- Bachelor's Degree Computer Science, Computer Engineering, IT or a related technical field, or commensurate selection criteria experience. - Required
- Typically requires at least five years of combined work experience in information assurance and security roles such as IT Audit, Risk, Compliance and Information Security. - Required
- Experience in the areas of information security governance and third-party risk management. - Required
- Experience working with IT risk and compliance frameworks such as NIST (preferred), ISO, COBIT, COSO, COBIT, etc. - Required
- Experience working with best practices and industry cybersecurity regulations. - Required
- Experience with information security, security awareness, and risk assessment and mitigation concepts, methodologies, and processes. - Required
- Proven experience in completing assigned tasks accurately and on a timely basis. - Required
- Proven ability to identify and assess the severity and potential impact of risks. - Required
- Demonstrated inherent passion for information security and service excellence. - Required
- Ability to identify project risks and gaps, developing creative and workable solutions to complex problems and policy issues. - Required
- Strong team player - collaborates well with others to solve problems and actively incorporate input from various sources. - Required
- Demonstrated strong analytical and problem-solving skills with the ability to grasp new concepts and apply them; effectively evaluates information / data to make decisions; anticipate obstacles and develop plans to resolve. - Required
- Possess and display excellent verbal and written communication skills with ability to convey information to internal and external customers in a clear, focused, and concise manner. - Required
- Demonstrated calm and professional demeanor when handling demanding situations. - Required
- Proven ability to work with a team and multiple stakeholders to provide direction and oversight. - Required
- Demonstrated self-starter with strong internal motivation. - Required
- Proven ability to work under multiple deadlines and with minimal supervision. - Required
- Basic computer, network, and system knowledge and skills with a thorough understanding of security controls. - Required
- Strong proficiency in the use of Microsoft Office, particularly Word, Excel, PowerPoint. - Required
- CISSP Certified Information Systems Security Professional Candidate encouraged to hold one or more of the following security certifications: Certified Information Systems Security Professional (CISSP), any GIAC certification or ISACA certifications. Upon Hire - Required
Work Setting/Position Demands:
- Works in an office setting and remains in a stationary position for long periods of time while working at a desk, on a computer or with other standard office equipment, or while in meetings.
- Requires the ability to verbally communicate and exchange accurate information to customers and associates on a regular basis.
- Requires visual acuity to read and interpret a variety of correspondence, procedures, reports and forms via paper and electronic documents, visual inspection involving small defects; small parts, and/or operation of machinery (including inspection); using measurement devices continuously. Visual acuity is required to determine accuracy, neatness, and thoroughness of work assigned.
- Requires the ability to prepare written correspondence, reports and forms using prescribed formats and conforming to rules of punctuation, grammar, diction, and style on a regular basis.
- Requires the ability to apply principles of logical thinking to define problems, collect data, establish facts, and draw valid conclusions
- Performs substantial movement of wrists, hands, and fingers for continuous computer work.
- Extended hours required during peak workloads or special projects/events.
Travel Requirements: