Make sure that your organization assess current processes, procedures and job functions to drive strategic initiative projects resulting in increased quality performance, increased internal efficiency and decreased freight spend as a percentage of revenue/spend.

More Uses of the Supply Chain Security Toolkit:

  • Collaborate with trade compliance CoE and internal controls team to review existing and develop new internal controls to ensure trade compliance.
  • Direct: review product architectures for security design gaps and vulnerabilities and consult with appropriate teams to remediate or mitigate Cyber risk.
  • Investigate and resolve system deterioration and/or failures, develops techniques to resolve hardware, software, and networking problems in system components.
  • Prepare monthly dashboards, KPIs and metrics sufficient to measure performance of warehouse operations, transportation processes, inventory levels, and forecast (demand and supply) accuracy.
  • Minimize the cost of goods through support of effective supplier negotiations and the establishment of supply contracts for critical materials.
  • Manage advanced security analytics, data security, identity management, security operations, Supply Chain Security, and managed security services.
  • Collaborate closely with interdisciplinary colleagues to help design, develop, and mature scalable production processes, working with a variety of materials application methods and manufacturing processes.
  • Ensure you relay; lead and mentor security architects in providing Cybersecurity guidance to product development teams, security champions, and business leaders throughout all phases of the software development life cycle.
  • Oversee and audit manual and computerized inventory systems for the transfer of product, maintenance of item master files, and perform quality control of system output records.
  • Stay abreast of current geopolitical risks and concerns and communicate risks to supply base and develop potential mitigation plans.
  • Ensure delivery of business plans at or ahead of targets and plans and appropriate Commercial representation in internal business processes.
  • Manage high cost/low use inventory stocking processes to reduce cost and coordinate inventory across all sites of utilization.
  • Warrant that your venture establishes comprehensive compliance and risk management policies, practices, guidelines and procedures for your organization, subsidiaries and suppliers.
  • Develop: implement and drive process consistency and cross business collaboration to create efficiency gains resulting in cost savings opportunities.
  • Provide effective, constructive and appropriate feedback and leadership to direct reports to foster positive, team atmosphere.
  • Provide leadership to Trade Compliance team and ensure day to day monitoring import and export requirements of the business unit.
  • Direct: leverage contracted site guard supervisors, and ensure all electronic security systems are in good working order at all times.
  • Ensure you closely partner with your Security and Trust Organization, IT, and Supply Chain Manufacturers and Suppliers to delivery business outcomes.
  • Analyze supplier and economic markets; identify and manage market risks and opportunities; identify and develop a supplier relationship management program that improves the overall capability of your supply base.
  • Drive program and process improvement by influencing favorable improvements in security processes, operational areas, and through managing projects from concept through sustaining programs.
  • Govern: monitor and compare packaging component re order quantities against supply plan to assure appropriate component inventory levels.
  • Ensure your group supports trade account directors through business analysis in ensuring product distribution and contractual performance of the 3pl are optimal.
  • Coordinate with a portfolio of departments and entities, Cyber Command staff, and vendors to implement a range of Cybersecurity tools, processes, policies and controls.
  • Guide: effectively manage relationships with all internal and external stakeholders; develop and maintain superior processes for integrating external supplier ideas into the business.
  • Be accountable for overseeing the conducting of periodic internal audits, implementation a peer review process, and providing ongoing guidance, coaching and training to staff.
  • Come work with a team of talented engineers who help your customers keep people safe through researching, developing, and delivering software/hardware security solutions.
  • Maintain and develop a positive relationship with assigned accounts through pro active communication and providing timely and accurate information.
  • Follow supply chain department procedures to ensure the uninterrupted supply of raw materials and packaging components to support commercial production.
  • Manage: without effective security processes and practices throughout the life cycle of a system, intentional and unintentional vulnerabilities can be placed into systems.
  • Identify and incorporate new regulatory and contractual requirements into your supplier management processes and related Information Security infrastructure.

 

Categories: Articles