Information Risk Analyst Resume Samples

4.7 (116 votes) for Information Risk Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the information risk analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
FR
F Rogahn
Felipe
Rogahn
8624 Fritsch Village
Los Angeles
CA
+1 (555) 250 3956
8624 Fritsch Village
Los Angeles
CA
Phone
p +1 (555) 250 3956
Experience Experience
Houston, TX
Information Risk Analyst
Houston, TX
Jerde Group
Houston, TX
Information Risk Analyst
  • Manage expectations, timelines and prioritize working with the Application Development Manager’s and RFT Entitlements Development team
  • Work with a team of workflow developers/project administrators, partners and report to managers in a global team environment
  • Assist with various Third Party Risk Management program initiatives working closely with the Third Party Risk Management Leads
  • Assist with various Asset Management Information Risk Management program initiatives working closely with the Leads of respective programs
  • Work with Senior Development Managers and Application Owners to identify, track and manage technology risk across the line of business
  • Provide SME and Work as a Center of Excellence in Identity & Access Management within RFT
  • Assist in preparing detailed reports for management and senior management of findings noted by the team during the course of completing various tasks
Chicago, IL
Information Risk Analyst Identity Access Operations
Chicago, IL
Cronin, Stanton and Tromp
Chicago, IL
Information Risk Analyst Identity Access Operations
  • Performance management of managers and staff in accordance with corporate guidelines
  • Providing governance and approval for expense related to shift differential and drive overall compensation planning in accordance with HR policies while adhering to budget guidelines
  • Providing root-cause analysis and process improvement recommendations when service levels are not met
  • Coordinating with global peers across internal and LOB departments, focusing on driving efficiency and service delivery improvements
  • Providing leadership during resiliency event as site lead
  • Developing and maintaining good relationships with business partners
  • Service delivery and performance of the team as it relates to on-boarding, off-boarding and maintenance of access entitlements
present
Los Angeles, CA
Senior Information Risk Analyst
Los Angeles, CA
Pfeffer-Kunde
present
Los Angeles, CA
Senior Information Risk Analyst
present
  • Responsible for running multiple projects, simultaneously
  • Develop and implement strategies to meet Corporate IT risk management objectives
  • Consults on information risk management practices to various constituents within a LoB or across the firm
  • Keep all projects in program on track - Escalates decisions to key individuals as necessary
  • Plan and set project goals and milestones
  • Detect and solve project issues effectively
  • Recognize areas for internal improvement and developing plans for implementing them
Education Education
Bachelor’s Degree in Demonstrated Technical Expertise
Bachelor’s Degree in Demonstrated Technical Expertise
University of Kentucky
Bachelor’s Degree in Demonstrated Technical Expertise
Skills Skills
  • Proficient working knowledge within the following risk domains/technologies
  • Prior Experience in Infrastructure Scripting will be a strong plus (Active Directory and File ServersDFSR)
  • Prior Experience in MIS Reporting for Enterprise Systems is highly desirable (SQL Queries, Excel Macros)
  • Proficient technical skills, including: audit, business analysis, change management, IT Risk Management, operation systems and data sources knowledge, performance metrics and reporting, technical problem resolution, project management, and vendor management
  • Strong Oral and Written communication skills
  • Proven experience with project management processes; including project planning, issue management, risk management, resource tracking and management score-carding
  • Strong written and verbal presentation skills to a wide variety of senior managers across the organization and proven track record of influencing and leadership skills
  • At least 3-5 years of experience in the following fields: information risk management, information security management, operational risk, IT control environments
  • Strong written and verbal communication skills
  • Excellent expertise in MS Office Suite, particularly in PowerPoint and Excel
Create a Resume in Minutes

15 Information Risk Analyst resume templates

1

Information Risk Analyst Lead, CIB Resume Examples & Samples

  • Develop and implement strategies to meet Corporate IT risk management objectives
  • Detect and solve project issues effectively
  • Recognize areas for internal improvement and developing plans for implementing them
  • Ensure all the measures comply with company standards and procedures
  • Acts as the communications conduit
  • Serve as single point of contact for project level issues / questions
  • The ideal candidate has a technical background in Computer Science or Engineering
  • Experience in Information Risk Management and Identity & Access Management is required, with proficiency in multiple IT Controls practices
  • Strong understanding of Technology Controls and driving Business programs
  • Strong Presentation Skills
2

Information Risk Analyst Resume Examples & Samples

  • IDS/IPS technologies
  • Network Architecture
  • Security Event Logging & Monitoring
  • Database/Application/Network Layer Secure Protocols
  • Secure Software/Code Development
  • Change Management
  • Proficient verbal and written communication skills, including the ability to effectively lead discussions and meeting
3

Information Risk Analyst Resume Examples & Samples

  • 8-10 years related business experience, including2-5 years experiencein IT Risk Management and/or Technology Audit functions
  • Prior Experience in Infrastructure Scripting will be a strong plus (Active Directory and File ServersDFSR)
  • Prior Experience in MIS Reporting for Enterprise Systems is highly desirable (SQL Queries, Excel Macros)
  • Must have a high degree of technical expertise/professional mastery to interface with tech stakeholders and recommend process improvements
  • Program & Project management skills to establish and execute remediation initiatives effectively and resolve conflicts
  • Strong Oral and Written communication skills
  • Proven experience with project management processes; including project planning, issue management, risk management, resource tracking and management score-carding
  • Strong written and verbal presentation skills to a wide variety of senior managers across the organization and proven track record of influencing and leadership skills
4

Information Risk Analyst Resume Examples & Samples

  • Assessing, identifying issues, measuring progress, and tracking remediation of technology risks
  • Implementing common processes, practices, tools, and metrics to improve the risk posture
  • Developing consistent integrated metrics and MIS reports for key risk indicators
  • Driving compliance to best risk management practices throughout the organization
  • Keeping track of best practices, and implementing continuous improvement opportunities on an ongoing basis
  • SOX testing of technology controls
  • Perform peer review QA of Corporate Sector Risk SOX Testing
  • Assist with Phoenix Administration of the Test Capture Module
  • Interface with application and technology teams throughout Corporate Sector in support of information requests, audit RFIs, and Regulatory inquiries
  • Weekly Corporate SOX Working Group – participating in corporate work groups related to Corporate Sector Risk SOX deliverables and regarding the Firms direction for program changes/enhancements
  • Participate in additional projects and/or work streams as required by management
  • 3-5 years of experience in Information Risk Management roles
  • 1-3 years experience inIT SOX Testing
  • 1 years of software application and database testing experience
  • Knowledge of JPMC IT Risk Management Standards
  • Thorough knowledge of the technology risk and control environment, and an understanding of industry IT Risk standards and best practices
  • Understanding of multiple technology platforms including mainframe, distributed, midrange, and Windows environments
  • Strong written and oral communication skills to interact with technicians and engineers, as well as business and financial partners
  • Strong knowledge of Microsoft Office Products
5

Information Risk Analyst Resume Examples & Samples

  • Build business requirements documents needed to enhance the system to meet the needs of it’s end users and owners
  • Help to manage major and minor system releases to include new business requirements as requested. Person will be responsible for helping to manage the UAT schedule, UAT preparation, UAT execution, Defect Management, and post implementation support
  • Communicate effectively with LOBs on application and framework changes
  • Liaise with different lines of business contacts to understand and build reporting needs through a BI tool (Cognos) and operate a weekly steering committee to identify areas of improvement
  • Understand the application process so that gaps within the process can be easily identified and escalated to management as necessary
  • At least 3-5 years of experience in the following fields: information risk management, information security management, operational risk, IT control environments
  • Excellent expertise in MS Office Suite, particularly in PowerPoint and Excel
  • Knowledge of SOX and FFIEC requirements desired
6

Information Risk Analyst Resume Examples & Samples

  • Provide first line security consulting to the business in implementing technology control practices for business projects
  • Conduct security and control reviews for applications and underlying infrastructures
  • Drive & manage the rollout of global IT risk programs to the region
  • Make the business aware of the risks/threats to their business
  • Plan and coordinate the awareness training on technology control policies, practices and standards
  • Aid the business in participating in the security processes (risk classification & assessment, access certification, third party oversight, etc.)
  • Work with the corporate IT risk management group to identify the appropriate corporate security solutions and arrange with the technology teams for deployment
  • Facilitate Risk Control Self Assessment process and reporting
  • Facilitate internal, external or regulatory audits
  • Strong communication skills (written and verbal)
  • Must be a team player yet able to work independently
  • Ability to drill down into issues in a positive manner and make recommendations after evaluating the risks
  • Solid knowledge of general IT controls, application, operating system, database and network security. Hands-on vulnerability and penetration testing, application development, database administration or different security products knowledge is an advantage
  • Knowledge of the business' data flows, products and operations for asset management business is an advantage
  • At least 5 years relevant work experience (previous experience as an IT risk manager, IT auditor, security officer, compliance & controls, penetration tester is an advantage)
  • CISSP, CISA, CEH and/or other IT auditing and information security qualifications is an advantage
7

Senior Information Risk Analyst Resume Examples & Samples

  • Consults on information risk management practices to various constituents within a LoB or across the firm
  • Plan and set project goals and milestones
  • Relies on extensive experience and judgment to plan and accomplish goals
  • 5-10 years Program/Project Management Experience
  • Ability to manage multiple workstreams and efforts throughout the organization
  • Results oriented and highly flexible
  • Responsible for coaching and mentoring less experienced team members
8

