The point where experts and best companies meet
Share
For years, the cybersecurity community has debated whether the CISO should report to the CIO or not. In regulated financial services, the answer is: both. The first-line CISO has operational responsibilities and reports to the CIO. The second-line Chief Tech Risk Officer (CTRO) and the Technology Risk Management (TRM) organization have broader responsibilities for cybersecurity but also reliability, software quality, resilience, and other technology risks. The CTRO is independent, reports to the Chief Risk Officer, and oversees the work of the CISO and the CIO.
This position, Sr. Manager, Technology & Cyber Risk Advisor, will play a key role in the organization’s second line of defense risk identification program by independently overseeing the organization’s cybersecurity and technology risk taking and providing expertise and challenge during ongoing assessments.
Desired Outcomes:
Be a trusted advisor and subject matter expert in your assigned Lines of Business
Guide/drive effective and relevant risk conversations with Line of Business leadership and their teams to enable meaningful insights into key technology and cybersecurity risks (e.g., aligning to or providing insights in support of strategic priorities or objectives for the business, increasing risk accountability and visibility)
Perform the review and effective challenge of technology and cybersecurity risks through business-driven assessment activities (e.g., risk and control self assessment (RCSA) activities, scenario analysis, new products and services, etc.), to include providing expertise and advice on risk themes and mitigation strategies
Monitor, report, and escalate metric performance, identify changes or trends in the risk profile, and brief senior management
Collaborate effectively and build trusted relationships with colleagues, stakeholders, and leaders across multiple organizations to achieve objectives.
Communicate in a compelling manner, with a strong point of view, to any audience, including internal and external stakeholders
Leverage business and tech/cyber domain expertise to raise the level of challenge activities to a strategic focus
Constructively debate issues and connect the dots across various assessments (examples include assessments of new initiatives, scenario analysis, challenge of proposed mitigation plans and risk acceptances, etc.)
Partner with first and second line peers to succinctly frame and report on technology and cybersecurity risks relative to risk appetite
Identify opportunities to influence risk-taking strategies and ensure that aggregate risk is understood
Introduce forward-looking risk measures that are relevant to the Lines of Business
Operate a continuous improvement approach by reviewing and challenging the design and operation of processes
Mentor more junior members of the team
A strong candidate:
Has a strong foundation, passion, and proficiency in cybersecurity, technology, and risk management, industry, and regulatory trends
Is intellectually curious and stays current on emerging cyber threats, technologies, and potential implications for the company.
Has a team-first attitude and is comfortable building relationships and collaborating with the team and other partners and stakeholders to get the work done.
Is execution oriented, a self-motivator in an ambiguous environment, can manage multiple projects while maintaining superior results, can successfully work in a fast-paced environment, and is able to quickly come up to speed with the business and technology environments with which they will be working.
Demonstrates strong judgment to balance being both a trusted advisor to the business and driving effective challenge
Encourages your business partners to balance trade-offs between risk and returns in order to achieve business objectives
Has excellent verbal and written communication skills (tailored to the audience) and can concisely and logically explain complex/technical topics.
Stays current on emerging cyber threats and potential implications to the firm
Basic Qualifications:
Bachelor’s degree or military experience
At least 6 years of experience managing, consulting, auditing, or at least 6 years of experience working in the fields of information security, technology, or risk management
At least 5 years of experience developing, evaluating, or implementing cybersecurity, technology or risk assessment
Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified Risk & Information Systems Control (CRISC), or Open FAIR Certified
Preferred Qualifications:
Master’s degree
At least 5 years of experience in a second-line or oversight role at a financial institution or regulatory agency
Experience with scenario-based risk analysis methodologies or risk quantification techniques
Experience working in an Agile environment
Knowledge of supervisory expectations expressed in the Federal Financial Institutions Examination Council (FFIEC) IT Handbook, Federal Reserve Supervisory Letters, Office of the Comptroller of the Currency Bulletins, or Federal Deposit Insurance Corporation Financial Institution Letters
. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
These jobs might be a good fit