Under the direction of the Manager Cyber Risk and Compliance, this individual plays a crucial role in bridging the gap between cybersecurity, IT and business operations. This person is expected to be both technically experienced and business-aligned as s/he works with both IT and business stakeholders to assess the risk and compliance of existing solutions and new initiatives.
We are seeking an experienced Cybersecurity Risk and Compliance Analyst to join our team. The successful candidate will be responsible for a multitude of service lines within cybersecurity, including risk assessments, interpretation and mapping of regulatory compliance mandates, security awareness and cybersecurity dashboards and KPIs.
This role is responsible for ensuring that governance, risk and compliance projects are effectively and efficiently executed, as well as identifying areas for improvement across the cybersecurity GRC lines of service.
This individual will be highly driven (“high motor”), able to balance active priorities, be meticulous and planful. They will be comfortable addressing ambiguity, able to consistently deliver results, be naturally curious and highly accountable, and approach situations in a thoughtful and process-oriented manner. This person will work closely with individuals at all levels of the information technology organization and business partners (executives, peers, staff members, individual contributors, cross-functional team members) to identify risk and compliance gaps, provide guidance on remediation, and provide consultation on adherence to ITT security policy for all aspects of the global organization.
|
· Review various regulatory compliance standards and mandates (i.e. NIST 800-171, CMMC2, NIS2, TISAX, etc..) and assess ITT business environments and practices against the requirements. · In instances where there are gaps between the compliance requirements and controls implemented by ITT, advise IT and business units on how to remediate the gaps. · Conduct risk assessments for solutions proposed by the business. · Perform risk assessments on vendors and other third parties with whom ITT wishes to conduct business. · Complete security questionnaires that are requested by ITT’s customers. · Communicate risk findings to stakeholders (well spoken and written English is a requirement to effectively communicate risk) · Review the risk of proposed firewall modifications, changes to user access to systems, and website access. · Maintain the cyber security awareness training program, including web-based training modules and phishing simulations. · Compile and present KPIs and KRIs related to cybersecurity and IT security functions. · Develop cyber training materials, such as posters and digital communications. · Maintain suites of information (e.g., SharePoint) to facilitate access by end-users. · Support cyber security governance in the formulation of cyber-related policies, standards and procedures. · Meet tight deadlines in a fast-paced environment. · Document processes and activities for repeatable results. · Other tasks and/or projects as assigned.
|
Education: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field; Professional certifications such as CISSP, CISM, CRISC, or CGRC are a plus. Experience: Minimum of 3 to 5 years of experience in cybersecurity, or another discipline with transferable skills. The ideal candidate will have a broad set of experiences (IT operation, systems administration, cybersecurity, audit) ranging subject matter areas such as risk identification and management, compliance frameworks and assessments, and cybersecurity administration. Skills/Knowledge: · Strong knowledge of security frameworks (e.g., NIST CSF and 800-53 and 171, ISO/IEC 27001) and regulatory requirements (e.g., GDPR, CMMC, NIS2). · Hands-on experience in interpreting compliance requirements and translating them into actionable control recommendations for the business to implement. · Ability to assess risk and compliance gaps in a complex, multi-technology, global environment. · Understand risk sources, potential impacts, and likelihood · Advise on risk response and mitigations to risk · Possess the ability to identify insecure ports/protocols · Strong troubleshooting, reasoning, problem solving · Demonstrated ability to write clear and concise technical documentation and policies · Ability to multi-task and change priorities with short notice · High standard of professionalism and ethics · Possess the ability to use Excel pivot charts, PowerBi, and similar technologies to compute and display metrics · Strong communication skills, with the ability to explain complex security concepts to non-technical stakeholders. · Knowledge of and experience with OT environments and ICS systems
|
Software Powered by iCIMS