Information Risk Analyst Resume Examples & Samples

  • Ensure projects delivered on time
  • Implement risk management strategies
  • 1- 3 years experience in a risk role
  • 1- 3 year managing small to medium-scale initiatives and projects
  • Experience in Information Risk Management and Identity & Access Management is required, with proficiency in at least one IT Controls practice
  • Articulate the business value and impact of technical and non-technical information and understands when to escalate issues
  • Takes ownership of client issues ensuring appropriate parties are engaged for timely resolution
  • Strong verbal and written interpersonal and communication skills
  • Uses organizational, time-management, and office automation skills to facilitate efficient job functionality and team goals
  • Overall knowledge of user access management standards
  • Demonstrated technical problem solving skills and a customer service focus
  • Excellent communication and consensus building skills
  • Ability to communicate technical information in easy to understand business terms
9

Information Risk Analyst Resume Examples & Samples

  • Support tactical and operational Cybersecurity initiatives and coordinate selected remediation activities globally
  • Support Cybersecurity team with planning, coordination and facilitation of Cybersecurity Simulations with the appropriate subject matter experts and stakeholders
  • Generate project-level analytics and metrics as they relate to tactical projects
  • Develop and deliver reporting on owned projects to accurately reflect the current state of the program to senior management
  • Support development and implementation of Cybersecurity Communications & Awareness Strategy
  • Actively participate in project planning and stakeholder meetings for various Cybersecurity initiatives
  • Assist in weekly Portfolio level reviews, identifying and managing program related issues and escalations, ensuring that the master issues list is aggressively managed and escalated
  • Assist portfolio manager in ensuring projects are delivered on time, on budget, in compliance with applicable policies and standards, and consistently meet Cybersecurity strategic objectives
  • Preparation of other ad hoc support materials/presentations for the management group
  • Bachelors Degree in Computer Science, IT, Mathematics, Business, or related field
  • Three or more years experience with Information Technology related roles, preferably in the financial sector
  • Some experience in project management
  • Demonstrated ability to positively interface with other departments, colleagues and management
  • Strong attention to detail and accuracy - proven ability to produce quality results timely
  • Ability to work independently and multi-task
  • Strong written and verbal presentation skills
10

Information Risk Analyst Resume Examples & Samples

  • Experience in Information Risk Management and Identity & Access Management is strongly desired
  • Minimum of 3 years experience in a risk role
  • Minimum of 3 year managing small to medium-scale initiatives and projects
11

Information Risk Analyst Resume Examples & Samples

  • Within the Application Risk Assessment (ARA)frameworkperform assurance checks for completeness of application control assessment questionnaires
  • Review Application control assessment questionnaire substantiation for applicability, integrity and completeness
  • Confirm the severity of Application control break is commensurate with the risk
  • Confirm that planned break remediation will successfully close control deficiencies
  • Quality Assurance Activities of Fixes confirming planned remediation will successfully mitigate the control deficiency
  • Quality Assurance Activities of Alternate Procedures set in place to mitigate controls
  • Quality Assurance Activities of Allows
  • Confirmation that remediation delivery successfully align with the original remediation plan
  • 1-3 years experience ineither infrastructure or Application development
12

Information Risk Analyst Resume Examples & Samples

  • Execute against and report on the vision, goals andcritical success factors for this tower
  • Improve current processes and drive positive change in: controls, data quality and regulatory compliance
  • Work with global operations management to promote risk awareness and compliance, in line with established IT Control policies, processes and procedures
  • Review and analyze RAMP questionnaire responses from lines of business, identify gaps specific to access administration
  • Remediate gaps identified through RAMP
  • Provide an objective view of risk reviews, mitigation strategies, operational risk trends, and emerging risks
  • Develop and implement effective processes to identify, escalate, report and track risk related issues
  • Partner and coordinate with Information Owners, IRMs and Application Support teams and I&AM Controls and Governance to improve controls around access provisioning
  • Perform all analysis required for control/audit requests and closure of RCSA Action Plans
  • Support all internal/external audits and ensure timely and effective response for all requests for information on a priority basis
  • Maintain evergreen privileged access reconciliation (i.e. ensure no one other than EAA has provisioning access)
  • Manage any adhoc compliance and security-related projects as required by management
  • Provide on-going (daily, weekly, monthly, quarterly) analysis and reporting on team performance and progress
  • Minimum 5-7 years management experience in global operations and/or technology risk management
  • Prior internal audit experience is preferred. 3-5 years of experience with risk and controls analysis or related
  • Familiarity with IT risk management framework and control self assessment process
13

Information Risk Analyst Resume Examples & Samples

  • Preparation of materials for the regular schedule of reporting
  • Collation and processing of reporting data from across the Risk and Controls organization
  • Production of internal and external reporting and metrics for the Risk and Controls area
14

Information Risk Analyst Resume Examples & Samples

  • To have the finalized RPs / NCAs appropriately included / updated in risk systems and metrices
  • To ensure that the relevant and sufficient evidence are reviewed for the purose of closure of any RPs / NCAs and regular reporting of open RPs and NCAs
  • Identify opportunities for improving third party risk posture as well as JPMC’s third party risk management processes, including expanded monitoring, KRI tracking, etc
15

Information Risk Analyst Resume Examples & Samples

  • Excellent communication skills with the ability to lead in a matrix organization and interact with senior management
  • Ability to affect change within sphere of influence and leads development of innovative improvements
  • Demonstrated organizational and time management skills with the ability to adapt and adjust to changing priorities and to manage multiple assignments with challenging/conflicting deadlines
  • 7+ years of experience in IT, IT Risk management, audit or equivalent
16

Am-information Risk Analyst Resume Examples & Samples

  • Perform BAU activities including Certification tool queue, request queues, incident queues and e-mail requests
  • Participate in audit support activities, as they pertain to Access Certification Controls, for internal & external audits inquiries
  • Perform manual certification activities on a quarterly basis
  • Perform quarterly production entity review
  • Maintain weekly data quality monitoring routines
  • Provide exceptional customer support across all supported services
  • Provide Off-Hours support, as needed, to resolve system and certification problems during non-business hours or backlogs; Provide on-site shift coverage in accordance with Shift Rotation schedule where applicable; Occasional overtime may be required
  • College degree or equivalent work experience
  • Access Recertification experience across platform, application and/or database systems
  • Control related experience (e.g., Risk Management, Access Administration, Change Control, or Contingency Planning)
  • Superb oral and written communication skills
  • Flexible with regard to working shifts; On-Call & weekends; Overtime
  • Demonstrated ability to learn new and varied systems and apply new procedures quickly
  • Customer service focused and detailed-oriented
  • Problem solving and analytical skills
  • Proactive, driven and able to work from their own initiative
  • Proficient knowledge of Asset Management products and services
  • Industry recognized IT Risk certification (e.g. CISSP, CISA, etc.)
17

Information Risk Analyst Resume Examples & Samples

  • Review end user request which are submitted by business, technology and operations users
  • Validate evidence from application managers, before Action Plans are closed
  • 6+ years of experience in IT
18

Information Risk Analyst Resume Examples & Samples

  • Risk identification, tracking, resolution from an Information Technology (IT) perspective
  • Be part of a team responsible that works closely with the GTI Information Risk Management group(ITRM) to understand corporate risk standards and reporting requirements
  • Identify, track, drive resolution, and monitor progress of IT-related risks to Tech Ops
  • Drive and assist with Control Self Assessment (CSA) reviews working with operations teams
  • Assist with the monitor and tracking of threat management metrics with a focus on improvement
  • Routine interaction with senior staff to report results
  • Routine interaction with Tech Op Individual contributors to drive remediation of identified issues
  • 3-5 years IT experience with a track record of success driving process improvements and change
  • 3+ years experience in systems auditing/IT Risk, or related field preferred
  • At least 5 years domain experience with engineering and operations for Windows, ESX, Unix/Linux, SQL Server and Oracle systems
  • Demonstrated ability to present t o management and effectively communicate with technology professionals
  • Bachelor's degree or equivalent professional experience required
  • Skilled in problem solving and analytical reasoning
  • Ability to work well in a team oriented, agile environment
  • Strong analytical and communication skills and an eagerness to learn new technologies
  • CISSP Preferred
19

Information Risk Analyst Resume Examples & Samples

  • Associates degree (or equivalent work experience or specialized training) in Business, Management Information Systems, Information Technology (IT), Computer Science (CS), Software Engineering, or related discipline
  • 3+ years of IT, Audit or Risk experience or equivalent
  • Advanced experience with Microsoft Office suite including Visio, Excel, Access, and Project
  • Experience in managing small projects
  • 2-4 years PC skills including demonstrated experience with SQL
  • Application development experience is a plus
  • Experience in IT Risk/IT Audit/or IT operations is preferred, but not required
  • Knowledge of IT audit, secure application development, or related technology in financial services areas is desired
  • Familiar with PCI compliance standards and OCC Regulations is a plus
20

Information Risk Analyst Resume Examples & Samples

  • Governance - Manage and run regional IT Risk and Security meetings and associated processes
  • Regulatory - Track and manage regulatory engagement activities that relate to IT Risk and Security and drive execution of an effective IT regulatory compliance strategy
  • Risk Posture – Working across CTS, assist in developing and maintaining the risk posture with input from lines of business. Track and monitor risk remediation or policy expectations
  • Candidates will have a strong background and experience working in IT and preferably within the financial services sector
  • Experience in IT Risk role/s, preferably supported with appropriate qualifications (CISM, CISSA, CISSP, CRISC or equivalent)
  • Practical working experience with IT risk and control frameworks
  • Demonstrable understanding of the regulatory compliance environment
  • Knowledge of operational risk disciplines, information security
  • Strong practical experience with IT and application Risk Assessment frameworks, tools and methodologies as applied to business processes, business applications, technology infrastructure
  • A track record in leading and delivering initiatives with a relentless focus on outcomes and business benefits
  • Team leadership and management experience
  • A proven ability to influence and develop sustainable stakeholder relationships
  • Self motivated, highly driven to achieve results
  • Experience working in a Global Technology context
  • Knowledge of JPMC IT Risk Management Policies and Standards
  • Experience leading business critical projects
  • Strong analytical, interpretive and problem solving skills
  • Knowledge of internal systems (Seal, Phoenix, ITRC, ITRIMS, RADAR, DSTAR)
21

Information Risk Analyst Resume Examples & Samples

  • Review existing CSAs to determine active or inactive status
  • Validate CSA issues and supporting reporting; process appropriately based on results of analysis
  • Define, determine scope and standardize CSA process across CCB sub-LOBs
  • Schedule and facilitate CSA assessments based upon process define above
  • Manage issues and associated action plans to ensure timely completion of remediation or escalation as required
  • Ensure appropriate signoffs are provided for the closure of action plans and issues
  • Develop scorecard for CSA execution to show if process is on track or not. Identify opportunities for process improvements to deliver increasing efficiency within assessment framework
  • Support IA reviews as required to ensure appropriate and accurate data from CSA process is provided
  • Identify opportunities for process improvements to deliver increasing efficiency within assessment framework
  • 10+ years of experience in IT, IT Risk management, audit or equivalent
22

Identity & Access Management Information Risk Analyst Resume Examples & Samples

  • Lead and/or participate in various Global Identity and Access Management programs as it relates to the CMA business
  • Advocate and promote information security and privacy standards, policies and procedures; ensure that these artefacts are disseminated, understood and implemented across Technical Operations and other various towers
  • Participate in audit related activities as they pertain to Identity & Access Management
  • Interface with Information Risk Managers to identify potential access control issues
  • Process improvement and identifying control gaps within
  • Answer general inquiries regarding information security practice or security access. Make recommendations for implementing desired level of access controls; Assist in implementing action plans to address system access issues
  • In-depth understanding of Information Security policies/practices; Incumbent should have prior experience in the industry, with specific experience in database, application and platform(Mainframe, UNIX, Active Directory, Large MidRange) administration
  • Current knowledge Information Security trends and potential threats based on weaknesses of various software/development packages
  • Ability to learn, apply and teach new technologies quickly
  • Extensive experience with client/server environments; Must be PC and system literate
  • Advanced knowledge of Audit principles and associated compensating controls
  • Minimum 3 - 5 year experience in Identity & Access mgmt and data analysis/MIS experience
  • Excellent oral and written communication skills
  • Manage multiple projects simultaneously
  • Knowledge of Oracle, Visual Basic, SQL, Access and Scripting / Macros are a plus
  • Strong problem solving skills and inherit decision-making ability
  • Strong customer service skills and detail oriented
  • Must be a team player, and able to work collaboratively with other departments to advocate information security solutions
23

Information Risk Analyst Resume Examples & Samples

  • In depth knowledge of security tool sets including security event management tools, vulnerability scanning tools, network and system forensic tools, or security analytics toolsets
  • A subject matter expert in multiple information security disciplines
  • Understanding goals beyond that of technology, and an ability to integrate security solutions with business processes
  • Experience working in the financial services industry with knowledge of regulations such as GLBA, PCI, and SOX
  • IT Risk Certification (CISA, CISSP, etc) or equivalent experience
24

Information Risk Analyst Resume Examples & Samples

  • Provide SME in risk management, application security and vulnerability management in RFT
  • Project Engagement – SME support for Technology, IRM and Cyber Security teams to assist in application security assessment through the use of automated tools and manual techniques to identify and verify exposure to common security vulnerabilities and providing remediation guidance
  • Process – Develop, Implement and manage secure software life cycle processes to that will assist the application development teams in integrating security requirements within their applications and databases
  • Data Analysis – understand, interpret, validate, manipulate data using excel and other tools, and present conclusions and recommendations
  • Impact Analysis – Review proposed solutions across RFT, develop use cases to explain/demonstrate requirements/specifications to key stakeholders
  • Contribute to the development and implementation of application security software, policies, standards, procedures, and guidelines
  • Provide baseline metrics and reporting, both during impact analysis and on-going execution of risk-driven projects, organize and deliver clear and accurate data for Technology and Executive Management
  • Assist RFT IRM and Technology Teams to ensure that RFT can engage effectively in support of all risk-based projects
  • Information security certifications (such as CISSP, CSSLP, CEH/CPT or related certifications) would be preferred
  • A graduate degree or equivalent experience in computer science is also required
  • Excellent written and verbal communication skills
  • Very strong data analysis, both quantitative and qualitative
  • Good reasoning and logic, problem solving skills
  • Exposure to financial services systems and processes preferably in Investment Banking
  • Self motivated individual, comfortable working without close supervision and with ability to work to deadlines
  • Team player with proven ability to build strong cross-business relationships
  • Exposure to information security principles and relevant standards including Access Management, Change Management, Security Incidents and Business Continuity Management
  • Strong understanding of secure software development life cycle
  • Working knowledge of application assessment, application security vulnerabilities, code review methodologies, and secure coding practices
  • Exposure to information security vulnerability concepts, issues and mitigation methods
  • Understanding of OWASP security concepts and common application security risks, such as XSS, XSRF, SQL Injection, Cookie Manipulation, etc
  • Working knowledge of software penetration testing, secure code review, architectural risk assessment, static code analysis
  • Exposure to manual assessment tools such as HTTP Proxies, browser plug-ins, automation scripts, etc
  • Experience in a similar risk role
  • Experience of technology projects and/or the RFT business a plus
25

Information Risk Analyst Resume Examples & Samples

  • 5+ years of technology support (applications or infrastructure)
  • Control Related Experience required (e.g., Risk Management, Security Administration, Change Control or Contingency Planning)
  • Understanding of the Information Technology Control Policies
  • Strong Project Management Experience
26

Information Risk Analyst Resume Examples & Samples

  • Executes and monitors risk related procedures, promotes risk policy awareness, and/or tracks and reports on risk compliance in line with established IT Control policies, processes and procedures
  • Ensure IPD Control Self-Assessment is completed, ensuring that control issues/gaps are clearly documented, that detailed remediation plans are developed to address these issues and that the risk acceptance is used appropriately
  • Assists Information Risk Lead in managing risk and vulnerability assessments of IPD systems and applications, facilitates compliance/control reviews and associated remediation efforts
  • Provides information risk management consulting to IPD teams
  • Identifies potential information security risks/threats and notifies Information Risk Lead
  • Collaborate with key stakeholders to obtain consensus on roadmap to jointly mitigate security risks
  • Minimum 3-5 years experience in regulatory compliance, operational risk, audit or risk management, including broad knowledge of banking laws and regulations associated with Financial Services, technology and/or information security
  • A related undergraduate degree
  • Strong communication and influence management skills
27

Information Risk Analyst Resume Examples & Samples

  • Minimum 3 years experience in information risk management required
  • Working knowledge of information security controls
  • Self-starter with ability to work independently
  • Client focused and problem solving skills
  • A good understanding of information technology/application development
  • Some control related experience (Audit, Information Security, Control Officer) a plus
  • Some Application Development (especially web-based), technology and operations related experience also desirable
28

Information Risk Analyst Resume Examples & Samples

  • Provide oversight and consultation and/or remediation on issues/potential issues that arise within Enterprise Access Administration, Engineering functions and tools, risk control self assessment, and regulatory guidance, as necessary
  • Develop business process mapping to assess and identify issues and gaps
  • Validate and review controls in light of key business projects, business changes and operational events to ensure ongoing compliance with key regulatory commitments
  • Experience with operational risk analysis, process improvement, end-to-end business process mapping and reviews, procedure documentation, and develop of metrics and reporting
  • Minimum 7+ years experience in regulatory compliance, operational risk, audit or risk management
  • Minimum 5 - 7 years experience in access administration, security administration, or similar field
  • Strong data analytical and organizational skills (SQL or other database analytical skills)
  • Experience performing deep dive control reviews to identify process and control breaks. (Controls awareness experience is a must)
  • Excellent verbal, interpersonal and written communication skills and the ability to develop and maintain strong partnerships with internal and external audit and all levels of management is necessary
  • Effective PC skills (Excel, Word, Powerpoint, Visio)
29

Information Risk Analyst Resume Examples & Samples

  • Execute CT&R IAM controls and compliance testing including: Risk Control Self Assessment (RCSA) and Sarbanes Oxley (SOx)
  • Execute RCSA program for CT&R IAM, including setting up workshops to identify inherent risk and to request appropriate evidence for controls. Execute the testing of the controls and the documentation of the test results
  • Execute the annual SOx program, including coordinating with the business SOx leads and ensuring that the SOx control testing program is fully executed in accordance to firm standards
  • Perform timely follow up on issues per the RCSA procedures and Firmwide SOx guidance
  • Minimum 3+ years experience in regulatory compliance, operational risk, audit or risk management
  • Minimum 3+ years experience in access administration, security administration, or similar field
  • Working knowledge of RCSA and SOx requirements
  • Program or project management experience
  • Knowledge of FFIEC, COBIT and ITIL standards desired
30

Information Risk Analyst Resume Examples & Samples

  • Support the technology controls and assessment framework, leveraging standard tools and processes to identify control, process, and application issues / deficiencies. Identify framework efficiency and effectiveness opportunities
  • Engage with technology and business partners to ensure compliance with required assessments per company policy/standards; perform quality assurance validation of issues and assessments prior to closure or completion
  • Develop presentation materials and reports for the team and senior management business and technology stakeholders; work closely with the technology teams to collect and track an array of metrics required for reporting
  • Lead small-to-medium scale projects and deliver presentations with minimal supervision
  • 1- 3 years of experience in IT, IT Risk/Technology Controls, Audit or equivalent
  • Proficient in Microsoft Office (especially Excel and PowerPoint) and Microsoft SharePoint
  • Articulate the business value and impact of technical and non-technical information and understand when to escalate issues
  • Demonstrate organizational and time management skills with the ability to adapt and adjust to changing priorities and to manage multiple assignments with challenging / conflicting deadlines
  • Proficient communication, consensus-building, interpretation, analytical, and negotiation skills
  • Project management experience a plus
31

Information Risk Analyst Resume Examples & Samples

  • Provide consultation and/or remediation on issues/potential issues that arise within Enterprise Access Administration, Engineering functions and tools, risk control self assessment, and regulatory guidance, as necessary
  • Execute various processes to monitor regulatory related controls to ensure that they are being effectively executed
  • Execute associated reporting and escalation processes, engaging management on appropriate actions
  • Minimum 5+ years experience in regulatory compliance, operational risk, audit or risk management
  • Excellent expertise in MS Office Suite, particularly in PowerPoint, Excel and MS Access, and Visio
32

Information Risk Analyst Resume Examples & Samples

  • Provide oversight and consultation and/or remediation on issues/potential issues that arise within Cyber Security engineering and operations functions and tools, risk control self assessment, and regulatory guidance, as necessary
  • Execute control testing as a result of Risk Control Self Assessment (RCSA) program to identify issues and gaps
  • Experience with operational and technology risk analysis, process improvement, end-to-end business process mapping and reviews, procedure documentation, and metrics development and reporting
  • Experience performing deep dive control assessment reviews to identify process and control breaks (Controls awareness experience is a must)
  • Minimum 3 - 5 years experience in regulatory compliance, operational risk, audit or risk management
  • Minimum 3 - 5 years experience in risk assessment, security engineering, operations or similar field
  • Strong analytical and organizational skills
33

Information Risk Analyst Resume Examples & Samples

  • Provide SME and Work as a Center of Excellence in Identity & Access Management within RFT
  • Work as COE for Recertification, Request Mgmt representing RFT in Cross LineOfBusiness forums
  • Help RFT apps onboard to Firm wide strategic tools and help support queries from the Application Development Manager’s across RFT
  • Manage expectations, timelines and prioritize working with the Application Development Manager’s and RFT Entitlements Development team
  • Provide BAU support to existing applications and or enhancements
  • Review existing processes and recommend improvements to streamline work
  • Work with Compliance across regions and LOB’s to define data level masking as mandated. Work as a SME to guide the ADM’s on this topic
  • 3-5 years’ experience as a Project Manager and/or Business Analyst, executing projects within the financial services industry
  • Bachelors’ degree required; experience in Identity and Access Mgmt a plus
  • Excellent analytical, problem solving and time management skills
34

Information Risk Analyst Resume Examples & Samples

  • Drive all aspects of the application controls assessment and application development life cycle assessment of third party providers
  • Conduct the remote assessment, providing the overall IT Risk expertise
  • Identify control breaks and vulnerabilities with a third party application
  • Document findings and work with the LOB Delivery Manager to resolve those findings through Control Breaks logged within internal risk management systems
35

Information Risk Analyst, Associate Resume Examples & Samples

  • 5-7+ years of experience in Information Technology
  • 3+ years of experience in IT Risk Management, IT Audit/ IT Governance/IT Controls or equivalent
  • Proficient working knowledge within the following risk domains/technologies is preferred
  • Fingerprint
  • Credit Check and Tax Filing History
  • Employment History and References
  • Proof of legal U.S. Legal Permanent Residence for 3 years
  • Preferred candidate will have knowledge of SSAE16, Internal and NIST 800-53 Rev4 audits
36

Information Risk Analyst Resume Examples & Samples

  • Engage and lead Line of Businesses (LOBs) that use the third party
  • Lead the onsite/remote assessment, providing the overall IT Risk expertise
  • 6 to 8 years of experience in IT
37

Information Risk Analyst Resume Examples & Samples

  • Demonstrated understanding of technology controls concepts and terminology
  • Proven ability to work on large programs and projects within a cross line of business technology organization; empower people, build rapport, garnering respect and appropriately exercising authority in a collaborative cross-cultural environment
  • Minimum of two years experience demonstrating expertise in controls management
  • Strong problems resolution and listening skills
  • Strategic and technical thinking-understanding of systems, infrastructure and various types of applications
  • Stakeholder engagement skills, including ability to interact with senior levels of management
  • Ability to organize and prioritize work, meet tight timelines
  • Ability to adapt to changing business priorities; flexibility is key
  • Ability to perform SOX testing, client reporting, application assessments and various approvals
38

Information Risk Analyst Resume Examples & Samples

  • Ensure Onboarding projects delivered on time and with high quality / accuracy
  • Implement risk management strategies as required
  • Serve as single point of contact for project level issues / questions with all stakeholders
  • Performing Connectivity Tests, Tool Configurations, FARS ID Mappings, EPV Onboarding and tracking of same for onboarding DB’s while targeting SLA’s and program-level goals either on or before time
  • Consistently re-review Onboarding processes seeking to ensure Risks are minimized, Automation opportunities are adopted and customer service is managed appropriately
  • Minimum of 1 years experience in a risk role
  • Minimum of 1 year experience in a database access admin role preferred
  • Minimum of 1 year managing small to medium-scale initiatives and projects
39

Information Risk Analyst Resume Examples & Samples

  • Serve as a Subject Matter Expert for Enterprise Password Vault
  • Partner with Technology and Business teams to implement risk strategies
  • Serve as Intake function for requests and inquiries into CCB IAM
  • Manage and support controls to ensure appropriate access
  • Analyze and take action to maintain compliance
  • 3-5 years in Technology Operations functions
  • Strong sense of urgency and prioritization
  • Superior customer handling expertise
  • BA/BS Degree or equivalent experience
40

Information Risk Analyst Resume Examples & Samples

  • Specific focus on Data Protection, Data Loss Prevention, & Privacy
  • Partners with IT Audit colleagues to address risk issues within the organization
  • Will lead small-to medium-scale projects and deliver presentations with minimal supervision
  • CISA, CISSP, or equivalent experience preferable
  • Experience managing small - medium sized projects preferable
  • Experience in communicating strategic roadmaps and vision to team and stakeholders
41

Information Risk Analyst Resume Examples & Samples

  • Promote innovation within the technology control environment driving control optimization, process efficiency, and improved client experience
  • Strengthen the Banking Technology control environment through education, collaboration, and oversight
  • Drive effective risk mitigating controls designed, deployed, and monitored by the application owners, developers, and support teams
  • Proactively work with technology and product managers to identify potential issues and ensure effective remediation
  • Provide leadership and advise on material remediation activities ensuring appropriate resolution of issues
  • Proactive engagement with Technology Control Managers
  • Support Risk & Control Self Assessment (RCSA) process ensuring issues and related action plans are timely documented, assigned, and resolved
  • Drive the Technology Control education agenda
  • College degree, specialized training, or equivalent work experience
  • Proficient with multiple technologies and architectural design principles
  • Demonstrated analytical and problem solving skills
42

Information Risk Analyst Identity Access Operations Resume Examples & Samples

  • Directing the Operations team in support of various lines of business
  • Maintaining BAU and drives strategy for request processing and incident management
  • Ensuring Service Level Agreements are satisfied
  • Providing root-cause analysis and process improvement recommendations when service levels are not met
  • Performance management of managers and staff in accordance with corporate guidelines
  • Service delivery and performance of the team as it relates to on-boarding, off-boarding and maintenance of access entitlements
  • Partnering with other functional areas to ensure seamless delivery to customers, including coordination with cross functional or operational resources
  • Utilizing existing business intelligence metrics and management reporting
  • Implementation of strategic initiatives related to new or enhanced security products and toolsets on supported platforms
  • Assessing recommended procedural changes to enhance the functionality of the operations team
  • Identifying opportunities to automate or streamline current processes
  • Coordinating with global peers across internal and LOB departments, focusing on driving efficiency and service delivery improvements
  • Ensuring appropriate control environment is developed and maintained
  • Ensuring successful implementation of action plans to address risk and control issues
  • Serving as primary point of contact for site specific audit activities
  • Promoting security awareness across the firm on an on-going basis
  • Preparing business cases for staffing decisions
  • Approving recommendations on hiring and staffing decisions
  • Evaluating and execute appropriate staffing plans in order to achieve departmental goals
  • Ensuring that the operating model consists of appropriate levels of resiliency across all responsible locations, documented and tested accordingly
  • Providing leadership during resiliency event as site lead
  • Providing governance and approval for expense related to shift differential and drive overall compensation planning in accordance with HR policies while adhering to budget guidelines
  • Developing and maintaining good relationships with business partners
  • Ensuring communication is customer focused and professional; responsible for local communications
  • Monitoring and ensuring client satisfaction
  • Serving as primary point of contact for site specific escalations
  • 5-7 + years of professional Information Technology experience
  • 3-5 + years experience IT Risk Management
  • 3-5 + years of experience working within a Global Operations capacity
  • Prior internal audit experience is preferred
  • Bachelor’s Degree preferred; MBA or a masters degree in Risk Management, Operations or similar discipline preferred
43

Information Risk Analyst Resume Examples & Samples

  • Strong communication skill (Oral and written)
  • Able to explain IT + Risk & Controls related topics to business
  • Experienced working in a team setting
  • Highly motivated self-starter
  • Experienced with process documentation
  • Good understanding of UNIX (Keon preferred), Windows (local and domain), mainframes / distributed databases, Java/ .Net. Hands on experience in at least one of the technologies are a plus
  • Preferred to have development background, strong operations experience, or a combination
  • Advanced data analytics skills (excel, SQL) since we end up dealing with large data sets
  • CISA/CISSP/CRISC preferred
44

Information Risk Analyst Resume Examples & Samples

  • Support the Application Control Testing program including initial interviews regarding standard controls usage for applications in scope; assist with the identification and testing of shared controls. Perform testing of the evidence submitted to validate it justifies control effectiveness
  • Work with technology teams to walkthrough, gather control design requirements facilitate discussions and bring to closure control issues
  • Advise Lines of Business (LOBs), based on the testing their results to ensure they are in compliance with the Firm's guidelines
  • Communicate issues and evaluate issues/findings and best practices with the rest of the team and manager
45

Information Risk Analyst Resume Examples & Samples

  • Responsible for Integrating Applications, Databases and Platforms to firm wide approved certification and/or request tools and conduct control checks to ensure end to end data integrity
  • Input and upload response results among various in-house tools
  • Identify ways to increase efficiencies of processes
  • Document and update related procedures in SharePoint environment
  • Partner and coordinate with Information Owners, Technology Control Officers and Application Support teams and I&AM Controls and Governance to improve access controls
  • Work closely with business partners to identify process improvements and leverage technology to automate and streamline existing processes
  • Bachelor’s Degree in Engineering OR business/information technology related field or equivalent experience in the Identity and Access Management field
  • Must have experience with two or more of the following systems: IDCert, ARMS, RSAM, IBID RMT, EURC, IO SID, DB Portal, TAMS, Peregrine
  • Solid understanding of the global banking business and operations
  • Working knowledge of SQL/Oracle queries is a plus
46

Information Risk Analyst Resume Examples & Samples

  • Advise Lines of Business (LOBs) and IT Partners, based on the testing their results to ensure they are in compliance with the Firm's guidelines
  • Participate in additional key control projects related to enhancement of the ARA program
  • 5-7 + years of professional experience in Information Technology
  • 3 + years of experience in IT Risk, Audit, Compliance or Governance
  • Application, SOX or RCSA IT control experience is preferred
  • Background in Auditing, understanding of internal controls, particularly General Computer Controls (GCC)
  • Detail oriented with ability to evaluate processes, controls and issues to determine the risks
  • Proficient verbal and written communication skills, including the ability to effectively lead discussions and meetings with internal management, external / internal audit and peer groups
  • Proficient in MS Office - Microsoft Word, Excel, Access and PowerPoint
  • CISA, CISSP, CISM, CRISC certification will be an added advantage
  • Bachelor's degree preferably in Computer Science or Information Technology
47

Information Risk Analyst Resume Examples & Samples

  • Take ownership of client issues ensuring appropriate parties are engaged / timely resolution
  • Strong verbal and written interpersonal communication and consensus building skills
  • Ability to establish and build on key business relationships
48

Information Risk Analyst Resume Examples & Samples

  • Review and determine approval action for email release requests
  • Partner with LOB Business risk functions to maintain email user exception lists with Central Cyber teams
  • Review and determine approval action for exceptions to external site DLP scanning
  • Participate in the review of new DLP policies and where applicable communicate to the RFT organisation
  • Review internal policies relevant to the DLP function on a periodic basis
  • Create and maintain periodic MIS reports as required by management
  • A graduate degree or equivalent experience in Computer Science is required
  • Information Security Certifications (CISSP, CSSLP, CEH/CPT or related certifications) preferred
  • Previous experience of Data Privacy / Data Loss prevention function preferred
  • Strong working knowledge of MS Excel
  • Good reasoning, logic and problem solving skills
  • Self-motivated individual, comfortable working without close supervision and with ability to work to deadlines
49

Information Risk Analyst Resume Examples & Samples

  • Provide SME in Risk Management, Application Security and Vulnerability Management in RFT
  • Monitor and enhance controls around the key scanning processes employed by the firm e.g. Black Duck, SSAP Static, Dynamic & Threat Modelling
  • Partner with AD Managers and Application Security Champions to obtain remediation plans for vulnerabilities identified by the scanning processes
  • Evaluate tollgate requests to ensure new application code being released does not introduce vulnerabilities into the production environment
  • Participate in firm-wide initiatives and projects to communicate enhanced controls and scanning requirement to the AD community in Asia
  • Participate in the production of weekly and monthly metrics
  • Partner with AD teams to ensure application level reference data is accurately reflected on firm wide systems
  • Develop and enhance existing controls around application scanning
  • Good reasoning and logic, problem solving, project management skills
  • Exposure to Information Security Principles and relevant standards, including Access Management, Change Management, Security Incidents and Business Continuity Management
  • Strong understanding of Secure Software Development Life Cycle
50

Information Risk Analyst Resume Examples & Samples

  • Responsible for Integrating Applications, Databases and Platforms and conduct control checks to ensure end to end data integrity
  • Ensures integration on boarding requests are initiated, processed timely and accurately
  • Prepare Integration package, initiate calls/meetings and manage the life cycle of the process
  • Perform gap analysis for Application Integration, Database Integration and Platform Integration
  • Access Integration failure monitoring and remediation
  • Work closely with business partners to identify process improvements and leverage technology
  • Must have experience with two or more of the Identity and Access Management industry tools
51

Information Risk Analyst Resume Examples & Samples

  • Working technical knowledge of infrastructure technologies, including PC, Network, Distributed Computing and Mainframe/Midrange
  • Prior experience performing in a role dedicated to IT governance, process definition, and process engineering is preferred
  • Must have the ability to be proactive with a strong bias for action, be naturally inquisitive, and have bias for continuous improvement of practices and processes
  • Functional knowledge of the application(s) supported and interdependencies
  • Must have superior written and verbal communications skills, as well as the ability to create executive level presentations
  • Must have excellent negotiation, presentation, and interpersonal skills; as well as the ability to instantly develop strong rapport and build relationships with individuals and teams at multiple levels of the organization
52

Information Risk Analyst Resume Examples & Samples

  • Design and implement strategic and tactical communication plans for CCB IT Risk, Controls, and Cyber Security
  • Ensure communication mechanisms are consistent and reflect the organization’s strategic vision
  • Perform communication and education needs assessments to support data driven continuous improvement
  • Develop and facilitate training content, delivery, and ongoing support framework including mechanisms that influence behavioral change
  • Evaluate the effectiveness of communication and education programs and provide analysis to leadership via metrics and customer feedback systems
  • Solid awareness of industry standards and best practices in areas such as Infrastructure Security, Data Protection, Software Development, Information and Cyber Security, Technology Controls
  • Training certifications a plus
  • 2+ years experience as a training instructor including planning, scheduling, and delivering customized cyber, risk, and technology control programs for all organizational levels
  • Strong subject matter expertise in risk/threat vectors, attack surface reduction, technology control processes, and control operational execution
  • A bachelor's in computer science degree or related field is desired with at least 5 years of documented information risk, cyber or technology control work experience
  • Certifications such as CISSP, CISA, CRISC preferred
53

Global Technology Infrastructure Information Risk Analyst Resume Examples & Samples

  • Act as Line of Business (LOB) Admin for the firm-wide TPO tool in reviewing, uploading and seeking required approvals for all new, renewal, and expanded scope Third-Party Provider engagements using the standard third-party process
  • Advise and assist Delivery Managers, Executive Approvers, and other support groups in completing required steps within the TPO lifecycle
  • Manage the inventory of active supplier engagements in COMPASS
  • Develop a deep understanding of TPO related systems, processes, and policies (i.e. SPARC, Beeline, Phoenix, Supplier Spend Management Policy) in order to better assist Delivery Managers while identifying and recommending enhancements to reduce bureaucracy and improve workflow and related processes
  • Provide reporting/analytics to document and confirm compliance with TPO processes
  • Identify, monitor, and report key TPO metrics
  • Assist in identifying training needs and developing training materials
  • Fulfill ad-hoc reporting and analytic requests
  • 3-5+ years of experience in a Business Management, Sourcing & Procurement, or Technology role
  • Strong oral and written communication skills
  • Strong interpersonal skills with the ability to build relationships and networks across all levels of management
  • Adaptable, versatile and flexible with the ability to manage with ambiguity
  • Advanced Excel and Power Point skills
  • Highly motivated with a positive 'can do' attitude
  • Proven ability in producing concise reporting and analytics accurately and timely
  • Prior experience in Sourcing/Procurement, Vendor Management and/or Technology a plus
54

Information Risk Analyst Resume Examples & Samples

  • Business Service Ownership – Collaborate with Lines of Business and with Enterprise Password Vault (EPV) engineering/support/automation teams to improve EPV service delivery. Focus on key aspects of service delivery: e.g., service improvements, financial stewardship, client relations/communication
  • Access Uplift - Support and help streamline the adoption of EPV as a method to drive compliance with the corporate Access Uplift program. Develop methods and metrics that demonstrate LOB migrations. Review gaps and assist in aligning EPV with strategic tools
  • EPV Integration Support – Review the needs of the applications being onboarded into GIAM and assist customers with onboarding needs as they migrate to request and certifications tools
  • 5+ years in a technology management/administration position with a demonstrated ability to manage effectively through influence and knowledge
  • 3+ years’ product/project management experience and ability to handle multiple programs at once is required
  • 3+ years in Business Management Office experience with proficiency in Demand and Capacity management, Clarity and Reporting functions
  • Must have strong process management skills and strong PC skills, including MS Office (Word, Excel, PowerPoint and Project), are required
  • 1+ year Information Technology Risk/Identity and Access Management experience is preferred
  • Demonstrated expertise in verbal and written communication including performing tasks related to relationship management/strategic marketing
  • Strong interpersonal and communication skills (verbal and written) needed to work cross-functionally
55

