValue:5779BR,VerityZone:autoreq,QuestionType:text,ActualValueFromSolar:null},{QuestionName:City,AnswerValue:Detroit,VerityZone:formtext6,QuestionType:text,ActualValueFromSolar:null},{QuestionName:State,AnswerValue:Michigan ,VerityZone:formtext2,QuestionType:single-select,ActualValueFromSolar:null},{QuestionName:Posted Job Title,AnswerValue:Director, Cyber Security for Governance, Risk and Compliance,VerityZone:formtext7,QuestionType:text,ActualValueFromSolar:null},{QuestionName:Business Unit,AnswerValue:Little Caesars ,VerityZone:formtext3,QuestionType:single-select,ActualValueFromSolar:null}],GQId:2989,isGQResponsive:true,isActive:true,isSocialReferralJobRestricted:false,localeId:1033,AutoOptionalReqId:5779BR,Title:Director, Cyber Security - Governance, Risk and Compliance,JobSiteId:6894,Link:https://sjobs.brassring.com/TGnewUI/Search/home/HomeWithPreLoad?partnerid=26290\u0026siteid=6894\u0026PageType=JobDetails\u0026jobid=947149,isEverGreen:false},JobDetailFieldsToDisplay:{Position1:formtext3,JobTitle:formtext7,Position3:[formtext5,formtext6,formtext2],Summary:jobdescription,Section2Fields:[autoreq,jobtitle,formtext4]},BrandingConfiguration:{\brandingSettings\: {\Responsive_AdvancedCSS\: \\,\Responsive_BackgroundColor\: \#FFFFFF\,\Responsive_BackgroundImage\:
one\,\Responsive_BaseFontColor\: \#000000\,\Responsive_BaseFontFamily\: \Arial, Arial, Arial, sans-serif\,\Responsive_BaseFontSize\: \16px\,\Responsive_ButtonBackgroundColor\: \#000000\,\Responsive_CompiledCSS\: \/* remember to define focus styles! */input,select,.control,.ui-selectmenu-button,textarea,.pseudocheckbox,.pseudoradio,.controlWrapper,.textAreaWrapper,.lightBorder,.themed .ui-selectmenu-button,.ui-state-default { border-color: #000000;}.baseFontColor { color: #000000;}.baseColorPalette { background-color: #ffffff; color: #000000;}.accentBkg { background-color: #e6e6e6; color: #000000;}.lightAccentBkg { background-color: #f0f0f0;}.veryLightAccentBkg { background-color: #f7f7f7;}.darkAccentBkg { background-color: #bfbfbf; color: #000000;}.ghostBorder { border-color: #737373;}.gateway.themed .accentBkg .borderInAccentBkg { border-color: #bfbfbf;}.linkColorOnBkg { background-color: #ffffff; color: #363533; border-color: #363533; outline-color: #363533;}body,.ui-widget-content a,input,.ngdialog.ngdialog-theme-default[role=#Q#dialog#Q#] .ngdialog-content { font-family: #SQ#Helvetica Neue#SQ#, Helvetica, Arial, sans-serif; font-size: 16px;}body,.pageHeader,button,.menu,.dialog .region,.dialog .body,.gateway .baseColorPalette,.ui-widget-content,.facet ul.liner,.ngdialog.ngdialog-theme-default[role=#Q#dialog#Q#] .ngdialog-content { background-color: #ffffff; color: #000000;}.themed .pageHeader { background-color: #000000;}.themed .headerLink { color: #000000;}.themed.pageFooter { background-color: #000000;}.themed.pageFooter .footerLink,.themed.pageFooter .tgLocale { border-color: #E0E0E0; color: #ffffff;}.themed.pageFooter a { color: #ffffff; border-color: #ffffff;}.themed.pageFooter i { display: inline-block; color: #ffffff; border-color: #ffffff;}svg.styleableColor path,svg.styleableColor rect { fill: #000000; stroke: #000000;}a,a:visited,.link,.gateway.themed .linkColor,.jobtitle,.gateway .baseColorPalette a,.gateway .baseColorPalette a:visited,.facetFilterAccordion h3:after { color: #363533;}a.sidebarNav,.gateway .sidebarOverlay .sidebar { background-color: #ffffff;}.backLink { color: #363533;}.cue,.prompt,[disabled],::-webkit-input-placeholder,:-moz-placeholder,::-moz-placeholder,:-ms-input-placeholder { color: #737373;}.foreground { color: #000000; background-color: #ffffff;}.foreground span,.foreground a,.foreground a:visited { color: #000000;}.gateway.themed .controlWrapper span,.gateway.themed .controlWrapper a,.gateway.themed .controlWrapper a:visited { color: #000000;}.themed .hover,.menu a:hover { background-color: #f7f7f7;}.ui-state-hover { outline-color: #000000;}.striped :nth-child(even),.even,.ui-menu-item.ui-state-focus,.ui-menu-item-wrapper.ui-state-active,.ui-datepicker .ui-state-default,.ui-widget-header { background-color: #bfbfbf; color: #000000; color: inherit;}.backgroundColor,.themed .down,.menu a:active,.menu a.active,.applyFlow .layoutsection .heading:before,.themed .ngdialog.ngdialog-theme-default .ngdialog-content { background-color: #ffffff;}.highlighted \u003e a,.gateway.themed .selectedTile { background-color: #e6e6e6; color: #000000;}.themed .jobdescriptionInJobDetails table thead,.themed .jobdescriptionInJobDetails table tfoot { color: #000000; background-color: #ffffff;}.themed .jobdescriptionInJobDetails table thead span,.themed .jobdescriptionInJobDetails table tfoot span,.themed .jobdescriptionInJobDetails table thead a,.themed .jobdescriptionInJobDetails table tfoot a,.themed .jobdescriptionInJobDetails table thead a:visited,.themed .jobdescriptionInJobDetails table tfoot a:visited { color: #000000;}.themed .jobdescriptionInJobDetails table tbody:nth-child(even) { background-color: #e6e6e6; color: #000000;}.themed .primaryButton { border: 2px solid #000000; background-color: #000000; color: #ffffff;}.themed .primaryButton:hover { border: 2px solid #000000; background-color: #000000; color: #ffffff;}.themed .primaryButton:active { border: 2px solid #000000; background-color: #000000; color: #ffffff;}.themed .primaryButton .ladda-label,.themed .primaryButton .button-label { outline-color: #ffffff;}.themed button,a.button,.themed .AppDetailBtns .ui-selectmenu-button { border: 2px solid #000000; background-color: #ffffff; color: #000000;}.themed button:hover,a.button:hover,.themed .AppDetailBtns .ui-selectmenu-button:hover { border: 2px solid #000000; background-color: #e7e7e7; color: #000000;}.themed button:active,a.button:active,.themed .AppDetailBtns .ui-selectmenu-button:active { border: 2px solid #000000; background-color: #ffffff; color: #000000;}.themed button .ladda-label,a.button .ladda-label,.themed .AppDetailBtns .ui-selectmenu-button .ladda-label,.themed button .button-label,a.button .button-label,.themed .AppDetailBtns .ui-selectmenu-button .button-label { outline-color: #000000;}.themed .closeButton,.themed .close { color: #000000;}.themed .closeButton:hover,.themed .close:hover { background: #cccccc;}.themed .closeButton:active,.themed .close:active { background: #e6e6e6;}.themed .clearButton { color: #000000;}.themed .progressBarContainer .progressBar .meter { background-color: #ffffff; border-color: #ffffff; border-width: 14px 0 14px 0; border-style: solid;}.themed .threeLineIcon { border: 2px solid #000000; background-color: #000000; color: #ffffff;}.gateway.themed .callout { color: #ffffff; background-color: #000000;}.gateway.themed .callout::before { border-color: transparent transparent #000000 transparent;}.gateway.themed .callout::after { border-color: #000000 transparent transparent transparent;}.gateway.themed .rightIcons .bellIcon .fa-stack .fa-bell { background-color: #ffffff; color: #000000;}.gateway.themed .rightIcons .panelShow { background-color: #ffffff;}.gateway.themed .rightIcons .panelShow .fa-stack .fa-bell { color: #ffffff; background-color: #000000;}.headerStatusSticker.BorderSuccess,.jobSavedStatus.BorderSuccess { background-color: #ffffff;}\,\Responsive_FooterBackgroundColor\: \#000000\,\Responsive_FooterLinkColor\: \#FFFFFF\,\Responsive_ForegroundColor\: \#ffffff\,\Responsive_HeaderBackgroundColor\: \#000000\,\Responsive_HeaderLinkColor\: \#000000\,\Responsive_LinkColor\: \#363533\,\Responsive_PrimaryHeaderLogo\: \https://mc.lcecorp.com/ATS/Ilitch_logo.png\,\Responsive_SecondaryHeaderLogo\:
one\}},FooterInfo:[{Name:Privacy Policy,Value:https://www.lceforum.com/lceforum/Portals/0/doc/Privacy_Policy.pdf,Icon:,onlyIcon:0},{Name:Terms of Service,Value:https://www.lceforum.com/lceforum/Portals/0/doc/terms_of_service.pdf,Icon:,onlyIcon:0}],EncryptedBruid:null,HashCode:0,LoggedIn:false,EncryptedSession:null,CompiledCss:true,IdForSocialLogin:86556368-e374-4c85-94af-be52d446737a,TotalCount:146,AllowAccessResponse:{Name:AllowAccess,Value:true},TalentSuiteClientName:null,ApplyStatus:null,ApplyDiff:10,NextApplyDate:null,LimitExceededMessage:null,JobId:947149,JobCartResponse:null,TGLocales:[{SiteId:6894,LocaleId:1033,LocaleName:English (United States),SiteLocaleName:English (United States),DefLangId:1},{SiteId:6897,LocaleId:3082,LocaleName:Español,SiteLocaleName:Spanish,DefLangId:27},{SiteId:6898,LocaleId:3084,LocaleName:Français (Canada),SiteLocaleName:French (Canada),DefLangId:141}],IsGTG:true,LocaleDesc:English (United States),ResponsiveCandidateZone:true,BasicProfileDetails:null,DashboardData:null,PendingAssessments:null,googlejobsMappingfielddataJson:,CustomWebTrackerResponse:[],Abc:0,SolarErrorOccurred:false} capture-escaped-parsed-value=preloadResponse />

Company info

Detroit Tigers, Inc.

I like the volume of jobs on EmploymentCrossing. The quality of jobs is also good. Plus, they get refreshed very often. Great work!
Roberto D - Seattle, WA
  • All we do is research jobs.
  • Our team of researchers, programmers, and analysts find you jobs from over 1,000 career pages and other sources
  • Our members get more interviews and jobs than people who use "public job boards"
Shoot for the moon. Even if you miss it, you will land among the stars.
ManagerCrossing - #1 Job Aggregation and Private Job-Opening Research Service — The Most Quality Jobs Anywhere
ManagerCrossing is the first job consolidation service in the employment industry to seek to include every job that exists in the world.
Copyright © 2024 ManagerCrossing - All rights reserved. 169 192