Western & Southern Financial Group

Cybersecurity Governance Analyst III

Job Locations US-OH-CINCINNATI
ID
2025-24045
Category
Information Technology
Type
Full Time
Subsidiary
Western & Southern Financial Group

Overview

Provides support to business and IT teams including security consulting for major corporate initiatives and information security projects. Performs risk assessments, security assessments and policy reviews of WSFG systems and third-party vendors to identify areas of noncompliance with established information security standards and regulations, and helps recommend mitigations strategies and countermeasures. Provides security guidance to other IT and project teams in the evaluation, design, or implementation of secure computing environments. Develops, reviews, and monitors information security policies and procedures and makes recommendations for improvement. Identifies and defines overall security requirements for the proper operation and design of business and IT applications to ensure the protection of WSFG systems and data. Contributes to the development of the organization's information security awareness program. Escalates when needed and updates Director on a regular basis.

Responsibilities

What you will do:

  • Assists team in performing third-party vendor due diligence security reviews to ensure compliance with information security policy, security procedures, and regulatory requirements. Identifies and reports deficiencies or risks to the appropriate stakeholders. Follows up with business teams and third parties to escalate issues when necessary.
  • Participates in the effort to address identified IT audit findings and cybersecurity risks with corrective action plans. Works with senior team members to support process/program improvements. Conducts ongoing monitoring of the first-party security posture and performance. Acts as a liaison with Internal Audit on IT audits.
  • Works with project teams to ensure PMLC/SDLC tollgates are being met for security and that the appropriate security artifacts are being maintained. Helps in PMLC/SDLC planning and makes certain it assesses the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.
  • Conducts in-depth research to understand industry best practices, emerging trends and the latest open source methods that will help address current security challenges and enable new ways of delivering value to the Enterprise.
  • Works with IT and the business serving as a technical security consultant on IT and business projects. Provides input on complex business problems and helps deliver solutions that address risks to the corporate network and information assets. Ensures the appropriate level of controls are applied based on industry standards, best practices, and cybersecurity regulations by developing repeatable processes to identify, evaluate, and measure IT security risk.
  • Helps manage the information security policy lifecycle, including policy creation, policy maintenance, policy exception, and policy change requests. Works with them to help improve the overall security policy framework. Works with the business and IT management to ensure that the security policy framework and internal controls are being appropriate followed. Conducts risk assessments based on policy and control evaluations.
  • Contributes to the development, review, implementation, and maintenance of the organization's information security awareness program. Assists in effort to collaborate with HR and Corporate Communication teams to deliver security training and security awareness to associates and consultants."
  • Helps manage the remediation of audit and security review findings and recommendations.
  • Performs other duties as assigned.
  • Complies with all policies and standards.

Qualifications

  • Bachelor's Degree Computer Science, Computer Engineering, IT or a related technical field, or commensurate selection criteria experience. - Required
  • Typically requires at least five years of combined work experience in information assurance and security roles such as IT Audit, Risk, Compliance and Information Security. - Required
  • Experience in the areas of information security governance and third-party risk management. - Required
  • Experience working with IT risk and compliance frameworks such as NIST (preferred), ISO, COBIT, COSO, COBIT, etc. - Required
  • Experience working with best practices and industry cybersecurity regulations. - Required
  • Experience with information security, security awareness, and risk assessment and mitigation concepts, methodologies, and processes. - Required
  • Proven experience in completing assigned tasks accurately and on a timely basis. - Required
  • Proven ability to identify and assess the severity and potential impact of risks. - Required
  • Demonstrated inherent passion for information security and service excellence. - Required
  • Ability to identify project risks and gaps, developing creative and workable solutions to complex problems and policy issues. - Required
  • Strong team player - collaborates well with others to solve problems and actively incorporate input from various sources. - Required
  • Demonstrated strong analytical and problem-solving skills with the ability to grasp new concepts and apply them; effectively evaluates information / data to make decisions; anticipate obstacles and develop plans to resolve. - Required
  • Possess and display excellent verbal and written communication skills with ability to convey information to internal and external customers in a clear, focused, and concise manner. - Required
  • Demonstrated calm and professional demeanor when handling demanding situations. - Required
  • Proven ability to work with a team and multiple stakeholders to provide direction and oversight. - Required
  • Demonstrated self-starter with strong internal motivation. - Required
  • Proven ability to work under multiple deadlines and with minimal supervision. - Required
  • Basic computer, network, and system knowledge and skills with a thorough understanding of security controls. - Required
  • Strong proficiency in the use of Microsoft Office, particularly Word, Excel, PowerPoint. - Required
  • CISSP Certified Information Systems Security Professional Candidate encouraged to hold one or more of the following security certifications: Certified Information Systems Security Professional (CISSP), any GIAC certification or ISACA certifications. Upon Hire - Required

Work Setting/Position Demands:

  • Works in an office setting and remains in a stationary position for long periods of time while working at a desk, on a computer or with other standard office equipment, or while in meetings.
  • Requires the ability to verbally communicate and exchange accurate information to customers and associates on a regular basis.
  • Requires visual acuity to read and interpret a variety of correspondence, procedures, reports and forms via paper and electronic documents, visual inspection involving small defects; small parts, and/or operation of machinery (including inspection); using measurement devices continuously. Visual acuity is required to determine accuracy, neatness, and thoroughness of work assigned.
  • Requires the ability to prepare written correspondence, reports and forms using prescribed formats and conforming to rules of punctuation, grammar, diction, and style on a regular basis.
  • Requires the ability to apply principles of logical thinking to define problems, collect data, establish facts, and draw valid conclusions
  • Performs substantial movement of wrists, hands, and fingers for continuous computer work.
  • Extended hours required during peak workloads or special projects/events.

Travel Requirements:

  • None

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed

Need help finding the right job?

We can recommend jobs specifically for you! Click here to get started.