Join our team to play a pivotal role in mitigating tech risks and upholding operational excellence, driving innovation in risk management.
As a Tech Risk & Controls Manager in Identity and Access Management, you will be responsible for identifying, and mitigating compliance and operational risks in line with the firm's standards. You will also provide subject matter expertise and technical guidance to technology-aligned process owners, ensuring that implemented controls are operating effectively and in compliance with regulatory, legal, and industry standards. By partnering with various stakeholders, including Product Owners, Business Control Managers, and Regulators, you will contribute to the reporting of a comprehensive view of technology risk posture and its impact on the business. Your advanced knowledge of risk management principles, practices, and theories will enable you to drive innovative solutions and effectively manage a diverse team in a dynamic and evolving risk landscape.
Job responsibilities
Develop and maintain robust relationships, becoming a trusted partner with Identity Access Management (IAM) technologists, audit, assessments teams, and partner LOBs to facilitate cross-functional collaboration and progress toward shared goalsEnsure effective identification, quantification, communication, and management of technology risk and controls, focusing on resolution recommendations and root cause analysisExecute reporting and governance of controls, policies, issue management, audit and regulatory activities and measurements, offering senior management insights into control effectiveness and inform governance workProactively monitor and evaluate IAM control effectiveness, identify gaps, and recommend enhancements to strengthen risk posture and regulatory complianceFacilitating and reviewing responses for Requests for Information (RFI’s) for (IAM) productsImplement and where needed establish governance processes to reduce risk from failed internal processes, inadequate identification of risks, inadequate controls, and emerging risksEstablish and oversee adherence to policies and standards impacting technology and cyber risks and identify and aggregate thematic risks and trends.Maintain an understanding of Product teams strategies, product roadmaps and key investment programs and be able to speak to high level design documents relating to the controls executed by individual IAM teamsApply working experience in multiple security or risk management domains (e.g., access management, application security, vulnerability management, data protection, encryption, logging and monitoring, network security) with a primary focus of Identity and Access ManagementAssess and document technology risks, effectively identifying and suggesting appropriate remediation plansIdentify and assist with implementing process improvement throughout the risk and control organization.Required qualifications, capabilities, and skills
5+ years of experience or equivalent expertise in technology risk management, information security, or related field, emphasizing risk identification, assessment, and mitigationFamiliarity with risk management frameworks, industry standards, and financial industry regulatory requirementsProficient knowledge and expertise in data security, risk assessment & reporting, control evaluation, design, and governance, with a proven record of implementing effective risk mitigation strategiesDemonstrated ability to influence executive-level strategic decision-making and translating technology insights into business strategies for senior executivesPreferred qualifications, capabilities, and skills
CISM, CRISC, CISSP, or similar industry-recognized risk and risk certifications are preferredExperience working in regulated industries, in particular leveraging technology standards, frameworks, compliance, and industry recognized best practice/standards (e.g., ITIL, NIST, ISO, PCI, SOC)Collaboration with internal and external technology audits (3rd Line of Defense), Operational Risk Management deep dives and testing (2nd Line of Defense), and the ability to advocate on behalf of subject matter expertsExperience working with tools such as FARM, CORE, Archer, Verum are preferred.