
Cybersecurity Risk Assessor
- Southlake, TX
- $115,000-125,000 per year
- Permanent
- Full-time
- Receive and triage new assessment requests relating to on-prem, public cloud, third party, acquired applications, processes, and standards. Review inherent risk characteristics and validate the inherent risk is accurate to prepare for assessment.
- Partner with a distributed team consisting of security architects, engineers, and risk practitioners to determine the assessment scope and rigor based on inherent risk
- Maintain coordination and organization of assessments in flight between all key security teams involved throughout the lifecycle of the assessment.
- Translate control gaps identified from security architecture and engineering teams into security conditions and documented issues in a risk-based language that can be shared with application and system owners for remediation.
- Coordinate with application and technology teams and explain gaps which need actioning prior to production release, while communicating risks identified by assessment up to senior management.
- Document effectiveness of the application/system, process, or third party and the residual risk resulting from the assessment.
- Prepare a detailed cybersecurity risk assessment report based on existing risk reporting models and templates.
- Perform continuous monitoring and tracking of identified gaps and provide regular risk updates to senior management
- Create and present risk posture discovery and recommendation reports to risk management leadership.
- Develop and deliver executive-level reporting and presentations outlining cyber risks, risk velocity/trending, and status of defined action plans.
- Identify and manage continuous improvements in various areas, including automation of risk assessments, leadership reporting activities, development and maintenance of risk-related information, and audit and/or regulatory areas.
- Contribute to the creation and ongoing development of security and control metrics.
- Support maturing cyber risk governance through development of standard processes and procedures.
- Advocate and promote awareness of cyber risks to business and technical partners.
- Build strong relationships and partner closely with security and technology partners across Charles Schwab Corporation and its affiliates.
- Develop internal processes to increase team efficiencies and continually mature operations.
- Other risk related responsibilities as identified
- May travel minimally as needed
- 3-5 years of relevant experience in the disciplines of information security, risk assessment activities or information security compliance with strong hands-on experience in security risk assessments.
- Superior attention to detail and focus on quality work delivery
- Expertise in information security best practices and technology risk management disciplines, including knowledge and familiarity with a broad range of IT and information security products and technologies such as Network Security, Cryptography, Identity and Access Management, Vulnerability Management, Logging and Monitoring, Cloud Platforms, and Application Security.
- Familiar with one or more regulatory requirements and laws such as, but not limited to, PCI, Federal Financial Institutions Examinations Council, Sarbanes-Oxley Act, HIPAA, GDPR and GLBA. Additionally, experience in one or more: ISO 27001, ITIL and NIST. General understanding of the Factor Analysis of Information Risk methodology
- Working knowledge of software development practices and technologies.
- Understanding of information security or technology risks.
- Experience in developing performance or risk metrics, and executive dashboards.
- Excellent analytical & technical skills, able to research problems, determine root causes and solutions.
- Experience using and administering collaboration platforms such as MS SharePoint, Confluence, or JIRA.
- Must be a self-starter and able to work independently, as part of a team, and lead working groups as required.
- Work ethic based on a strong desire to exceed expectations.
- Ability to work successfully in a fast-paced, results-oriented environment. Requires excellent time management skills, ability to appropriately prioritize multiple, competing demands.
- Ability to translate technical control gaps into risk statement language.
- Bachelor’s Degree in Computer Science or related discipline.
- Relevant certifications or ability to obtain information security certifications such as CISSP, CCSP, CCSK, CISM or CRISC.