Information Risk Analyst Resume Examples & Samples

  • Responsible for analysis, design and development of the access request workflows in the firm approved request tools, in comformity to audit set standards
  • Ensures application workflow onboarding requests are initiated, processed timely and accurately
  • Document access workflow onboarding requirements, initiate calls/meetings, prepare an onboarding plan and manage the lifecycle of the process
  • Work with a team of workflow developers/project administrators, partners and report to managers in a global team environment
  • Analysis of the access control gaps across the application workflows in request tools, documentation of the RCA and submission of the attestation evidences
  • Data extraction from databases of various in house tools
  • Access provisioning failures monitoring and remediation
  • Act as the liaison between the Application Developers, Database Administrators, Business Units, various technology and support teams Partner and coordinate with Information Owners, Technology Control Officers and Application
  • 2-3 years of hands on analysis & development experience is preferred
  • Bachelor’s Degree in Engineering in information technology related field or equivalent experience in the Identity and Access Management field
  • Must have 1-2 years experience with I & AM tools in the market
  • Solid understanding of the global banking business and operation
  • Ability to facilitate meetings among stakeholders with diverse and sometimes conflicting points of view, including strong negotiation skills and developing strong client relationship
  • Highly proficient in MS Office Suite (Excel, Word, Project, PowerPoint, Access, SharePoint and Visio
  • Working knowledge of SQL/Oracle queries is a must
56

Information Risk Analyst Resume Examples & Samples

  • Liaison between the Business and IT teams
  • Defining Business requirements and be able to propose solutions
  • Ensuring technical specifications meet the needs of the business
  • Manage projects end to end and manage multiple deliverables at a given time
  • Oversight of application deployment/implementation
  • Troubleshoot issues, solving independently or escalating to development team
  • Proactively identify new opportunities and act on them, including identifying automation opportunities
  • Maintain and continuously improve control procedures
  • Provide level 3 support to the clients in a timely fashion
57

Information Risk Analyst Resume Examples & Samples

  • 5-7 years of Technology experience
  • Execution of technology controls
  • Risk assessment
  • SOX testing
58

Information Risk Analyst Resume Examples & Samples

  • Support CCB internal clients for EPV onboarding and troubleshooting
  • Support Access Uplift program needs for EPV onboarding
  • Familiarity with CyberArk EPV
  • Strong knowledge of identity & access management technology and process
  • Experience working in a complex and fast paced environment
  • Excellent written and oral communication
  • Strong team player that can deliver their part as well as deliver the whole team
  • High level of personal responsibility and self-organization
59

Information Risk Analyst Resume Examples & Samples

  • 1-3 years of technology management experience
  • Technology security, risk, and audit experience preferred
  • Experience working with multiple technologies and architectural design principles
  • Experience with analytical and problem solving skills
  • Organizational skills with ability to effectively multitask
60

Information Risk Analyst Resume Examples & Samples

  • Review root cause analysis to identify, recommend, and implement best practices
  • Manage multiple initiatives and related activities concurrently
  • Identify and solve performance issues
  • Work closely with project and product managers to drive technical requirements in products
  • Provide escalation support for production or operational issues
  • Create technical documentation to instruct technical resources
  • Answer general inquiries regarding information security and access processes
  • Make recommendations for implementing desired level of access controls
  • Work closely with controls and governance teams to address audit gaps
  • Analysis of the enterprise password vault infrastructure and policies to ensure a healthy state at all times
  • Perform internal assessments of compliance to the firm’s security policies and standards
  • BA/BS degree or equivalent experience
  • Experience with Information Security and Identity & Access Management policies/practices
  • Experience with any of the following scripting languages: VB, Perl, Shell, .Net
  • Experience with any of the following programming languages: .NET, Java, Visual Basic, C#, C, C++
  • Experience with any of the following databases: SQL Server, Oracle, MySql
  • Experience with client/server and database environments
  • Ability to learn, apply, and teach new technologies and techniques quickly
  • Understanding of workflow and process management
  • Must be detail-oriented
  • Ability to prioritize workload in order to assure Service Level Agreements (SLAs) are met
  • Excellent client interfacing skills; strong verbal and written communication skills
  • Ability to work independently and in team settings of various sizes and locations
  • Experience leading technology initiatives
  • Basic project management knowledge
  • Microsoft Sharepoint experience is a plus
  • Familiarity with Cyber-Ark products is a plus
  • CRISC, CISSP or CISM/CISA certifications are a plus
61

Information Risk Analyst Resume Examples & Samples

  • Assist in documenting and implementation of processes related to on-boarding requirements for applications/platforms feeding into the firm’s certification tools
  • Perform IAM oversight process execution, to include reactionary steps when KPIs are not in a "green" status and escalation paths to leverage if required
  • Assist with definition and rationalization of change management rigor for IAM changes
  • Lead hands-on management and execution of the certification cycles pre-cycle, post-cycle, and during the cycle
  • Serve as the back-up to the IAM lead as it relates to project engagement, IAM tool governance, analysis & implementation of automation opportunities, and security architecture/engineering consultation
  • Consistently identify, assess, and manage technology risks across all environments. Where controls are not adequate, escalate those concerns and assist with driving improvements to the overall control environment
  • To accomplish this goal, the team partners with Corporate groups including the Global Privacy Office, Corporate ITRM, and Audit, and also with CCB groups including Operational Risk and the CCB Technology teams
  • Also serve the business in a consultative manner, providing guidance to the business on addressing identified risks
  • Support day to day technology control reviews, IT risk management oversight, and facilitate remediation efforts as needed
  • Perform IT application control assessments using standard company tools and process to identify control deficiencies
  • Perform validation of IT risk issues prior to closure of assessment identified gap. Identify opportunities for process improvements to deliver increasing efficiency
  • Previous experience with Identity and Access Management tools in an enterprise scale organization
  • Experience in working with Certification tools like Data Collection Repository and ID Cert
  • Experience with tools like Retail System Access Manager (RSAM)
  • Experience assisting the development and maintenance of tools, procedures, and documentation
  • Experience in a fast paced, high stress environment
  • Ability to think strategically, work with a sense of urgency and attention to detail
  • Demonstrated ability to be reliable and flexible
  • Demonstrated analytical, problem solving, and prioritization skills
62

Information Risk Analyst Resume Examples & Samples

  • Coordinate all relevant IT Risk and Control activities (e.g., assessment, control testing, monitoring, reporting and remediation activities)
  • Understand & interpret how corporate technology controls and standards apply to line of business platform
  • Work with Senior Development Managers and Application Owners to identify, track and manage technology risk across the line of business
  • Ensure remediation plans adhere to technology best practice, are repeatable and scalable
  • Document and communicate approach & plans to all stakeholders
  • Help build a risk aware culture focused on the pro-active improvement of the risk environment
  • Develop and maintain strong relationships with technology & business while working closely with Corporate functions such as Audit, Technology Controls Officers, Corporate IT Risk and Global Technology Infrastructure
  • Share skills and knowledge across the broader Risk and Controls organization
  • Work well as part of a globally distributed team
  • Be self motivated and capable of working autonomously with minimal management supervision
  • Be a team player with excellent communication and problem solving skills
  • Be able to drive and influence others
  • Have good attention to detail and an enthusiasm for coming up with the best solution
  • Be comfortable working with application developers to design and implement solutions aligned to control policy and standards
  • Have a strong design background and an ability to communicate in both business and technical language
  • Extensive experience in IT within Financial Services in any of the following roles; Project Management, Business Analyst, Technology Risk
  • Knowledge of Securities Processing and/or Global Funds Services a bonus
  • Demonstrated experience of management interaction
  • Demonstrated experience of data analytics
  • Experience with managing task and project oriented work efforts across teams
63

Information Risk Analyst Resume Examples & Samples

  • Control user logical access to organization resources in business applications, according to pre-set of system rules and policies
  • Control user on privilege/emergency access request to ensure these activities are monitored and approved
  • Maintain knowledge and understanding of internal processes, procedures and IT control policies
  • Perform security and change control related tasks in compliance with the Information Technology Control Policies, standard operating procedures and reference documentation
  • Appropriately document and highlight any potential risk concerns identified, escalating to management as appropriate
  • Promote continuous improvement to streamline the process of producing quality and timely outputs in meeting service level expectancy
  • Respond to Service Manager incidents and ensure tickets are completed within the firm’s documented SLAs for priority/severity impacts
  • Flexible with regard to working shifts, as well as being available for off hour and weekend support
  • Exercises a high degree of initiative and independent judgment in coordinating and prioritizing work
  • Communicate with global peers across ITRSM focusing on service delivery improvements
  • Develop and maintain good rapport with lines of business. Ensure communication is customer-focused and professional
  • Progress personal objectives, as agreed with your manager, within the documented time scales
  • Bachelor’s Degree preferred; degree in Risk Management, Operations or similar discipline preferred
  • Minimum 1-2 years experience in application security, global operations and/or technology risk management
  • Familiarity with IT risk management framework and control self assessment process preferred
64

Access Operations Information Risk Analyst Resume Examples & Samples

  • Ensures integration onboarding requests are initiated, processed timely and accurately
  • Prepare Integration package, initiate calls/meetings and manage the lifecycle of the process
  • Work with a team of integration project administrators, partners and report to managers in a global team environment
  • Gather operational metrics and update progress in trackers
  • Act as the liaison between the Application Developers, Database Administrators, Business Units, various technology and support teams
  • Project Management experience including solid knowledge of Identity and Access Management controls, principles, methods, SOX/SSAE16 and regulatory related obligations preferred
  • Solid knowledge of IT risk management frameworks/concepts preferred
  • Self-motivated with excellent analytical, communication and problem-solving skills with ability to independently develop solutions to complex analytical/data-driven problems
  • Ability to facilitate meetings among stakeholders with diverse and sometimes conflicting points of view, including strong negotiation skills and developing strong client relationships
  • Highly proficient in MS Office Suite (Excel, Word, Project, PowerPoint, Access, SharePoint and Visio)
65

