Senior Cybersecurity Risk Officer
Company | Truist |
---|---|
Location | Raleigh, NC, USA, Richmond, VA, USA, Charlotte, NC, USA, Atlanta, GA, USA |
Salary | $Not Provided – $Not Provided |
Type | Full-Time |
Degrees | Bachelor’s, Master’s |
Experience Level | Senior, Expert or higher |
Requirements
- Bachelor’s degree in financial-related discipline, or equivalent education and related training
- Fifteen years of experience or equivalent proficiency in managing people with demonstrated high competency in recruiting, developing, and coaching/mentoring
- Fifteen – Twenty years of experience in a financial institution with emphasis on risk management or equivalent work experience
- Ten years of large scale technology operations and infrastructure background, including extensive knowledge of technology policy, procedures and regulations
- Knowledge of key technology rules/regulations and technology risk management practices (e.g. Federal Financial Institutions Examination Council (FFIEC), Control Objectives for Information and Related Technology (COBIT), NIST (National Institute of Standards and Technology), Information Technology Infrastructure Library (ITIL)).
- Excellent leadership skills including the ability to lead direct and indirect reports
- Excellent communication (verbal and written), presentation and facilitation skills; ability to influence and communicate with impact
Responsibilities
- Provide independent risk oversight (i.e. second line of defense/LOD2) for Truist Technology through the effective identification, mitigation, monitoring and reporting of operational, technology, and compliance related risks within Enterprise Technology with a specifics focus on the Cyber and Identity and Access Management domains.
- Provide Cyber and Information Security Risk governance that supports the Truist organization’s strategies and objectives while operating within established risk appetites; Provide effective challenge of the Corporate Cybersecurity Strategy for Truist
- Lead engagement of peer institution second line functions to influence the industry build of the tech risk / cyber second line functions
- Lead execution of independent second line Red Team / Penetration Testing; work is typically commissioned by the Board, the CEO and / or the CRO.
- Ensure that cyber / information security risk resources, activities and initiatives are aligned to enable and sustain achievement of business objectives within forecasted spend rates while reducing risks;
- Provide independent assessment and oversight of the maturity of information security and adequacy of cyber controls pertaining to information security in meeting agreed to business outcomes for performance, stability, security and service availability. Assessments should leverage agreed upon metrics produced by Business Unit Risk Management (BURM) /first line of defense – LOD1) but challenged and validated as appropriate;
- Review and attest to/challenge adequacy of risk assessments (i.e. Risk & Control Self-Assessments, Application Assessments, Change Risk Assessments) produced by BURM;
- Serve as member of the Technology Risk Committee and participate in the Enterprise and Board Risk Committees and the Board Technology Committee, when applicable for Cybersecurity topics;
- Ensure effectiveness and structure in regulatory engagement practices, including responses out of the Corporate Cyber Security Group;
- Encourage and monitor Cyber education, skills training and adoption goals to drive improved Cyber risk culture and awareness
- Engage on Technology Risk policy governance. Provide direction and guidance in the development, implementation and communication of Cybersecurity policies, procedures and standards; Oversight of multiple enterprise-wide policies including Cyber Security and Identity and Access Management and Truist Cloud.
- Monitor, assess and challenge as appropriate significant third-party and vendor relationships within Enterprise Technology;
- Develop and maintain effective channels of communication with other CROs, control functions, Senior Business Unit (BU) management, as well as regulatory agencies;
- Lead, manage and develop teammates directly and indirectly; influence cybersecurity talent management through recommendations to Truist senior leadership, including the Board of Directors, to inform decisions on resource allocations to close control gaps.
Preferred Qualifications
- Master’s degree in Finance or Business equivalent
- Professional designations such as Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (Information Systems Audit and Control Association) (CRISC), Certified Project Manager (CPM)
- Strategic business and financial planning experience
- Experience with audit processes and techniques