Perform in-depth third-party risk assessments, including evaluating security controls, reviewing documentation (e.g., SOC reports, SIG questionnaires, policy, and procedure documents), and identifying potential risks. Collaborate with business stakeholders, procurement, legal,...