Join Our Rockler Team!\n
\n
Summary of Position:\n
Oversees the IT Department's planning and execution of responsibilities. This includes directing the support and maintenance of existing applications, development, and deployment of new technical solutions, managing the IT infrastructure including telephony, servers, and network environment. Responsible for overseeing information security, cybersecurity and IT risk management programs based on industry-accepted information security and risk management frameworks. This position is accountable for ensuring continuity of all computer resources in supporting computer end-users throughout the organization through planning, security, technical leadership, and project coordination.\n
Major areas of accountability:\n
ACCOUNTABILITIES:\n\nOversees the deployment, monitoring, maintenance, development, upgrade, and support of all IT systems, including servers, PCs, operating systems, telephones, software applications, and peripherals.\nAccomplishes information technology staff results by communicating job expectations; planning, monitoring, and appraising job results; coaching, counseling, and disciplining employees; initiating, coordinating, and enforcing systems, policies, and procedures.\nMaintains organization's effectiveness and efficiency by defining, delivering, and supporting strategic plans for implementing information technologies.\nWork with direct reports to develop strategies and plans to enhance client services, improve user effectiveness, and foster innovation.\nOversees provisioning of end-user services, including help desk and technical support services.\nDirects technological research by studying organization goals, strategies, practices, and user projects.\nCompletes projects by coordinating resources and timetables with user departments and data center.\nVerifies application results by conducting system audits of technologies implemented.\nPreserves digital assets by implementing disaster recovery and back-up procedures for preserving system up-time. \nRecommends information technology policies and procedures by evaluating organization outcomes; identifying problems; evaluating trends; anticipating requirements.\nAccomplishes financial objectives by forecasting requirements; preparing an annual budget; scheduling expenditures; analyzing variances; initiating corrective action.\nContributes to team effort by accomplishing related results as needed.\nDevelop standard operating procedures and best practices, including providing written protocols and guidance to IT staff and to end-users.\nEnsure the creation and maintenance of all written documentation, including system and user manuals, license agreements, and documentation of modifications and upgrades.\nReviews all designs, code, and unit test plans where applicable; approves all business requirements prior to technical solution. \nPerforms interviews and makes recommendations for new hires, consultants, and\/or replacement personnel. \nConducts periodic performance reviews, manages department and staff development plans. \nCoordinate and manage Payment Card industry compliance.\nManage financial aspects of the IT Department, including the purchasing and budgeting of operating and capital expenditures. \nAssist IT managers and staff with security audits and remediation efforts. Ensure overall IT compliance with security regulatory requirements through proactive planning and communication, ownership, and relationships.\nCoordinates the continuous development, implementation and updating of security and privacy policies, standards, guidelines, baselines, processes, and procedures in compliance with local, state, and federal regulations and standards for private retail systems.\nDevelop and manage the security frameworks, processes, tools, and 3rd Party Vendors necessary for IT to properly manage risk and to make risk-based decisions related to IT and Business activities.\nAnnually completes company PCI Self-Assessment Questionnaire with assistance from IT team.\nFacilitate information systems security education and training to all employees.\nValidates security incident notifications and conducts complex investigations; prepares written findings, recommendations and follow up evaluation; and analyzes patterns and trends.\nCoordinates information security incident response and reporting for events or exploited vulnerabilities including unauthorized system or network access, denial of service, inappropriate data access, data corruption, and\/or collection of private or confidential information.\nAttendance is an essential function of this position, and we rely on position on being present in the office on three core days.\n\n
SKILLS:\n\nExhibit exemplary management behavior including integrity, leadership, team building, and good judgment to achieve company goals.\nCommunicates with executive management and all users on information technology security, services, and systems.\nDevelop the IT staff to meet the changing needs of users, groups, and offices; new projects and technologies; and varying staff strengths.\nMaintains quality service by establishing and enforcing organization standards.\nMaintains professional and technical knowledge by attending educational workshops; reviewing professional publications; establishing personal networks; benchmarking state-of-the-art practices; participating in professional societies.\nProcures software, hardware, and services.\nNegotiate and administer vendor, outsourcer, and consultant contracts and service agreements. Manage and control specific IT service providers.\nReview company technology contracts for security and backup concerns.\n\n
REQUIREMENTS FOR POSITION:\n\nLocal Candidate Only - Must work in office\nA commitment to high professional ethical standards\nBachelor's degree in computer science or extensive retail experience in similar capacity\nDemonstrated strong business background. \n3 to 5 years mid-level to senior-level IT management experience preferably with IT Director experience at a retail-oriented company in the $100+ million revenue range\nPast experience in a retail environment a must\nWorked in a business operation capacity a plus. \nExcellent verbal communication, written communication, and presentation skills. Ability to communicate technical concepts to technical and non-technical audiences.\nEfficient reasoning ability to facilitate clear communication and effective problem solving. \nAbility to manage multiple activities simultaneously with little or no direction and capable of operating under pressure in a fast-paced environment.\nCertified in one or more of CISSP, CISM, or NIST CSF.\nModerate travel\/variable work hours required. \nPrefer experience with:
\n\nDynamics 365 for Operations (ERP Solution)\nExchange \nSQL Experience \nWindows Server Administration \nNetwork Engineering\nHardware \/ Software Procurement\nRetail POS Software\nTelephony and Call Center Solutions\nSecurity Monitoring\nPayment Card Industry (PCI)\n\n\n\n
Rockler Companies is an Equal Opportunity Employer Committed to Inclusion and Diversity. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.\n