Welcome,

Search Jobs

Hold CTRL to choose multiple sectors (up to 3)

OR

Hold CTRL to choose multiple sectors (up to 3)

Cybersecurity Leader-Powersystems Business Unit job in Minneapolis

Engineering Jobs with Cummins Inc.
  • Show me jobs like this one
  • More jobs from this recruiter
  • Email this job to a friend
  • Print this job
Job Ref:  160001MW
Employer:  Cummins Inc.
Country:  United States
County/State:  Minnesota
City:  Minneapolis
Address: 
23/09/2016 03:04
Cybersecurity Leader

No, this isn't one of those ordinary jobs.

Cummins is a team of dependable, innovative thinkers, who are empowered to generate and deliver solutions for customers, community and environment. Our employees develop their careers through the challenges only a diverse, global innovator can promise. This is a collaborative culture where thinking beyond your desk is more than part of the job. It is the job.

This is what we call Working Right.

Our Corporate business Services unit delivers reliable, durable, high performing products to our global partners. Working in an innovative space, you'll develop high tech solutions that will fuel your advanced career skill set and empower you to own your career. Our integrated businesses demand the talents and creativity of individuals with a wide range of skills and experience.

This is an exciting opportunity in Shoreview, MN for a Cybersecurity Leader.

Thinking beyond your desk includes:
  • Responsible for defining information security policies and procedures; ensures all information and data on computer systems is protected and all networks and computer systems are adequately secure to prevent unauthorized access; investigates potential security breaches and recommends corrective actions to resolve and/or prevent reoccurrences; responsible for promoting IT security awareness.
  • Analyzes existing processes, standards, policies and/or equipment and makes process improvement recommendations to leaders ensuring compliance with laws, rules and regulations while managing business risks.
  • Monitors and evaluates the effectiveness of the enterprise's information security safeguards to ensure they provide the intended level of protection.
  • Develops security compliance processes for external services (e.g. cloud service providers, data centers).
  • Inspects continuous monitoring results to confirm that the level of risk is within acceptable limits for the software application, system, or network.
  • Identifies capability development opportunities to exploit or mitigate cyberspace vulnerabilities.
  • Performs security & privacy reviews and identifies gaps.
  • Develops strong peer relationships with senior business and IT function leaders.
  • Provides Information Security guidance to IT project teams and awareness throughout the organization.
  • Manages cross functional teams on information security initiatives.
  • Coaches and mentors less experienced security analysts; documents knowledge and solutions for use across the organization
  • Develops relationships with security vendors and external security experts; brings knowledge of current issues to information security and privacy meetings.
  • Manages the information security data sources to maintain organizational situational awareness.
  • Assists with the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes).
  • Trouble-shoots complex, cross-business issues within existing security and privacy protections. Performs root cause analysis and makes recommendations on changes.
  • Evaluates the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvement.


Qualifications:
  • Assess Solutions Against Established Standards - The ability to understand and assess proposed solutions in order to determine how closely they meet requirements and if they will deliver the desired business outcomes. The ability to understand the organization, and its readiness, to determine what is necessary to transition to the solution.
  • Audit Methodologies - The ability to inspect and evaluate an assertion of fact using a mixture of qualitative and quantitative analysis techniques. The ability to apply such techniques using appropriate judgment to produce accurate and consistent conclusions regardless of the nature of assertions being evaluated.
  • Risk Management - The identification, assessment, and prioritization of risks followed by coordinated response to minimize, monitor, and control the probability and/or impact of unfortunate future events.
  • Investigation - Able to lead a systematic and thorough process to learn the facts about something complex or hidden.
  • Troubleshooting - Able to diagnose and problem solve issues with computer hardware or software components with little or no direction. May require ability to install, configure, or disposition of server or client pc infrastructure and application issues.
  • Research - Able to conduct a process of steps used to collect and analyze information to increase our understanding of a topic or issue.
  • Relationship Management - Creates relationships with new acquaintances quickly and confidently; works to build trust and partner with stakeholders; successfully manages both internal and external relationships (e.g., vendor relationships); is comfortable in a challenger role that, at times, requires building constructive tension in interactions.
  • Influence - Applies different approaches to convince others to change their opinion or plan, and wins support from others for ideas; is able to build support with peers without direct lines of reporting across a matrix organization.
  • Decision Making - Considers the relative benefits and costs of potential actions to choose the most appropriate one; acts decisively and swiftly; identifies problems and drives toward solutions; takes on responsible roles and accountability for outcomes even when things go wrong; is comfortable making difficult decisions.

Education, Licenses, Certifications
College, university, or equivalent degree in Information Technology, Business or a related subject required.

Our ideal candidate would have these skills and professional experience:

5-7 years of experience:
  • Coaches and mentors less experienced security analysts; documents knowledge and solutions for use across the organization
  • Develops relationships with security vendors and external security experts; brings knowledge of current issues to information security and privacy meetings.
  • Collects and analyzes data on existing processes and protection controls
  • Trouble-shoots complex, cross-business issues with existing security and privacy protection protocols
  • Performs root cause analysis, and makes recommendations on changes
  • Develops strong peer relationships with senior business and IT function leaders
  • Identifies complex potential internal and external threats and evaluates mitigation strategies and controls including viruses, Trojan Horses, targeted attacks and unauthorized access or modifications
  • Evaluates mitigation strategies and controls
  • Performs regular security and privacy assessments of business and IT solutions to enhance security posture
  • Facilitates design and architecture of complex security solutions
  • Manage new and existing Information Security policies to ensure
  • Analyzes existing processes, standards, policies and/or equipment and makes process improvement recommendations to leaders ensuring compliance with laws, rules and regulations while managing business risks
  • Provides Information Security guidance to IT project teams
  • Promotes information security awareness throughout the organization
  • Manages cross functional teams on information security initiatives
Compensation. Base salary commensurate with experience plus bonus. Benefits. Additional benefits vary between locations and include options such as our 401(k) Retirement Savings Plan, Cash Balance Pension Plan, Medical/Dental/Life Insurance, Health Savings Account, Domestic Partners Coverage and a full complement of personal and professional benefits.

Cummins and E-verify:

At Cummins, we are an equal opportunity and affirmative action employer dedicated to diversity in the workplace. Our policy is to provide equal employment opportunities to all qualified persons without regard to race, gender, color, disability, national origin, age, religion, union affiliation, sexual orientation, veteran status, citizenship, gender identity and/or expression, or other status protected by law.

Cummins validates right to work using E-Verify. Cummins will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization.

Ready to think beyond your desk? Apply for this opportunity and start your career with Cummins today.
Not ready to apply but want to learn more? Join our Talent Community to get the inside track on great jobs and confidentially connect to our recruiting team: company website
Copyright © Rengineeringjobs.com Job Board 2011  | Powered by JobMount Job Board Software