Description
Join our team to play a pivotal role in mitigating tech risks and upholding operational excellence, driving innovation in risk management.
As a Tech Risk & Controls Manager in Identity and Access Management, you will be responsible for identifying, and mitigating compliance and operational risks in line with the firm's standards. You will also provide subject matter expertise and technical guidance to technology-aligned process owners, ensuring that implemented controls are operating effectively and in compliance with regulatory, legal, and industry standards. By partnering with various stakeholders, including Product Owners, Business Control Managers, and Regulators, you will contribute to the reporting of a comprehensive view of technology risk posture and its impact on the business. Your advanced knowledge of risk management principles, practices, and theories will enable you to drive innovative solutions and effectively manage a diverse team in a dynamic and evolving risk landscape.
Job responsibilities
Develop and maintain robust relationships, becoming a trusted partner with Identity Access Management (IAM) technologists, audit, assessments teams, and partner LOBs to facilitate cross-functional collaboration and progress toward shared goals
Ensure effective identification, quantification, communication, and management of technology risk and controls, focusing on resolution recommendations and root cause analysis
Execute reporting and governance of controls, policies, issue management, audit and regulatory activities and measurements, offering senior management insights into control effectiveness and inform governance work
Proactively monitor and evaluate IAM control effectiveness, identify gaps, and recommend enhancements to strengthen risk posture and regulatory compliance
Facilitating and reviewing responses for Requests for Information (RFI’s) for (IAM) products
Implement and where needed establish governance processes to reduce risk from failed internal processes, inadequate identification of risks, inadequate controls, and emerging risks
Establish and oversee adherence to policies and standards impacting technology and cyber risks and identify and aggregate thematic risks and trends.
Maintain an understanding of Product teams strategies, product roadmaps and key investment programs and be able to speak to high level design documents relating to the controls executed by individual IAM teams
Apply working experience in multiple security or risk management domains (e.g., access management, application security, vulnerability management, data protection, encryption, logging and monitoring, network security) with a primary focus of Identity and Access Management
Assess and document technology risks, effectively identifying and suggesting appropriate remediation plans
Identify and assist with implementing process improvement throughout the risk and control organization.
Required qualifications, capabilities, and skills
5+ years of experience or equivalent expertise in technology risk management, information security, or related field, emphasizing risk identification, assessment, and mitigation
Familiarity with risk management frameworks, industry standards, and financial industry regulatory requirements
Proficient knowledge and expertise in data security, risk assessment & reporting, control evaluation, design, and governance, with a proven record of implementing effective risk mitigation strategies
Demonstrated ability to influence executive-level strategic decision-making and translating technology insights into business strategies for senior executives
Preferred qualifications, capabilities, and skills
CISM, CRISC, CISSP, or similar industry-recognized risk and risk certifications are preferred
Experience working in regulated industries, in particular leveraging technology standards, frameworks, compliance, and industry recognized best practice/standards (e.g., ITIL, NIST, ISO, PCI, SOC)
Collaboration with internal and external technology audits (3rd Line of Defense), Operational Risk Management deep dives and testing (2nd Line of Defense), and the ability to advocate on behalf of subject matter experts
Experience working with tools such as FARM, CORE, Archer, Verum are preferred.