The point where experts and best companies meet
Share
For years, the cybersecurity community has debated whether the CISO should report to the CIO or not. In regulated financial services, the answer is: both. The first-line CISO has operational responsibilities and reports to the CIO. The second-line Chief Tech Risk Officer (CTRO) and the Technology Risk Management (TRM) organization have broader responsibilities for cybersecurity but also reliability, software quality, resilience, and other technology risks. The CTRO is independent, reports to the Chief Risk Officer, and oversees the work of the CISO and the CIO.
Responsibilities:
Influence executives across the Lines of Business to take accountability for complex (and sometimes sensitive) technology and cyber risks
Develop and implement Divisional Risk profiles
Leverage leadership experience and executive influencing skills to raise the level of challenge activities to a strategic focus
Constructively debate issues and connect the dots across various assessments (typically includes risk and control self-assessments, critical business process-level assessments, assessments of new initiatives, scenario analysis, challenge of risk acceptances, etc.)
Identify opportunities to influence risk-taking strategies and ensure that aggregate risk is understood
Demonstrate robust risk management oversight in supporting various internal audits and regulatory exams
Mentor and develop associates to meet their professional development goals
A successful candidate will have:
Superb communication skills that include active listening and executive presentation skills
Proven critical analytical, including and the ability to express a point of view supported by data (with both technical and non-technical audiences)
Comfort raising concerns early and knows when to escalate, including the ability to raise issues and facilitate constructive problem-solving at all levels of the organization
Expertise in technology and cybersecurity domains, with an ability to be confident, respectful, and articulate when registering dissenting or unpopular opinions
Ability to collaborate effectively with colleagues, stakeholders, and leaders across multiple organizations to get consensus, socialize strategy, and achieve objectives
Track record of providing strategic direction to teams, peers, and stakeholders to drive results, solve problems, and influence outcomes
Basic Qualifications:
Bachelor’s degree or military experience
At least 5 years of experience working in information security, information technology or risk management
At least 5 years of experience developing, evaluating, or implementing cybersecurity, technology or risk assessment activities
At least 1 professional security management or risk management certification: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Informations Systems Auditor (CISA), Certified Risk & Information Systems Control (CRISC), Certified Information Privacy Professional (CIPP) or Open FAIR Certified
Preferred Qualifications:
Master’s degree
Knowledge of supervisory expectations expressed in the FFIEC IT Handbook, Federal Reserve Supervisory Letters, Office of the Comptroller of the Currency Bulletins, and/or Federal Deposit Insurance Corporation Financial Institution Letters
. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
These jobs might be a good fit