

Candidate must be willing to enroll in Associate Investment Monitoring due to the nature of the role and access.
What You’ll Do
Why You’ll Love Working Here
Required Qualifications
Desired Qualifications
Skills:
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
1st shift (United States of America)משרות נוספות שיכולות לעניין אותך

Job Description:
Seeking a detail-oriented and proactive team member to help transform business data into clear, actionable insights. This role is responsible for supporting the creation, improvement, and automation of recurring reports, helping leaders make data-driven decisions. Generally requires 5 years of experience.
Key Responsibilities:
• Maintain and enhance recurring business reports to ensure stakeholders receive accurate and timely insights.
• Streamline and automate reporting processes to improve efficiency and reduce manual effort.
• Collaborate with team members and business partners to understand reporting needs and develop solutions that provide clarity and value.
• Support data organization and visualization efforts to help teams easily access and interpret information.
• Identify opportunities to improve reporting processes and deliver actionable recommendations.
REQUIRED QUALIFICATIONS
•
Experience in Alteryx, Tableau and SharePoint
• Strong attention to detail and organizational skills.
• Ability to work independently while collaborating with multiple stakeholders.
• Comfortable learning and working with tools that help organize, visualize, and automate data (experience with reporting or dashboards is a plus).
• Problem-solving mindset and eagerness to improve processes.
Your work will directly support business decisions by providing timely, clear, and accurate reporting. By improving and automating existing processes, you will help the team work more efficiently and focus on driving results.

Job Description:
Job Description:
The Cyber Security Regulatory Engagement Lead is responsible for developing and supporting responses for audit, regulatory and compliance requests. Key responsibilities include applying knowledge of laws, rules, regulations and information security concepts (e.g., NIST, COBIT, ISO) to develop and write clear documentation and communications. Job expectations include drafting written responses and partnering with Global Information Security teams to validate accuracy of proposed communications.
Responsibilities:
Requirements:
Skills:
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
1st shift (United States of America)
Job Description:
The Third Party Cyber Assurance Tech Manager is responsible for managing a portfolio of assessors charged for executing information security assessments with the bank's third parties located within the United States, LATAM and Canada. In this role, you will provide tactical
• Identification of process optimization opportunities, including technology and work flow enhancements
• Work across the assessment and remediation verticals to ensure processes are aligned to meet TPCA procedures end-to-end
• Assist with resource planning to ensure the program has the necessary resources to effectively execute their assessments
• Stay aware of emerging cybersecurity trends and help determine if/when to integrate item into the assessment program
• Support inquiries into the programs operations and/or assessment results from internal risk and support partners from GIS and the LOBs
• Experience communicating to Sr. Management
• Experience working within the risk framework to execute assessments
• Strong people management skills
• Ability to work independently on initiatives with little oversight; motivated and willing to learn
• Strong analytical skills/problem solving/conceptual thinking
• Must be comfortable in delivering messages across a wide spectrum of individuals having varying degrees of technical understanding
• Ability to direct personnel towards a set of goals and hold them accountable
• Experience developing and implementing new processes/procedures
• Experience working with global and/or virtual teams.
• Ability to work with Technical and Non-Technical business owners
• Experience in Sourcing/Vendor Management, Business Continuity & recovery, Data Transmission, Privacy domains
• Experience supporting regulatory or sector policy initiatives.
• Experience with assessments based on relevant threat intelligence (network penetration testing, Red Teaming, etc.).