Information Risk Analyst Resume Examples & Samples

  • Assist with the annual SOX program, testing the evidence of the controls and identifying any Significant Control Deficiencies, working with the appropriate Technology Control Officer to identify appropriate remediation to improve the controls as necessary
  • Assist in Application Risk Assessment (ARA) process that aims to gather risk specific information about an application
  • Perform QA reviews of control testing working papers
66

Information Risk Analyst Resume Examples & Samples

  • Any engineering graduate with 5-7 years of relevant Audit experience
  • Ability to think strategically; work with a sense of urgency and attention to detail
  • CISSP or CISA certifications
67

Information Risk Analyst Resume Examples & Samples

  • Collaborate with ADMs on Internal Audits, and regulatory assessments
  • Products (origination, servicing, money movement, etc)
  • A strong knowledge of Commercial or Consumer banking, Credit Card and/or the payments industry
68

Information Risk Analyst Resume Examples & Samples

  • Demonstrated proficiency to create technology solutions including
  • Excellent customer service attitude and communication skills (written and verbal)
  • History of success working in cross-functional, multi-location teams
  • Excellent analytical and problem-solving skills
  • Ability to manage/monitor tight deadlines and react appropriately to unexpected requirement changes
  • Excellent people skills, with strong communications and interpersonal skills
  • Ability to build consensus and drive change/efficiency
  • Flexibility to handle multiple tasks and changing priorities
  • Willingness to ask questions, challenge the process and seek out answers
  • Quickly grasp and master new requirements and related knowledge
  • Project Management, Business Analysis
69

Information Risk Analyst Resume Examples & Samples

  • Assessment of information and cyber risks associated with technology projects, solutions and changes
  • Lead the provision of information and cyber risk management SME advice and guidance to key stakeholders across the Functions including multiple senior Managing Directors and Directors
  • Leading investigations, incidents and exceptions to address information and cyber risk matters
  • Senior stakeholder management, close engagement with Functions, particularly Operations and Technology areas, is fundamental to this role
  • Experience of working within information and cyber risk field, including systems audit or internal controls, preferably in the financial sector
  • Understanding of the information or cyber risk issues that are relevant to our business and financial services more widely would be beneficial
  • Knowledge on information security, including infrastructure security architectures and configurations, application/database security, encryption mechanisms, logical data/information storage techniques, data management or mobile technologies. Knowledge on more than one area would be beneficial
  • Experience of building and maintaining effective relationships with stakeholders would be beneficial
  • Strong analytical and project management skills would be beneficial
  • Influencing and negotiating skills would be beneficial
  • Understanding of relevant regulatory environment would be beneficial
  • Strong academic background, educated to degree level or equivalent experience
  • Relevant privacy/information risk qualifications e.g. CISA, CISSP, CISM would be beneficial
  • Information risk / operational risk, especially in relation:-
70

Information Risk Analyst Resume Examples & Samples

  • Minimum 2 years technology support (applications or infrastructure)
  • Minimum 2 years Disaster Recovery/Business Continuity experience
  • Control Related Experience (e.g., Risk Management, Security Administration, Change Control or Contingency Planning)
  • Strong SharePoint & Java Development
  • Must have experience with two or more of the following systems: Phoenix, ITRC, TAMS, CMDB, RSAM, IBID
  • Working knowledge of SQL/Oracle queries
71

Information Risk Analyst Resume Examples & Samples

  • Provide leadership within the team and cross technology groups
  • Develop and maintain business process maps and supporting documentation
  • Work with a Global team to ensure Certification tasks and responsibilities are completed in a timely basis
  • Support reporting associated to Identity and Access Management project status, control and service metrics, other internal reporting projects
  • Support project management efforts within Identity and Access Management – including reviewing documents for business and functional requirements (BRDs/FRDs)
  • Support Identity and Access Management ‘s effort in partnering and coordinating with Information Owners, Application Development managers and other JPMC control teams to identify/suggest efficiencies to Identity and Access Management control procedures
  • Provide expertise in technology control practices: information risk management, IT control policies, etc
  • Bachelor’s Degree in a business or information technology related field
  • Minimum 3-5 years experience in application development, production/customer support, information security operations and/or technology risk management
  • Highly proficient in MS Office Suite (Excel, Word, Project, PowerPoint, Access and Visio)
  • Strong ability to analyze and produce metrics for Senior Level Reporting
  • Strong knowledge of Identity and Access Management controls, principles, methods and regulatory related obligations preferred
  • Strong knowledge of IT risk management frameworks/concepts preferred
  • Proficiency with SharePoint site administration / development desired
  • Good understanding of the global banking business and operations
  • Self-motivated with excellent analytical, communication and problem-solving skills with ability to develop solutions to complex analytical/data-driven problems
  • Ability to facilitate meetings among stakeholders with diverse and sometimes conflicting points of view, including strong negotiation skills and developing strong client and vendor relationships
72

Access Operations Information Risk Analyst Resume Examples & Samples

  • Responsible for the evergreen processes for Identity and Access Management
  • This will primarily be involved in but not limited to Integrating Applications, Databases and Platforms to firm wide approved certification and/or request tools and conduct control checks to ensure end to end data integrity
  • Evergreen control check may also include Certification, Completeness, Revocation, Reconciliation, Segregation of Duties and Toxic Combination Validation
  • Ensures on boarded applications/databases/platforms are validated via integration configuration and review is processed timely and accurately
  • Prepare metric reporting, initiate calls/meetings and manage the evergreen life cycle of the process
  • Work with a team of integration project administrators, risk analysts, partners and report to managers in a global team environment
  • Must have experience with two or more of the following systems or similar industry tools: IDCert, ARMS, RSAM, IBID RMT, EURC, IO SID, DB Portal, TAMS, Peregrine, Compliance Engine, MIT
73

Associate, Information Risk Analyst Resume Examples & Samples

  • Ensure clear communication of risk related items are articulated to the Digital IT teams and that those teams are establishing mitigation plans to correct any issues
  • Demonstrate attention to detail by documenting risk and following up to ensure risk mitigation is seen through the end of the issue
  • Assess Digital IT project initiatives to known best practices while also ensuring they meet internal risk and controls standards
  • Bachelor's degree in related Technical field
  • 6+ years of experience in progressive Application Development and/or Solution Engineering roles
  • Strong foundation in Technology Assessment for Solutions Architecture
  • Demonstrated experience building and maintaining consulting partnerships with technology stakeholders to advise and recommend innovative solutions
  • Oracle/SQL Database Development
  • Experience with virtual infrastructure
  • Mobile IOS/Android software development
  • Cloud Security Solutions
  • Excellent written and oral communication skills
74

Information Risk Analyst Resume Examples & Samples

  • The Analyst will partner with the Technology / support teams to find the best and most optimal method to deliver strategic Initiatives for Identity and access management & controls programs
  • Recommends controls by identifying problems, writing improved procedures
  • Monitors project progress by tracking activity, resolving problems, publishing progress reports, recommending actions
  • Prepares technical reports by collecting, analyzing, and summarizing information and trends
  • Maintaining Excel trackers
  • Responding to business queries and handling escalations
  • Perform revocations for applicable entities and perform reconciliation activities to support the same
  • 1 to 4 years of experience in regulatory compliance, operational risk, audit or risk management
  • 1 to 4 years of experience in access administration, security administration, or similar field
  • Working knowledge of SOX and SSAE requirements
  • Strong data analytical and organizational skills
  • Excellent verbal, interpersonal and written communication skills and the ability to communicate with any level of management
  • Excellent expertise in MS Office Suite, particularly in PowerPoint, Excel and word
  • Knowledge of Database concepts, (Average level)
  • Tech savvy with an aptitude to quickly learn and understand relevant systems and applications
  • Background in Financial Services Industry
  • Ability to multi-task, work well under pressure with commitment to deliver under tight deadlines
  • Graduate / Post Graduate
  • Willing to work in Night Shift
75

Information Risk Analyst Resume Examples & Samples

  • Bachelor’s Degree in Engineering/Information Technology or related field or equivalent experience in the Identity and Access Management field
  • Excellent Excel and PowerPoint skills required (advanced formulas, vlookup, graphs, etc)
  • Experience with Word, Project, Access, SharePoint and Visio
  • Experience with two or more of the following systems preferred: IDCert, ARMS, RSAM, IO SID, DB Portal, TAMS, Peregrine and EURC
76

Information Risk Analyst Resume Examples & Samples

  • Assist with monitoring existing technology issues and actions and support the closure verification process
  • Self-identify IT control issues and negotiate remedial actions and due dates
  • Assist with the quality assurance review of various control assessment programs
  • Develop scorecard to help Technology Controls Team manage its internal objectives (e.g., timely completion of assessments, action plan closure status)
  • 2-5 years of experience in IT, IT Risk management, audit or equivalent
  • Proficient verbal and written communication skills, including the ability to effectively lead discussions and meetings
  • Technical skills experience, including: audit, control assessment, business analysis, IT Risk Management, performance metrics and reporting, technical problem resolution, project management, and vendor management
77

Information Risk Analyst Resume Examples & Samples

  • Proactive engagement with Technology Control Officers
  • Minimum 1-3 years of relevant work experience
  • Basic understanding of access governance concepts is desired
  • Experience with Oracle SQL developer and RDBMS (Oracle) is desired
  • Experience with Teradata SQL developer and RDBMS (Oracle) is desired
  • Understanding of SQL queries is preferred
  • Strong communication and business relationship skills are preferred
78

