Sr. Risk Management Consultant Job at Diverse Lynx, Washington DC

TTdHblFCQXNSWWFuY2FXRFRUbENJTjFIb1E9PQ==
  • Diverse Lynx
  • Washington DC

Job Description

Job Description: Sr. Risk Management Consultant

Remote - except for week 1 and quarterly

What are the top 3 skills required for this role?

o Assurance guidelines, risk factors, Risk is controlled and managed across projects.

o Risk Assessment, Security Policy being met, Any Risk being highlighted, managed and documented in ISG tool GRC ( ServiceNow, Archer)

o Represent ISG to follow Risk Constitution

Job Description/ Responsibilities

Specific responsibilities include:

1. Senior individual contributor for information security risk management projects. Sample projects/programs could include but are not limited to:

a) Control design and assessment for high-demand technical areas such as ERP, IT Service Management, Identity and Access Management, IT Resiliency, Cloud, etc.

b) Compliance framework mapping and implementation,

c) Risk remediation management,

d) Information Security risk reporting and monitoring

e) Creation of roadmaps to mature or advance Information Security Strategies/Programs/Controls

f) Design and enablement of cyber controls functions and processes

g) Direct experience as a power user of Cybersecurity GRC/ solutions, tools, and technologies, specifically ServiceNow and Archer

h) Projects or roles requiring coordination across lines of defense working with technical, business, compliance, risk, and audit teams to deliver solutions.

2. Delivery of information security risk assessments for large-scale IT implementation projects including consulting with security architecture function for threat modeling, appropriate tiering of N tier products/platforms, design of infrastructure security controls to protect system components.

3. Practical use of risk management concepts and principles - including assessment, prioritization, delivery of treatment plans, tracking and reporting. Experience with NIST-SP800-30, ISO 27001/2, ISO 27005, COBIT.

4. Consult and review the implementation of authentication, authorization (fine grained and coarse grained), and cryptography (PKI, SSL, Kerberos, crypto algorithms) mechanisms within applications.

5. Consult with security assurance function on the delivery of technical security standards, configuration baselines and related procedures for the hardening of both cloud and non-cloud application and infrastructure components, tools, and techniques to ensure the security of application and infrastructure components such as LINUX/Windows servers, Web servers (IIS, Apache, tomcat), app servers, Databases (Oracle and MS SQL), endpoints (MAC, Windows, Apple IOS, etc.), and Web Application Firewalls.

6. Collaborate with other security functions e, g. security architecture, security assurance, offensive security team (red/purple team), application security penetration testing team, to review and apply appropriate risk levels to the output of the assessments performed by the functions.

7. Maintain impartiality around IT systems to produce unbiased reports on information security risk.

8. Works closely with IT project teams to develop implementation plans for new security-related products and services.

9. Conducts quality assurance reviews of security requirements for the implementation of identified solutions.

10. Define/enhance process and procedures for using external security service providers including scoping, management of services, remediation tracking, and exception management.

11. Effectively communicates requirements and trains staff and managers in IT divisions to identify and manage risks throughout the project lifecycle.

12. Where applicable, manages the engagement process of external risk assessment providers and acts as a liaison with internal IT project teams and business units.

13. As an advocate of information security, works closely and proactively with IT project team leaders, service providers, and business units to provide security-related technical solutions. Identifies opportunities to improve business practices or IT security-related processes.

14. Other ad hoc responsibilities may include:

a) Analyzes, recommends, and implements process improvements within the context of information security.

b) Support governance activities for Identity and Access Management, where requested.

Experience must include:

1. Prior work in a technical cybersecurity risk management function at organizations with security related regulatory requirements.

2. Practical use of risk management concepts and principles - including assessment, prioritization, delivery of treatment plans, tracking and reporting, and metrics (accreditation and certification). Experience with NIST-SP800-30, ISO 27001/2, ISO 27005, COBIT.

3. Embedding security into processes such as SDLC, Project Lifecycle, ITIL, etc.

4. Demonstrated cybersecurity expertise with infrastructure, applications, and database system technologies.

5. Basic IT consultancy skills. Ability to consult and deliver on the security hardening of application and infrastructure components, including tools, and techniques to ensure the security of application, database, and infrastructure components.

6. Pragmatic security expert with an inherent ability to balance security demands with business reality. Ability to quickly grasp how new technologies work and how security controls should be applied to achieve business goals.