Job Description:
Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.
Role Description/what you can expect in Identity & Access Management:
In today’s highly connected world, managing and securing human and machine identities is essential to the safety and success of our workforce. The Identity & Access Management (IAM) team works within Global Information Services (GIS) and in close participation with all other Line of Business teams as well as second and third line of defense partners. Identity and Access Management is the centralized governance function for the enterprise, driving consistency through end-to-end horizontal risk oversight as well as vertical, functional capabilities that provide comprehensive subject matter expertise on all IAM systems and services. This role is highly visible and requires frequent interaction with senior management and key stakeholders. In this role, the IAM Governance Analyst will be responsible for identifying IAM policy requirements, monitoring adherence, escalating compliance risks, driving remediation strategies and plans, as well as leading coordination for regulatory activities, e.g. audits, compliance self-testing activities, and regulatory exams.
Responsibilities:
Support the planning, development and delivery to improve IAM compliance through governance activities
Work with the Line of Business (LOB) Partners to manage identity lifecycle and access governance activities including developing, maintaining, and facilitating the socialization of IAM policy standards, processes, and procedures.
Provide extensive Active Directory security best practices and consultation to the cross functional teams, ensuring compliance with IAM standards, and better protect high value assets against cyberattacks.
Drive the implementation of Microsoft Privileged Access Enterprise Access and Tiered Administration models.
Ensure the Privileged Access Enterprise Access model delivers resiliency mitigating attack paths and provide efficient security controls for protecting high value assets.
Provide informative documentation and oversee governance and security of on-premises and cloud identities in hybrid environment.
Collaborate with stakeholders to develop cutting-edge IAM policies and standards that iteratively support IAM enhancements across process, data, and technology.
Engage and consult with all IAM capabilities to identify gaps and establish solutions to close gaps.
Maintain end-to-end governance processes across the IAM space with aligned controls and metrics to evaluate control effectiveness.
Participate in multiple forums with high level executives to communicate compliance expectations, provide strategic direction and oversight, and provide a mechanism for reviewing decisions with downstream impacts.
Drive partnership with Operational Risk partners on IAM related Compliance Monitoring and Testing activities.
Apply industry best practices, templates, and documentation while also proposing improvements.
Clearly articulate the reasons and methods behind proposed changes through informative materials for educating others.
Provide education to team members regarding the proposed changes.
Required Qualifications:
Ability to manage data and conduct data analytics, reviewing responses prior to delivery of regulatory, audit, and process responses.
Recommended 3-5 years’ experience implementing IAM solutions, controls, and capabilities.
Proficient in implementing and governing Risk and Role based access security controls in Active Directory.
Extensive experience in managing Active Directory to enforce privileged access controls.
Ability to influence cloud technology owners to build more secure processes.
Strong understanding and risk management mindset, proactively mitigating PAM related risks.
Familiarity with NIST 800-53, COBIT, COSO, and/or ISO, and attack frameworks such as MITRE , as well as IAM-specific laws, rules, and regulations within the financial services sector.
Experience planning, researching and developing security strategies, standards, and procedures.
Strong technical background and ability to learn new technologies quickly.
Ability to identify, analyze and address problems to resolve issues whenever possible in a way that minimizes negative impact and risk to the organization.
Ability to work independently on initiatives with little oversight. Motivated and willing to learn.
Strong analytical skills / problem solving / conceptual thinking.
Ability to be comfortable delivering messages across a wide spectrum of audiences with varying degrees of technical understanding.
Strong leadership skills and qualities which enable you to work with peers and various levels of management.
Excellent interpersonal and communication skills
Ability to question processes for the purpose of improving them.
This job will be open and accepting applications for a minimum of seven days from the date it was posted

Job Description:
Role Responsibilities
Required Skills:
Beneficial but not required:
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
1st shift (United States of America)
Job Description:
Job Description:
This is a highly technical role that requires broad technical knowledge and a deep understanding of threats and threat TTPs. You will lead and participate in advanced technical assessments that leverage red team, penetration testing, and vulnerability assessment tools and techniques to identify hi-risk vulnerabilities across a variety of technologies.You will coordinate with senior leadership on development projects, share your knowledge and experience by mentoring junior engineers, and assist the monitoring and response functions so those functions can practice and improve their capability to respond and recover against a realistic threat actor.
Required Skills:
Desirable Skills:
This senior technical role is responsible for leading and performing assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include leading and performing research, understanding the bank's security policy, working with appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business.

Candidate must be willing to enroll in Associate Investment Monitoring due to the nature of the role and access.
What You’ll Do
Why You’ll Love Working Here
Required Qualifications
Desired Qualifications
Skills:
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
1st shift (United States of America)משרות נוספות שיכולות לעניין אותך