Information Risk Analyst Resume Examples & Samples

  • QUALIFICATIONS
  • Minimum 5-7 years internal or external technology audit experience ("Big 4" experience preferred)
  • Have a strong background in Auditing, understanding of internal controls, particularly General Computer Controls (GCC)
  • Have an ability to effectively develop and communicate recommendations based on SOX Corporate Office (SCO) guidance
  • Experience in Application assessment and control testing
  • Be detail oriented with ability to evaluate processes, controls and issues to determine the risks
  • Have an ability to maintain high standards with a drive to achieve the right answer in difficult and/or ever changing situations
  • Can work independently, collaborate within a team and is comfortable in a virtual environment
  • Strong interpersonal skills - verbal communications, written communications, and a good track record of collaboration
  • Should have reasonable knowledge of APAC technology regulatory requirements
79

Information Risk Analyst Resume Examples & Samples

  • Identify ways to increase efficiency of processes
  • Bachelor’s Degree in Engineering in Information Technology related field or equivalent experience in the Identity and Access Management field
  • Must have experience with two or more Identity and Access Management related tools
80

Information Risk Analyst Resume Examples & Samples

  • 3 to 5 years professional experience
  • Ability to manage streams of work
  • Excellent analytical, time management, and written communication skills
  • Basic knowledge of Operating System (e.g. Unix, Wintel) and Database (e.g. MS SQL Server, Oracle, Sybase) security models
  • Familiarity with access management space
  • Strong attention to detail with high level of accuracy
  • Intermediate MS-Office skills (especially in MS Excel)
  • Education - any degree
81

Information Risk Analyst Resume Examples & Samples

  • Assist in the design and implementation of Firm-wide controls
  • Improve current processes by identifying trends, ineffective procedures and perform root cause analysis to enhance efficiency of the operational aspects of the program
  • Identifying/mitigating risks to delivering solution on time
  • Strengthen controls by identifying gaps and making change recommendations in order to enforce and enhance data integrity
  • Examine and rationalize current control framework in Identity and access management
  • Provide concrete plans on implementing monitoring frameworks for the control objectives
  • Analyze data as a driver for the decision making, design, and implementation of controls; driver results based on facts or analysis
  • Communicate effectively with LOB partners and other control functions to share knowledge
  • Leverage key risk management systems including the FORCE Risk tracking system
  • Coordinate the timely, successful closure of issues and action plans as required
  • Bachelor's degree in Computer Science, Information Science, Information Technology and/or field such as information security
  • Minimum 1-2 years’ experience in IAM or Information security, Global operations and/or technology risk management
  • Familiarity with IT risk management framework and control self-assessment process preferred
82

Information Risk Analyst Resume Examples & Samples

  • 30% Risk Analysis
  • Act as the subject matter expert (SME) on Cyber and Information Security issues
  • Conduct security threat assessments, identify risks and track and report on remediation
  • Provide information security insight and expertise in assessing new business opportunities
  • Report to senior management on security status and initiatives
  • Create a business aligned Information Risk Committee and provide regular updates
  • Interact with auditors on information security management oversight
  • Coordinate with outside vendors on the protection of client information, data transmission protocols and on Cyber/Info Security assessments
  • Work closely with developers and infrastructure teams to design and implement the security policies required to protect the integrity, confidentiality and availability of the information on an end-to-end basis
  • Assess the security controls of the industrial control systems IT architecture
  • 30% Information Risk Management
  • Develop & implement a risk assessment framework which identifies critical information security and privacy impacting business process and/or systems
  • Outline a plan to complete risk assessments of new/existing infrastructure, systems, Industrial Control Systems and other components
  • Provide support & risk guidance in the areas of enterprise infrastructure, cloud-based software/infrastructure security, wireless and secure software development
  • Work closely with the application development teams, technology teams and the other members of the Information Security team to identify and remediate security issues as part of Incident Response
  • Oversee vulnerability assessments and validate results where appropriate. Prioritize the remediation requirements and work with network and infrastructure team to mitigate security findings
  • Identity & remediate open security issues
  • 20% Data Security
  • Develop & implement a data security program. Partner with Legal/Privacy and business to identify/classify data to implement appropriate controls to monitor data loss, encryption/tokenization, and secure file transfer. Partner with Legal on privacy compliance and cross-border data protection. Partner with records management on data lifecycle management and provide general consultative services where needed
  • Identify opportunities for business process enhancement and tools to enforce data protection. Partner with Demand IT to evaluate, select and deploy a strategic solution to proactively monitor & prevent data loss
  • 10% Vendor Risk Management
  • Promote adoption of third party risk assessment framework. Partner with Procurement, Demand IT and Legal to complete initial and periodic third party risk assessments. Monitor and report on risk remediation status
  • 10% Governance & Risk Reporting
  • Provide guidance over policy enforcement and ensure the effectiveness and efficiency of the IT control environment
  • Partner with Demand IT & business to create a risk dashboard, identify key risk indicators which are business aligned from current data sources and recommend control enhancements to drive down issues identified
  • Create a business aligned security steering committee to drive further adoption of security awareness, policies, controls & culture in and across the business
  • Create security policies as appropriate
83

Senior Information Risk Analyst Resume Examples & Samples

  • Utilizes expert level knowledge of applicable state and federal security and privacy regulations and security best practices to champion approaches across the business and IT delivery teams
  • Exhibits strong interpersonal relationships with procurement teams, Audit and Compliance team, architecture team, business partners, project managers, the IT Strategy & planning teams and Quality Assurance team
  • Lead and participate in cross-functional teams to develop security policies, standards and procedures assisting to communicate these to the IT Division
  • Serve as advisor and consultant to business units in planning and coordinating systems security analysis, design, and implementation/enhancement projects to automate processing or improve business systems
  • Conducts application and vendor risk assessments. Communicates resulting risk findings to stakeholders. Works collaboratively with project stakeholders to mitigate risks and facilitate senior leadership risk decisions
  • Functions as a mentor to more junior members of the team providing training and guidance on operational issues and risk management strategies
  • BA or BS degree in Systems, IT, Business Management, or related degree preferred; or equivalent experience
  • 6-10 years experience. 5+ years of strong Analyst or Project Management experience in the Information Security or Governance, Risk & Compliance domains, with demonstrated competency executing an enterprise security program
  • CISSP strongly preferred
  • Experience achieving compliance with HIPAA and other state and federal privacy regulations preferred
  • Audit certification a plus (CISM, CISA or equivalent)
84

Senior Information Risk Analyst Resume Examples & Samples

  • Perform risk assessments including identifying key risks, assessing mitigation strategies, and preparing gaps analysis using standards such as ISO, COBIT, PCI and ITIL
  • Suggest improvements in security strategies, procedures and software
  • Assist IT with the development of security policies, procedures, architecture, training and the selection of appropriate security solutions
  • Oversee the operations of the organization's systems security solutions through development and execution of continuous monitoring techniques
  • Assist with the reports to senior management and the Board
  • Provide support for external and regulatory IT audits
  • Bachelor's degree in Information Technology, Accounting or related field
  • 3-5 years experience in accounting or technology department
  • Strong skills in Microsoft Office products, particularly Excel
  • Able to articulate well at meetings with technology and non-technology participants
  • Excellent communications skills both written and oral
  • Well organized with the ability to meet deadlines
  • Commitment to continuous learning and maintaining subject matter expertise
  • Soft skills should include
  • Aptitude for working well under pressure
  • Ability to present creative solutions to management
85

Information Risk Analyst Resume Examples & Samples

  • Facilitate the security recertification process for key software applications, main shared drives, infrastructure and other key groups
  • Generate and/or gather documents and reports to address audit and regulatory requests
  • Review such documents and follow up on any noted issues before presenting to auditors and examiners
  • Assist in the monitoring IT infrastructure projects
  • Monitor security metrics for risk management tracking
  • Assist in preparing detailed reports for management and senior management of findings noted by the team during the course of completing various tasks
  • Administer the software used to distribute security policies and training
  • Communicate both verbally and in writing with all levels of the organization
  • Adhere to budget goals, meet deadlines and communicate difficulties in a timely manner
  • Maintain effective customer relations at various levels of the organization to affect change
  • Could be entry level position or 1 year of experience in accounting or technology department
  • Must be an effective team player
  • Ability to work on multiple tasks with competing priorities in a rapidly growing, fast-paced, dynamic environment
  • Strong conceptual, analytical and organizational abilities
  • Hands-on
  • Ability to work well with others and garner cooperation
  • Accepting responsibility for own work
86

Information Risk Analyst Resume Examples & Samples

  • Associates degree required; an additional two (2) years of privacy and/or risk experience may be considered in lieu of degree.Industry recognized certifications within the domain of information security, information technology and privacy (e.g., CISSP, GIAC, CISM, ITIL, CIPP/US, etc.) preferred
  • Four (4) years of IT experience encompassing project management, information security, privacy, risk management and programming required
  • Working knowledge of information security, including: access management, malicious code detection, intrusion detection/prevention, firewalls, routers, switches, risk/vulnerability assessment and associated tools, network architectures, multiple operating systems, and web application security methods
  • Experience with Microsoft Office tools, VBScript, Crystal Reports, SQL / SQL Reporting Services, and SharePoint, Active Directory, AS400, Linux/Unix
  • Excellent planning and problem solving skills; must have high attention to detail and quality of work deliverables; must show strong customer service orientation
  • Excellent oral and written communication skills, as well as the ability to convey privacy, technical and security related issues to business audience
  • Experience making independent risk-based decisions for planning and incident management, with consideration for business and operational goals and constraints
  • Proven leadership and success in developing, deploying, and maintaining enterprise-level initiatives
  • Knowledge of information security fundamentals, information security policies and procedures, industry best practices as well as various governance standards and healthcare law (HITRUST, NIST, ITIL, HIPAA, HITECH, etc.)
  • Proven examples of displaying the IH values: Passionate, Caring, Respectful, Trustworthy, Collaborative and Accountable