Hyderabad, Telangana, India
16 hours ago
Tech Risk and Controls Senior Associate

Join our dynamic team to navigate complex risk landscapes and fortify technology governance, making a pivotal impact in our firm's robust risk strategy.

As a Tech Risk & Controls Senior Associate in Commercial Investment Bank, you will contribute to the successful management of technology-aligned aspects of Governance, Risk, and Compliance in line with the firm's standards. Leverage your broad knowledge in risk management principles and practices to assess and monitor risks and implement effective controls. Your role in risk identification, control evaluation, and security governance is crucial in advising on complex situations and enhancing the firm’s risk posture. Through collaboration and analytical skills, you will contribute to the overall success of the Technology Risk & Services team and ensure compliance with regulatory obligations and industry standards.

Job responsibilities

Assess and monitor technology risks, ensuring compliance with firm standards, regulatory requirements, and industry best practicesSupport implementation of effective controls in collaboration with cross-functional teams and stakeholdersEvaluate the effectiveness of existing controls, identify gaps, and recommend improvements to mitigate risks and enhance the firm's risk postureAnalyze complex situations, provide advice on risk management strategies, and support the implementation of risk mitigation measures 

Required qualifications, capabilities, and skills

3+ years of experience or equivalent expertise in technology risk management, information security, or a related field, with a focus on risk identification, assessment, and mitigationExperience in risk identification, assessment, and control evaluation, with a strong understanding of industry standardsDemonstrated ability to analyze complex issues, develop and implement risk mitigation strategies, and communicate effectively with senior stakeholdersProficient knowledge of risk management frameworks, regulations, and industry best practices Knowledge of multiple IT control and project management practices and experience working across large environmentsProficient in information security domains, including policies and standards, risk and control assessments, access controls, regulatory compliance, technology resiliency, risk and control governance and metrics, incident management, secure systems development lifecycle, vulnerability management, and data protectionExperience in Security and /or Risk Management and / or Corporate Technology with an aptitude in application and platform securityCISM, CRISC, CISSP, or other industry-recognized risk certificationsFamiliarity with SQL, Excel, Alteryx, Tableau and preferably Python. Exposure to gen AI / LLM will be an added advantagePreferable experience with ServiceNow, Confluence and JIRA. Preferable experience working with modern architectures like cloud computing.  AWS certification a plus.Preferable experience working in regulated industries, in particular leveraging technology standards, frameworks, compliance, and industry recognized best practice / standards (e.g. NIST, ISO, PCI, SOC).Preferable experience of Secure Software Development Life Cycle (SSDLC) (e.g. code review, risk assessments, threat modeling, static code analysis, and dynamic application scanning)

 

Preferred qualifications, capabilities, and skills

CISM, CRISC, CISSP, or other industry-recognized risk certificationsFamiliarity with SQL, Excel, Alteryx, Tableau and preferably Python. Exposure to gen AI / LLM will be an added advantagePreferable experience with ServiceNow, Confluence and JIRA. Preferable experience working with modern architectures like cloud computing.  AWS certification a plus.Preferable experience working in regulated industries, in particular leveraging technology standards, frameworks, compliance, and industry recognized best practice / standards (e.g. NIST, ISO, PCI, SOC).Preferable experience of Secure Software Development Life Cycle (SSDLC) (e.g. code review, risk assessments, threat modeling, static code analysis, and dynamic application scanning)
 
Confirm your E-mail: Send Email