מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר
For years, the cybersecurity community has debated whether the CISO should report to the CIO or not. In regulated financial services, the answer is: both. The first-line CISO has operational responsibilities and reports to the CIO. The second-line Chief Tech Risk Officer (CTRO) and the Technology Risk Management (TRM) organization have broader responsibilities for cybersecurity but also reliability, software quality, resilience, and other technology risks. The CTRO is independent, reports to the Chief Risk Officer, and oversees the work of the CISO and the CIO.
As a Manager for Identity & Access Management, you will have a foundational understanding of all areas of identity & access management in the public cloud (Amazon Web Services and/or Google Cloud Platform). This role will serve as our subject matter expert for cloud native identity & access management solutions. This position will provide risk analysis, design review, and advise on roadmaps and implementation plans with security, technology, and architecture best practice viewpoints. This position will also collaborate closely with associates in first line Cyber, Technology, as well as other risk management offices to perform and support risk and security assessments of the cloud environment.
Responsibilities:
Play a lead role in identifying areas of cyber risk to provide oversight, analysis, effective challenge, and risk-informed recommendations for enhancement.
Provide technical assessments of cybersecurity and controls design and effectiveness.
Draft assessments for senior management and other stakeholders, to include regulatory agencies and the Board of Directors, as needed.
Stay current on emerging cyber threats and potential implications to the firm.
Collaborate effectively with colleagues, stakeholders, and leaders across multiple organizations to achieve objectives.
Coordinate program-related activities and deliverables to ensure effective collaboration within the team and across stakeholder groups.
Basic Qualifications:
Bachelor’s Degree or military experience
At least 3 years experience with Google Cloud Platform architecture, operations, security or deployments
At least 3 years of experience working with Identity & Access Management programs or tools (SailPoint, Ping Identity, GCP Privileged Access Management)
At least 1 year of experience in project management
Preferred Qualifications:
Master’s Degree in Computer Science or Engineering
3+ years of public cloud experience with public cloud architecture, operations, security or deployments
1+ years of experience developing presentations for senior level audiences
Experience leading large-scale migrations to the Public Cloud (Google Cloud Load Balancing, DNS, Interconnect, CDN, Compute, Networking, Storage, Security, Monitoring)
Google Certified Professional - Cloud Architect
Experience with identifying and communicating key risks related to GCP implementations and architectures
Experience with risk analysis and reports that describe the risk implications to executives
Familiarity with controls and control frameworks (NIST Cybersecurity Framework, NIST 800-53, CIS Top 20, OWASP Top 10, ISO, COBIT)
Prior experience working in financial services or other highly-regulated sectors
Experience with security best practices for generative AI development and deployments
. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
משרות נוספות שיכולות לעניין אותך