Information Systems Technology Services is a unified organization comprised of various departments which collaborate effectively in order to deliver high quality technology solutions. The Cyber Security Controls Assessment & Verification family is responsible for the assessment, verification, review, and audit of General Computer Controls across the enterprise.
Position Summary
The Cyber Security Controls Assessment family is responsible for the assessment, verification, review, and audit of General Computer Controls and/or business process controls across the enterprise. The Cyber Security Controls Assessor, Expert ("Assessor") will be responsible for assessments which will require review and evaluation of IT and/or business systems and processes for compliance with defined regulatory standards, internal processes, and procedures. Additionally, the Assessor will be responsible for the identification of risks, evaluation of control deficiencies, and recommendation on remediation efforts consistent with IT organizational policies, standards, procedures, and regulatory requirements.
Job Responsibilities
Perform multi-platform (application, database, operating system, middleware, monitoring tools, and business processes) level assessments based on predefined test objectives and test plans. Perform retest of controls that have been remediated or updated as a result of previously identified deficiencies.
Obtain, review, and interpret evidence provided to validate controls are performed effectively
Prepare, plan, conduct, and report IT Compliance assessments on data privacy in accordance with industry best practices and established regulatory standards (e.g. NIST SP800-53)
Develop test procedures and/or document recommendations for test plan modifications that improve validation of control objectives
Obtain, review, and interpret organizational IT policies, standards, and procedures to identify control points that would assist in mitigating risk to the business
Review test results or interpret evidence for vulnerabilities, gaps, or control deficiencies; work with stakeholders to establish plans for sustainable resolution
Identify risks associated with control failures and support the identification of mitigating controls
Analyze emerging legislation or changes to regulations and contribute to the development/ refinement of compliance strategy for areas of responsibility
Engage management in discussion about creative, efficient, and effective was to improve internal data security control environment
Partner with control owners to ensure control documentation is updated periodically to reflect current control environment and company standards
Capture and report metrics for services and activities delivered to customers and/or as part of internal initiatives
Serve as the point of contact for compliance for areas of responsibility
Coordinates with SMEs preparation of data responses in support of audits
Work closely with business partners to align overlapping compliance efforts and eliminate redundant work
Perform other tasks as necessary to ensure that the Compliance meets its commitments to customers
Provide consultative direction to and review the quality of deliverables prepared by less experienced team members
Support activities to strengthen the Compliance Program
Support the IT Compliance leaders on IT Compliance Program Maturity as needed
Support the Compliance Sr. Manager/Manager as needed
Qualifications
Minimum:
BA/BS in Computer Science, or related field, or equivalent work experience
Minimum 8 years of IT security or IT risk management experience
At least one existing certification from the following list, which must be a currently maintained and valid certification:
Certified Information Systems Security Professional (CISSP)
Certified Information Systems Auditor (CISA)
Certified in Risk and Information System Control (CRISC)
Desired Experience:
Utility Industry Experience
Big 4 experience
Experience with Sarbanes-Oxley (SOX), or National Institute of Standards and Technology (NIST) SP800-53 security controls catalog.
Certified Ethical Hacker (CEH)
Information Technology Infrastructure Library (ITIL)
Microsoft Certified Professional/Security Engineer (MCP, MCSE)
Cisco Certified Network Associate/ Professional (CCNA, CCNP)
Certified Information Security Manager (CISM)
Knowledge, Skills, and Abilities:
Strong oral and written communication skills
Strong analytical skills
Solid understanding of network and systems security, system and network configuration, and application security
Solid understanding of general computing controls (GCCs)
Able to identify complex control gaps.
Solid understanding of generally applicable and accepted auditing standards and framework (e.g. COBIT) and best practices for IT services management (e.g., ITIL), government guidelines and laws (e.g. Sarbanes Oxley Act, NERC/CIP)
Excellent planning, organizational, and project management skills
Able to multi-task projects or assessments
Ability to work with minimal supervision in a fast-paced environment
Ability to mentor and review work products of less experienced staff
Detail oriented
Background in process development and process improvement