Key Responsibilities:
- Responsible for conducting research and evaluating technical and allsource cyber intelligence to develop indepth assessments of threats to the organizations networks systems users and data
- Serves as liaison and point of contact for new issues and vetting
- Conducts complex cyber risk analysis and awareness through collaboration with other internal experts and trusted outside organizations
- Creates risk assessments and cyber threat profiles of current events using existing tooling
- Develops and maintains procedures to meet changing requirements and enable more strategic detections
- Advises leadership on technology initiatives that support latest trends in IT security risk and controls
- Ensures effective execution of the risk management framework by managing relationships with key stakeholders within strategic business groups and technology
- Responsible for conducting deep dives on IT securityrelated processes and systems
- Verifies that IT risks are appropriately mitigated and leads multiple stakeholders in agreement on appropriate solutions/controls
- Responsible for identifying applicable regulatory risks from changes or additions to regulatory guidance and requirements
- Provides expertise for resolution and risk mitigation.
- Develops tracks and reports on Key Risk Indicators (KRIs) for information technology
- Monitors tracks and reports mitigation and resolution of IT risks
- Performs processlevel walkthroughs control testing etc. for the identification and assessment of IT risks and controls
- Effectively communicate key risks findings and recommendations for improvement with key stakeholders.
Experience
- Minimum of Bachelors degree in Computer Science Cyber Security Information Technology or a similar technical degree
- Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA) or Certified in Risk and Information Systems Control (CRISC) would be an advantage
- An understanding of key technology concepts such as access control confidential data encryption business continuity infosec scans and vendor apps.
- Strong knowledge of IT business processes and systems including (IT Security data management architectural and planning technology life cycle management regulatory concerns).
- Solid understanding of risk management functions including IT audit cyber security and/or IT compliance.
- Experience or knowledge of 3rd party/vendor management lifecycle an advantage.
IT Risk Management,IT Risk,IT Risk Analyst,IT Risk & Control,COBIT,DORA,NIST,GDPR,CISSP,CISA,CRISC,CISM,IT Audit