Service Center
CSCS TXResponsibilities
- Develop, maintain, and update security policies, procedures, and guidelines to ensure alignment with industry standards (e.g., ISO 27001, NIST).
- Assist in defining security governance frameworks and ensure adherence across the organization.
- Conduct risk assessments to identify and evaluate security risks within systems, processes, and third-party vendors.
- Evaluate third-party security controls and manage vendor compliance with organizational security requirements.
- Lead the design, development, and execution of compliance program to ensure that technology and business processes meet compliance requirements.
- Assist with managing all aspects of the compliance program, including gap assessment, risk management, risk mitigation, monitoring/auditing, policy administration, addressing violations, and performing corrective actions.
- Manage the monitoring of business and technology activities and risks for compliance with applicable rules and regulations of cybersecurity.
- Communicate complex issues in simple terms to executive management and team members.
- Conduct scoping and risk assessments to determine risk impact, meaningful control design, impact, and issues with the leadership team.
- Analyze risks around platform transaction processing and impact on compliance controls.
- Track relevant laws and regulations and update operating manuals, policies and procedures documents when regulations change related to cybersecurity.
- Prepare compliance status reports for internal management, clients and auditors.
- Grow Technology Compliance capabilities on-prem and in key cloud environments (e.g. Azure, GCP, Snowflake).
- Identify, develop, and implement monitoring activities for high risk, externally exposed applications
- Consult with key stakeholders on existing, modified, and future governance risk and controls activities including ones related to Sarbanes Oxley (SOX) and Internal Controller.
- Oversee daily operations of the Technology Compliance Dashboard in order to:
- Identify daily control gaps and monitor remediation to completion
- Troubleshoot technology issues within the dashboard
- Identify and document business requirements for new monitoring controls
- Work with various IT teams to convert business requirements into new monitoring controls
- Stay informed on key changes within the IT and cyber security environments to keep Technology Compliance procedures aligned with current processes and risks
- Review, critique, and recommend best practices for improving current processes through automation
- Promote a culture of cyber security risk awareness by providing subject matter expertise on control identification, implementation, monitoring, and best practices
- Maintain and develop existing and new contacts within the professional network of cyber security and IT risk management peers and consultants/vendors
- Continuously develop knowledge of evolving best practices through peer benchmarking, industry events/associations, and educational opportunities
Requirements
- Bachelor’s degree in computer science, Information Security, or related field
- Professional certifications such as CISSP, CISM, CISA, or equivalent
- 5+ years of experience working in cyber security, IT risk, audit, and/or IT compliance
- Strong knowledge of IT auditing and risk management techniques and IT general control processes (change management, systems development life cycle, information security, IT operations, etc.)
- Successful track record of positively influencing stakeholders
- Strong communication and presentation skills
- Experience establishing strong working relationships with business partners
- Demonstrated ability to work across organizational boundaries, and influence others
- Ability to define and manage internal projects and milestones and demonstrated leadership skills
- Demonstrated ability to develop and present risk information to all levels of an organization
- Experience with automating controls, data and analytics
- Strong understanding of IT Risk Management requirements and frameworks, including SOX, COBIT, and NIST CSF
Caliber uses E-Verify to confirm the identity and employment eligibility of all new hires.
Must be eligible to work in the U.S. with no restrictions.