Temporary Duration : Approximately 12 months
Job Summary
Salary under Review
Reporting to the IT Security Manager, the IT Security Compliance and Risk Specialist is responsible for analyzing, interpreting and developing solutions and strategies to manage the internal and external IT security audits and assessments. Acting as the liaison between potential auditors and technical teams, this role leads conversations with, and collaborates with key invested parties to identify risks and to ensure IT implemented solutions are compliant with corporate policies, regulations, and standards. The role is also responsible for monitoring remediation of audit findings up to completion, as well ensuring any mitigation strategies and security controls for all IT related findings are completed and documented.
Education
- Bachelor’s degree in Information Technology, Computer Science, related discipline or equivalent combination of education and experience.
Knowledge
A minimum of 5 years of experience managing IT audits, risk and compliance is required preferably within the public sector or medium to large-sized organization;A security certification through an accredited organizationAddition Information security certifications (CRISC, CISM, CGEIT, CISSP, CCSP or GIAC) are considered an assetExperience working with auditors and the evidence collection processKnowledge of regulatory and industry standards such as ISO, NIST, COBIT, GDPR and other security frameworksUnderstanding of information systems and networks and all areas of Information Security including data protection, incident management, and vulnerability managementExperience working with Security training tools, including creating and launching phishing campaigns, and remedial trainingKnowledge of development and management of business continuity and disaster recovery planningPrevious experience with IT systems threat / risk assessments, IT audits and regulatory compliance such as SOX and GDPR would be an assetExperience with cloud security controls and administration such as AWS and Azure would be an assetResponsibilities
Compliance and Risk Auditing (40% of time)
Assesses risks and internal control dependency on systems by identifying areas of non-compliance and evaluating risks related to key technology processes.Co-ordinates timely activities as it relates to internal, external and regulatory audit requests including SOX, SOC1, SOC2;Conducts and reviews business impact analysis, implements and coordinates disaster recovery planning and disaster recovery exercises where required;Conducts risk assessments and supports the invested parties in determining the appropriate treatment of identified risks; identify appropriate action plans for risk remediation;Inventory, assess significance, assign accountability, and develop appropriate monitoring for the control environment;Conducts IT compliance reviews including user access reviews, risk assessments, control objectives monitoring, and third party assessments;Liaises with Information Privacy Assessment Office and identify IT compliance requirements and assist with creation and maintenance and coordinate IT responses to regulatory audits;Works with and supports the development of the risk and compliance practice with IT management and the leadership team.Assists in the creation and maintenance of the information security risk register, audit requests, and third party consultant / vendor assessments.Assist in gathering information asset inventory, including identification and valuation, including any strategies and methodologies around loss scenariosLeads complex analysis, develops and generates KRIs / KPIs, validates compliance and develops actionable recommendations.Works with and supports the existing IT Security training platforms to identify high risk business users within the organization.Information Security (30% of time)
Conducts information systems controls assessments.Reviews and administers the Incident Response Process, and ensures updates to and ongoing assessments are coordinated as required.Reviews and actions the latest Indicators / Endpoints of Compromise as required, ensuring issues are addressed in a timely fashion to mitigate any potential attack(s).Performs the necessary technical support as required, in order to support the Corporate Security strategy and processes, such as remediation actions and / or tactics that may be deployed as a result of a security scan result.Documents, tracks and investigates information security events, requests, and incidents;Implements and reviews information security policies, guidelines, procedures, training materials, awareness campaigns, internal bulletins and portal contents.Development, Administration, and Implementation of IT Risk Policies, Procedures, Guidelines and Standards (20% of time)
Supports the invested parties in understanding and applying IT risks, security best practices and processes framework;Performs consultation and development of the IT objectives and requirements of the risk program;Partners with IT managers and team members to ensure risk and compliance issues are identified, defined, communicated, and addressed.Provides effective mentoring and guidance to other IT personnel and may assist in developing policy, standards and procedures.Collaborates in change management communications and processes, with focus on facilitating risk and compliance training for all affected staff.Disaster Recovery & Business Continuity & Incident Response (10% of time)
Business Continuity and Disaster Recovery program administration including conducting impact assessments, disaster recovery plans development and coordinating disaster recovery#J-18808-Ljbffr