7. Knowledge of security solutions, latest threats, and countermeasures.

Required Soft Skills

1. Familiarity with a broad range of security technologies supplemented by in-depth knowledge in specific areas of relevance.

2. Ability to quickly grasp how new technologies work and how they might be applied to achieve business goals.

3. Analytical skills that enable synthesis of inputs from many sources and allow for strategic thinking and tactical implementation.

4. Pragmatic security expert with an inherent ability to balance security demands with business reality.

5. Excellent relationship management skills

6. Ability to think laterally and to have input to / propose detailed, complex solutions to technical issues.

Required Soft Skills

1. Analytical skills that enable synthesis of inputs from many sources and allow for strategic thinking and tactical implementation.

2. Spoken and written communications that are compelling, convincing, and reassuring, and skills to articulate complex technical ideas to non-technical stakeholders.

3. Ability to think laterally and to have input to / propose detailed, complex solutions to technical issues.

4. Interpersonal skills that create openness and trust among colleagues.

5. Ability to work well under pressure and to meet tight deadlines. Demonstrates a high level of motivation, confidence, integrity, and responsibility.

6. Ability to be organized, responsive and to be able to effectively multi-task with a focus on driving results.

7. Demonstrate excellent interpersonal and relationship management skills. This includes the ability to work independently, effectively in a team/task force as a team member or leader, and with senior staff and managers.

8. Ability to work well under pressure and to meet tight deadlines, whilst demonstrating a high level of motivation, confidence, integrity, and responsibility.

9. Excellent relationship management skills. Facilitation and conflict management skills that enable effective working relationships.

Education

1. Bachelor's degree in information security, computer science, engineering, mathematics, business, or related field of study plus a minimum of 12 years of relevant experience in regulated industries working as an information risk manager or IT security architect; OR

2. Advanced degree in Information Security, computer science, engineering, mathematics, business, or related field of study plus a minimum of 6 years of relevant experience in regulated industries working as an information risk manager or IT security architect.

Certifications: (Minimum plus at least 2 preferred)

1. CISSP or CISM (minimum required)

2. CCSP (preferred)

3. Microsoft Certified: Cybersecurity Architect Expert (preferred)

4. Other Microsoft cloud security related certifications at the Expert level (preferred)

5. GIAC certifications (preferred)

6. Offensive security related certifications (preferred)

Diverse Lynx LLC is an Equal Employment Opportunity employer. All qualified applicants will receive due consideration for employment without any discrimination. All applicants will be evaluated solely on the basis of their ability, competence and their proven capability to perform the functions outlined in the corresponding role. We promote and support a diverse workforce across all levels in the company. Diverse Lynx

Job Tags

Remote job,

Similar Jobs

Precision Castparts Corp.

Import Export Specialist Job at Precision Castparts Corp.

 ...facilities operate in a way that is consistent with the relevant import and export laws and PCC requirements. The FCO will be responsible for...  ...Essential Functions Compliance Activities Provide internal Compliance Training Groups Include (Operations Management... 

Sport Clips

Licensed Cosmetologist Job at Sport Clips

Sport Clips Haircuts is Hiring Hair Stylists! Do What You Love. Love What You Do. JOB DESCRIPTION Our salon is looking for talented hair stylists who are passionate about cutting hair and making their clients look great! Our team is dedicated to exceptional customer...

Inspirations of Mount Washington

Receptionist - Part time Job at Inspirations of Mount Washington

 ...scheduled appointment(s), and seeing that the residents get there on time. Maintain resident mailboxes, including an up-to-date...  ...for new residents, names on boxes and returning mail to post office for move-outs; Receive and distribute mail as needed. Maintain... 

MyKelly

Packaging Operator Job at MyKelly

 ...communicate with supervisors and team members, read safety guides, and work instructions in English! Payrate and shift: 3rd shift...  ...s a typical day as a Packager? 1. Operation and cleaning of Packing equipment. Includes labeler and tape machine. 2. Use of pallet... 

Under Armour

Apparel Designer II, Men's Sportswear Job at Under Armour

 ...Values & Innovation At Under Armour, we are committed to empowering those who strive for more, and the company's values - Act Sustainably, Celebrate the Wins, Fight on Together, Love Athletes and Stand for Equality - serve as both a roadmap for our teams and the qualities...