Plano, TX, United States
15 hours ago
Technology Risk and Controls Lead - Identity & Access Management

Join our team to play a pivotal role in mitigating tech risks and upholding operational excellence, driving innovation in risk management. 

As a Tech Risk & Controls Lead in the Chief Technology Office organization, you will be responsible for identifying, and mitigating compliance and operational risks in line with the firm's standards. You will also provide subject matter expertise and technical guidance to technology-aligned process owners, ensuring that implemented controls are operating effectively and in compliance with regulatory, legal, and industry standards. By partnering with various stakeholders, including Product Owners, Business Control Managers, and Regulators, you will contribute to the reporting of a comprehensive view of technology risk posture and its impact on the business. Your advanced knowledge of risk management principles, practices, and theories will enable you to drive innovative solutions and effectively manage a diverse team in a dynamic and evolving risk landscape.

 Job responsibilities

Develop and maintain robust relationships, becoming a trusted partner with Identity Access Management (IAM) technologists, audit, assessments teams, and partner LOBs to facilitate cross-functional collaboration and progress toward shared goalsEnsures effective identification, quantification, communication, and management of technology risk and controls, focusing on resolution recommendations and root cause analysisExecutes reporting and governance of controls, policies, issue management, audit and regulatory activities and measurements, offering senior management insights into control effectiveness and inform governance workProactively monitors and evaluate IAM control effectiveness, identify gaps, and recommend enhancements to strengthen risk posture and regulatory complianceFacilitates and reviews responses for Requests for Information (RFI’s) for Identity & Access Management productsImplements, and where needed, establishes governance processes to reduce risk from failed internal processes, inadequate identification of risks, inadequate controls, and emerging risks Establishes and oversees adherence to policies and standards impacting technology and cyber risks and identify and aggregate thematic risks and trendsMaintains an understanding of Product teams strategies, product roadmaps and key investment programs and be able to speak to high level design documents relating to the controls executed by individual IAM teamsAssesses and documents technology risks, effectively identifying and suggesting appropriate remediation plansIdentifies and assists with implementing process improvement throughout the risk and control organization

 

Required qualifications, capabilities, and skills

5+ years of experience or equivalent expertise in technology risk management, information security, or related field, emphasizing risk identification, assessment, and mitigationFamiliarity with risk management frameworks, industry standards, and financial industry regulatory requirementsProficient knowledge and expertise in data security, risk assessment & reporting, control evaluation, design, and governance, with a proven record of implementing effective risk mitigation strategiesProven knowledge in multiple security or risk management domains (such as access management, application security, vulnerability management, data protection, encryption, logging and monitoring, network security) with a primary focus of Identity and Access ManagementDemonstrated ability to influence executive-level strategic decision-making and translating technology insights into business strategies for senior executives

 

Preferred qualifications, capabilities, and skills

 

CISM, CRISC, CISSP, or similar industry-recognized risk and risk certifications are preferredDemonstrated experience working in regulated industries, in particular leveraging technology standards, frameworks, compliance, and industry recognized best practice/standards (e.g., ITIL, NIST, ISO, PCI, SOC)Proven ability to collaborate with internal and external technology audits (3rd Line of Defense), Operational Risk Management deep dives and testing (2nd Line of Defense), and the ability to advocate on behalf of subject matter expertsExperience working with tools such as FARM, CORE, Archer, Verum are preferred

 

 


 

Confirmar seu email: Enviar Email