The Custom Group of Companies logo

Director, Cyber And Information Risk Review Lead

The Custom Group of CompaniesIselin, NJ

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

Job purposeThe Cyber and Information Risk, Independent Risk Review Lead is responsible for leading the execution of independent reviews of the efficacy of Information Security and Data Management programs, including review and challenge of large-scale risk remediation efforts. The successful candidate will provide review and credible challenge of the effectiveness of information security and data management processes and controls in mitigating key risks to the firm. This position is highly engaged with the firm-wide Information Security and Data Management teams who provide security and data management solutions as well as corporate departments that own information security and data management risks.* * *  * * *  * * *  * * * * * * * * * Essential Function / major duties and responsibilities of the job* * * Strategic
  • Risk Culture –Assist the Head of Technology and Information Risk Management and Head of Enterprise Risk and Operational Risk Management in driving the culture of engagement, teamwork and accountability.
  • Independent Reviews –*
    • Lead horizontal reviews of top information security and data management risks, identifying gaps in control coverage and recommending control improvements to address identified gaps.
    • Complete thematic reviews of information security and data management operational risk events and associated proposed actions to propose control enhancements that reduce risk of recurrence.
    • Work with the Information Security and Data Management teams to review control capabilities against industry standards and lead efforts to strengthen the control environment in line with the evolving threat landscape.
    • Review and challenge actions to address gaps, monitor progress of actions, and validate sufficiency of closure evidence.
    • Prepare status reports as needed and present to Technology Leadership, Audit, and regulatory bodies as required.
Operational
  • Risk Remediation Oversight –*
    • Review and challenge the sufficiency of planned actions to address identified problems, provide stated benefits, and meet regulatory expectations.
    • Review and monitor the progress of actions and validate sufficiency of closure evidence.
    • Prepare status reports as needed and present to Technology Leadership, Audit, and regulatory bodies as required.
  • Governance –Actively present to various committees and forums to keep management educated on status of independent reviews, challenges to risk remediation efforts, and progress on control improvements.
  • Relationship Management –Be a respected point of contact to stakeholders across the business and technology functions in providing credible operational risk coverage for information security and data management risk.
  • Policy & Procedures –Review and challenge relevant policies, standards, and procedures related to information security and data management processes.
Leadership
  • Mentorship –Provide guidance and support to junior members of the team.
  • Interact with and / present to Client Client in regular continuous monitoring meetings
  • Ability to influence and gain credibility with the business
What we're looking for:* * * * * * * ·7+ years of experience building, maintaining, and managing information security and data management risk governance, operations, and risk management functions.* * * ·Broad-based technology experience at substantial scale and complexity in a global, highly regulated, high-volume transaction environment. Experience must include time operating within transaction services environments characterized by the need for continuous availability and the highest levels of security.* * * ·Experienced developing and managing Enterprise and Operational Risk programs related to information security and data management, including implementing risk and control frameworks in accordance with best practices and Basel requirements.* * * ·Experienced leading in a complex matrixed organization, ideally in a global firm with a dynamic and rapidly changing environment.* * * ·Experienced leading within a highly regulated environment, with a preference for experience at the international and federal levels.* * * ·Deep knowledge of information security and data management risk and control frameworks and a strong understanding of related policies, procedures, guidelines, and structure.* * * ·Functional expertise, with operational knowledge of and exposure to various current and emerging information security and data management areas such as:* * * * * * * * * * * * * * * * * * v Cyber resilience* * * * * * v Identity & privileged access management* * * * * * v Secure coding practices* * * * * * * * * * * * * * * * v Cloud security configuration and control frameworks* * * * * * v Artificial Intelligence* * * * * * v Third-party risk management* * * * * * * * * * * * * * * * v Incident response* * * * * * v Threat/vulnerability management* * * * * * v Network security* * * * * * * * * * * * * * * * v Data governance* * * * * * v Data quality* * * * * * v Data architecture/lineage* * * * * * * * * * * * * * * * * * * * * * * * Professional qualifications / certifications:* * * * * * * ·B.S. In a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). M.S. Desired.* * * ·Relevant certification is desirable, e.G., CISSP, CISM, CISA, CRISC.* * * ·Working knowledge of information security and data management life cycles based on an established framework: CRI, NIST CSF, NIST SP 800-53, ORX, ISO 27001, SANS, CERT, ENISA, CSA, OACA, ISACA, DAMA-DMBOK. * * * ·Proficiency in MS PowerPoint and Excel.* * * ·Experience in broader MS Office suite, including Project and Visio is a plus* * * ·Experience with enterprise GRC tools, e.G. Archer is a plus

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall

FAQs About Director, Cyber And Information Risk Review Lead Jobs at The Custom Group of Companies

What is the work location for this position at The Custom Group of Companies?
This job at The Custom Group of Companies is located in Iselin, NJ, according to the details provided by the employer. Some roles may also include multiple work locations depending on the requirement.
What pay range can candidates expect for this role at The Custom Group of Companies?
Employer has not shared pay details for this role.
What employment applies to this position at The Custom Group of Companies?
The employer has not provided this information. This may be discussed during the hiring process.
What is the process to apply for this position at The Custom Group of Companies?
You can apply for this role at The Custom Group of Companies either through Sonara's automated application system, which helps you submit applications 10X faster with minimal effort, or by applying manually using the direct link on the job page.