
Director, Information Security Risk Management
The Custom Group of CompaniesIselin, NJ
Automate your job search with Sonara.
Submit 10x as many applications with less effort than one manual application.1
Reclaim your time by letting our AI handle the grunt work of job searching.
We continuously scan millions of openings to find your top matches.

Job Description
Job purposeThe Information Security Risk Management Lead is a key member of the Risk Management team and is responsible for leading the implementation of the Enterprise and Operational Risk Management frameworks designed by the company to identify, measure, monitor and mitigate information security risks. The successful candidate serves as a second set of eyes to management to provide review and credible challenge of the effectiveness of information security processes and controls. This position is highly engaged with the firm-wide Information Security teams who provide security solutions as well as all corporate departments that own information security risk.* * * * * * * * * Essential Function / major duties and responsibilities of the job* * * Strategic
- Risk Culture- Assist the CRO and Head of Enterprise Risk and Operational Risk Management in driving the culture of engagement, teamwork and accountability.
- Risk Assessments –Collaborate with the Information Security teams to guide and challenge risk assessments, and lead in efforts to strengthen the control environment in line with the evolving threat landscape.
- Process Improvements –Identify opportunities to reduce risk of recurrence of incidents and events through process evaluation and improvements plans.
- Operational Risk Management Framework- Support the CRO and Head of Enterprise Risk and Operational Risk Management in furthering the use and efficacy of the ORM framework while enhancing its applicability to manage information security risk.
- Review and Credible Challenge –Provide review and credible challenge of the information security risk profile and all associated framework components, e.G., risk and control self-assessments, control testing, event management, metrics and indicators, risk appetite, finding management, and reporting.
- Risk Oversight –Lead in executing oversight of information security risks by performing the following:*
- Provide subject matter expertise to business units to drive, guide and influence risk ownership, clarity and assessment of risks & controls.
- Review and monitor the progress of actions and validate appropriateness of closure evidence.
- Thematic review of operational risk events and associated proposed actions to reduce risk of recurrence.
- Document credible challenge of information security risk appetite to support the Enterprise Risk management (ERM) program.
- Regular review and challenge of key risk indicators including thresholds and applicability to risk appetite.
- Prepare monthly and quarterly ORM/ERM reports and present to Technology Leadership, Audit, and regulatory bodies as required.
- Project Oversight –Lead in executing project oversight for information security risks by performing the following:*
- Provide challenge of risk management of material information security projects that may impact the firm's risk profile.
- Work with business partners to challenge the quality of the project inherent risk assessments and contribute to the independent risk review for projects.
- Review project benefits and closure artifacts in preparation for transition to BAU.
- Governance –Actively present to various committees and forums to keep management educated on changes to risk appetite.
- Relationship Management –Be a respected point of contact to stakeholders across the business and technology functions in providing operational risk coverage for information security risk.
- Advisory Services –Be a trusted advisor and provide effective challenge to stakeholders on the evolving cybersecurity and technology risk landscape.
- Policy & Procedures- Maintain and oversee relevant policies, standards, and procedures related to security processes.
- Primary lead for the team to role model expected work ethic and quality, meet divisional objectives, and support career development.
- Provide guidance and support to junior members of the team.
- Interact with and present to regulatory bodies in regular continuous monitoring meetings.
- Ability to partner, influence, and maintain credibility with the business
- 10+ years of experience specifically related to information security governance, operations, and risk management.
- Broad-based technology experience at substantial scale and complexity in a global, highly regulated, high-volume transaction environment. Experience must include time operating within transaction services environments characterized by the need for continuous availability and the highest levels of security.
- Experience with developing and managing Operational Risk programs, establishing framework and on-going process in accordance with best practices and Basel requirements.
- Comfortable leading in a complex matrixed organization, ideally in a global firm with a dynamic and rapidly changing environment.
- Experience leading within a highly regulated environment, with a preference for experience at the international and federal levels. Deep knowledge of policy frameworks and a strong understanding of policies, procedures, guidelines, and structure.
- Functional expertise, with operational knowledge of and exposure to various current and emerging information security areas such as:
- B.S. In a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent).
- Relevant certification is desirable, e.G., CISSP, CISM, CISA, CRISC.
- Working knowledge of Risk Management life cycles based on an established framework: NIST CSF, NIST SP 800-53, ORX, ISO 27001, SANS, CERT, ENISA, CSA, OACA, ISACA.
- Proficiency in MS PowerPoint and Excel.
- Experience in broader MS Office suite, including Project and Visio is a plus
- Experience with enterprise GRC tools, e.G. Archer is a plus
Automate your job search with Sonara.
Submit 10x as many applications with less effort than one manual application.

FAQs About Director, Information Security Risk Management Jobs at The Custom Group of Companies
What is the work location for this position at The Custom Group of Companies?
This job at The Custom Group of Companies is located in Iselin, NJ, according to the details provided by the employer. Some roles may also include multiple work locations depending on the requirement.
What pay range can candidates expect for this role at The Custom Group of Companies?
Employer has not shared pay details for this role.
What employment applies to this position at The Custom Group of Companies?
The employer has not provided this information. This may be discussed during the hiring process.
What is the process to apply for this position at The Custom Group of Companies?
You can apply for this role at The Custom Group of Companies either through Sonara's automated application system, which helps you submit applications 10X faster with minimal effort, or by applying manually using the direct link on the job page.