
Risk Analyst - Information Security
- Pittsburgh, PA
- Permanent
- Full-time
- Bachelor’s degree in Business, Technology, Cyber Security, Technology Risk Management or related field or hands-on and strong experience
- 5+ years experience within IT operations, Security or Risk management
- Strong analytical and problem-solving skills; ability to decipher and prioritize asks accordingly
- Strong interpersonal skills.
- Knowledge of industry Risk management frameworks, common mitigation practices, and\ Organizational control management.
- Demonstrate professional skepticism to ensure evidence is sufficient when assessing the relevant information security controls.
- Demonstrate an understanding of business processes, internal risk management strategies, IT controls, and how they interact together.
- Demonstrate proficiency in process formulation and improvement.
- Knowledge of operational security capabilities including access control, network security, secure configuration and vulnerability management, intrusion detection, security monitoring and incident response.
- Experience with auditors, both internal and regulatory to drive positive audit results with strong remediation paths.
- Proven solid written and oral communication skills with the ability to effectively communicate status, risks, and remediations to executive management.
- ISO 27001 standard knowledge is highly desirable.
- Governance and Risk Certification a plus (CRISC, CISM, CISA, or CISSP)
- Comprehensive Risk Identification, Assessment & Analysis:
- Lead and conduct comprehensive risk assessment to identify, prioritize and quantify potential and existing security threats and vulnerabilities across the organization’s systems, network, and applications.
- Utilize risk analysis methodologies and tools to assess the effectiveness of existing security controls and identify areas for improvement.
- Provide expert guidance on risk mitigation strategies and control implementation to minimize exposure to security risks.
- Develop risk management methodologies tailored to the organization’s specific risk profile and business priorities.
- Collaborate with stakeholders to establish risk tolerance levels and develop risk mitigation plans.
- Risk Remediation Planning & Execution:
- Develop remediation plans based on the findings of risk assessments, prioritizing actions to address critical vulnerabilities and mitigate high-risk threats.
- Work closely with relevant stakeholders to implement security controls and measures to remediate identified risks effectively.
- Monitor the progress of remediation efforts and provide regular updates to management on the status of risk mitigation initiatives.
- Conduct post-remediation reviews and analysis to validate the effectiveness of remediation activities and identify any residual risks.
- Risk-Awareness Culture:
- Drive clear, concise, pragmatic outcomes with senior business and technology leaders that balance risk with business objectives.
- Develop and implement security awareness programs and initiatives to educate employees on security risks, best practices, and their role in maintaining a secure environment.
- Foster a culture of accountability and responsibility for information security by encouraging active participation in risk identification, reporting, and mitigation efforts.
- Promote open communication channels for reporting concerns and potential risks, and ensure timely resolution and escalation as needed.
- Business Awareness & Continual Improvement:
- Anticipate the needs of leadership and facilitate as well as motivate those around you to identify solutions that both improve the security of our environment and advance business objectives.
- Maintain an external network to ensure our organization continuously analyzes new threats, trends, innovations, etc. to ensure our strategy and priorities stay appropriately aligned.
- Present balanced viewpoints of options and recommendations based on strong front-to-back understanding of existing capabilities and frameworks combined with a strong understanding of emerging technologies and best practices.
- Be curious about our business and seek to understand.
- Create an environment of continual improvement both inside and outside of direct team.
- Bring new ideas, methods, and approaches to this role. Leverage own expertise to challenge the status quo and drive decisions and actions necessary to improve our business processes and related technology
- Employee is required to work on a computer for up to 8 hours per day
- Employee may be in a sitting position for several hours per day
- Employee must be able to read small text on computer screens/monitors
- Employee is regularly required to talk and hear