Information Security Risk Assessor Lead is responsible for the assessment, verification, review, and audit of technology controls and/or business process controls across the enterprise related to GLBA Appendix B (Information Security Risk Assessment) and Authentication and Access to Systems and Services leveraging the provided FDIC Guidance. The Assessor will be responsible for risk assessments which will require review and evaluation of IT and/or business systems and processes. Additionally, the Assessor will assist with 3rd party and 4th party vendor risks, evaluation of control deficiencies, and recommendation on remediation efforts consistent with IT organizational policies, standards, procedures, and regulatory requirements.
Essential Functions
• Execute compliance reviews; facilitate remediation planning, exposure tracking and communicating risk all done in accordance with regulatory frameworks, e.g., FDIC Guidance as needed
• Provide security architecture knowledge and design concepts by partnering with the Enterprise Risk function to help manage technology related risk
• Provide technical expertise to support the Vendor Management Team with 3rd and 4th party supply-chain security and risk assessments, audits, tests, and verification activities, and when appropriate make recommendations to mitigate risk
• Apply or recommend adaptive security requirements and/or measurements based on investigative findings and threat monitoring including performing security risk assessments prior to changes in the production environment occurring to ensure changes do not violate regulatory requirements
• Assess systems of various scope and complexity to obtain, review, and interpret evidence provided to validate controls are performed effectively with a primary focus regulatory prescribed compliance when required. Interpret regulatory requirements into easy to understand language for constituents
• Conduct and lead assessment interviews and tests to identify technology control gaps that introduce risk to the organization
• Execute and assist management with IT audits and regulatory compliance requirements as needed
• Buildout the development of risk assessments, risk meditation, and performance reporting, through working within the IT function and other partners within the business
• Participate as the liaison between Enterprise Risk and Information Technology/Information Security to improve the overall ability to identify operational risk, with a focus on continuous control monitoring and emerging cyber security threats
Additional Essential Functions
• Ensure compliance with Northwest’s policies and procedures, and Federal/State regulations
• Navigate Microsoft Office Software, computer applications, and software specific to the department in order to maximize technology tools and gain efficiency
• Work as part of a team
• Work with on-site equipment
Safety and Health for those without supervisory duties
• Abide by the rules of the safety and loss prevention program
• Perform work tasks in a safe manner
• Report any and all injuries to supervisor
• Know what to do in case of an emergency
QUALIFICATIONS
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Education
Technical Degree Information/Cyber Security or Risk Management Or
Associate's Degree Information/Cyber Security or Risk Management Or
Bachelor's Degree Information/Cyber Security or Risk Management
Work Experience
2 - 6 years Direct PCI Assessor Experience
2 - 6 years General IT Functional Experience
General Employee Knowledge, Skills, and Abilities
• Ability to establish effective working relationships among team members and participate in solving problems and making decisions
• Ability to present and express ideas and information clearly and concisely in a manner appropriate to the audience, whether oral or written
• Ability to actively listen to what others are saying to achieve understanding, sharing information with others and facilitating the open exchange of ideas and information
• Ability to establish courses of action for self to accomplish specific goals, develop and use tracking systems for monitoring own work progress, and effectively use resources such as time and information
• Ability to make right decisions based on perceptive and analytical processes, practicing good judgment in gray areas
Additional Knowledge, Skills and Abilities
Assesses systems security requirements by studying business requirements; conducting system security and vulnerability analyses and risk assessments and studying architecture/platform
Perform risk assessments and execute tests of data processing systems to ensure functioning of data processing activities and security measures
Subject Matter Expert in FFIEC IT Handbook, GLBA 501B, and Authentication and Access risks
Knowledge of best practices for security architecture and design
Ability to assess cybersecurity controls and technology configurations
Ability to build update and maintain a global policy governance framework
Experience and ability to build, manage and update controls related to policies, standards, and FDIC requirements and other frameworks as business needs dictate.
Licenses and Certifications
Certification in Information Security such as Security +, CISSP, CISA, etc. Upon Hire
CISA Upon Hire