×
Register Here to Apply for Jobs or Post Jobs. X

Senior Manager Technology and Cybersecurity Risk Management

Job in Erlanger, Kenton County, Kentucky, 41018, USA
Listing for: Archer Daniels Midland
Full Time, Seasonal/Temporary position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Position: Senior Manager Technology and Cybersecurity Risk Management –

Job Description Senior Manager Technology and Cybersecurity Risk Management – Erlanger, KY (On-Site)

Full-time

Job Summary

We are looking for a highly accomplished Senior Manager of Technology and Cybersecurity Risk Management to lead our IT and cybersecurity risk management program as part of the Global Technology organization’s governance, risk management, and compliance (GRC) function. In this senior role, you will be responsible for defining, implementing, and overseeing the risk management framework and strategies that protect our global enterprise, spanning traditional Information Technology (IT), critical Operational Technology (OT) environments, and cybersecurity.

As a publicly‑traded global manufacturing leader, our operations require a seasoned manager who can navigate complex landscapes and lead IT, OT, and cybersecurity risk management initiatives in alignment with our business and operational objectives.
You will be a key leader and subject matter expert, responsible for driving a culture of cybersecurity and accountability. You will partner with a broad set of leaders and stakeholders to manage risks in an open, collaborative environment where new ideas and solutions are welcomed and rewarded. This role is instrumental to ensuring we maintain our operational integrity, protect our data and systems, and comply with all legal and regulatory obligations.

Key Responsibilities
  • IT and Cyber Risk Management – Lead a team in developing and executing the company’s global technology and cybersecurity risk management strategy for internally‑developed and third‑party technologies and services. Collaborate with leaders, staff, and other stakeholders to employ a GRC framework that is scalable, repeatable, measurable, and integrated into enterprise‑wide risk management processes.
  • Third‑Party IT Risk Management – Own the design and continuous improvement of the third‑party IT risk management program, including risk assessments, integrating IT risk management into the vendor selection, contracting, and ongoing monitoring lifecycle, and conducting due diligence for critical/high‑risk third‑and Nth‑party relationships.
  • Operational Technology (OT) Risk Management – Collaborate with OT and plant automation leadership on the design and implementation of the cybersecurity risk management strategy for OT. Orchestrate specialized risk assessments on OT infrastructure, identifying threats to system availability, integrity, and safety. Monitor critical risk metrics unique to the OT environment (e.g., legacy system exposure, remote access controls, segmentation status).
  • Risk Management Lifecycle – Manage risks through intake, analysis, response, and monitoring in collaboration with subject matter experts and risk owners. This includes risks originating from third‑party relationships. Facilitate and document risk response decisions. Validate execution of mitigation plans. Oversee continuous monitoring of risk responses.
  • Risk Management Process Optimization – Execute, mature, and optimize technology and cybersecurity risk management processes, including risk identification, assessment, treatment/response, and reporting. Implement baseline automation and process improvements and iterate to improve risk management data and tooling.
  • Risk Register – Maintain a comprehensive risk register and ensure risk treatment/risk response plans have clear accountability and timelines, including reporting and escalations. Leverage the risk register to support risk‑informed decisions by clearly communicating trade‑offs. Develop strategies and action plans in areas where existing controls do not mitigate risk in alignment with risk appetite and risk tolerance. Accurately document, prioritize, and track third‑party IT and cybersecurity risks.
  • Cybersecurity, IT, and OT Frameworks – Apply industry frameworks (e.g., COBIT, NIST Cybersecurity Framework (NIST CSF), NIST SP 800‑37 Risk Management Framework, NIST 800‑39 Managing Information Security Risk, NIST SP 800‑82 Guide to Operational Technology Security) to develop decision‑making and accountability structures for managing cybersecurity, IT, OT, and third‑party IT risks.
  • Communication…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary