המקום בו המומחים והחברות הטובות ביותר נפגשים
For years, the cybersecurity community has debated whether the CISO should report to the CIO or not. In regulated financial services, the answer is: both. The first-line CISO has operational responsibilities and reports to the CIO. The second-line Chief Tech Risk Officer (CTRO) and the Technology Risk Management (TRM) organization have broader responsibilities for cybersecurity but also reliability, software quality, resilience, and other technology risks. The CTRO is independent, reports to the Chief Risk Officer, and oversees the work of the CISO and the CIO.
As a member of a growing organization, you are expected to shape and further refine the risk program, and will have the opportunity to operate with both autonomy and empowerment from senior leadership. The demands and high-visibility nature of this position require an individual with a proven ability to lead a high-performing team in a fast-paced environment.
Desired Outcomes:
Inspire the team to provide better advisory and effective challenge services, aligned to our central Technology function and each Line of Business
Establish priorities for the team, balancing advisory and challenge activities with program improvements
Drive the team to ensure they prioritize the work that sparks deeper risk conversations and surfaces insights in support of strategic decision-making
Influence executives across the Lines of Business to take accountability for complex (and sometimes sensitive) technology and cyber risks
Ensure that the team is demonstrating strong judgment to balance being both a trusted advisor to the business and driving effective challenge
Leverage leadership experience and executive influencing skills to raise the level of challenge activities to a strategic focus
Constructively debate issues and connect the dots across various assessments (typically includes risk and control self-assessments, critical business process-level assessments, assessments of new initiatives, scenario analysis, challenge of risk acceptances, etc.)
Identify opportunities to influence risk-taking strategies and ensure that aggregate risk is understood
Demonstrate robust risk management oversight in supporting various internal audits and regulatory exams
Keeps pace with evolving cyber threat landscape to ensure ongoing relevance of cyber risk mitigation and has knowledge of leading Technology and Cybersecurity frameworks
Coach and develop associates to meet their professional development goals
A successful candidate will have:
Superb communication skills that include active listening and executive presentation skills
Excellent influencing and persuasion skills
Proven critical analytical, including and the ability to express a point of view supported by data (with both technical and non-technical audiences)
Comfort raising concerns early and knows when to escalate, including the ability to raise issues and facilitate constructive problem-solving at all levels of the organization
Passion and expertise in technology and cybersecurity domains, with an ability to be confident, respectful, and articulate when registering dissenting or unpopular opinions
Ability to collaborate effectively with colleagues, stakeholders, and leaders across multiple organizations to get consensus, socialize strategy, and achieve objectives
Track record of providing strategic direction to teams, peers, and stakeholders to drive results, solve problems, and influence outcomes
Personal resilience - the ability to to stay optimistic and keep their team focused during crises or times of change
Basic Qualifications:
A Bachelor’s degree or military experience
At least 9 years of experience in cybersecurity, technology, or risk management
At least 7 years of experience developing, evaluating, or implementing cybersecurity, technology or risk assessment activities
At least 6 years of experience with managing personnel
Preferred Qualifications:
A Master’s degree
Professional security/risk management certifications, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Informations Systems Auditor (CISA), Certified Risk & Information Systems Control (CRISC), or Open FAIR Certified
At least 12 years of experience with Technology or Cyber Security Risk Management
At least 9 years of experience with managing personnel
Experience in a second-line or oversight role at a financial institution or regulatory agency
Experience with scenario-based risk analysis methodologies or risk quantification techniques
Experience working in an Agile environment
Knowledge of supervisory expectations expressed in the FFIEC IT Handbook, Federal Reserve Supervisory Letters, Office of the Comptroller of the Currency Bulletins, and/or Federal Deposit Insurance Corporation Financial Institution Letters
. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
משרות נוספות שיכולות לעניין אותך