Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

JPMorgan Tech Risk Controls Lead - Identity Access Management IAM 
United States, Ohio, Columbus 
949196900

08.09.2024

As a Tech Risk & Controls Manager in Identity and Access Management, you will be responsible for identifying, and mitigating compliance and operational risks in line with the firm's standards. You will also provide subject matter expertise and technical guidance to technology-aligned process owners, ensuring that implemented controls are operating effectively and in compliance with regulatory, legal, and industry standards. By partnering with various stakeholders, including Product Owners, Business Control Managers, and Regulators, you will contribute to the reporting of a comprehensive view of technology risk posture and its impact on the business. Your advanced knowledge of risk management principles, practices, and theories will enable you to drive innovative solutions and effectively manage a diverse team in a dynamic and evolving risk landscape.

Job responsibilities

  • Ensure effective identification, quantification, communication, and management of technology risk, focusing on root cause analysis and resolution recommendations.
  • Act as primary contact for IAM Audit and Regulatory Exams, facilitating and reviewing responses for Requests for Information (RFI’s) for Global Identity Access Management products.
  • Develop and maintain robust relationships, becoming a trusted partner with LOB technologists, assessments teams, audit and data officers to facilitate cross-functional collaboration and progress toward shared goals.
  • Execute reporting and governance of controls, policies, issue management, audit and regulatory activities and measurements, offering senior management insights into control effectiveness and inform governance work.
  • Proactively monitor and evaluate control effectiveness, identify gaps, and recommend enhancements to strengthen risk posture and regulatory compliance.
  • Implement and where needed establish governance processes to reduce risk from failed internal processes, inadequate identification of risks, inadequate controls, and emerging risks.
  • Establish and oversee adherence to policies and standards impacting technology and cyber risks and identify and aggregate thematic risks and trends.
  • Maintain an understanding of Product teams strategies, product roadmaps and key investment programs and be able to speak to high level design documents relating to the controls executed by individual IAM teams.
  • Apply working experience in multiple security or risk management domains (e.g., access management, application security, vulnerability management, data protection, encryption, logging and monitoring, network security).
  • Assess technology risks and businesses and products evolve to effectively identify and suggest remediation plans .
  • Identify and assist with implementing process improvement throughout the risk and control organization.

Required qualifications, capabilities, and skills

  • 5+ years of experience or equivalent expertise in technology risk management, information security, or related field, emphasizing risk identification, assessment, and mitigation.
  • Familiarity with risk management frameworks, industry standards, and financial industry regulatory requirements.
  • Proficient knowledge and expertise in data security, risk assessment & reporting, control evaluation, design, and governance, with a proven record of implementing effective risk mitigation strategies.
  • Demonstrated ability to influence executive-level strategic decision-making and translating technology insights into business strategies for senior executives.

Preferred qualifications, capabilities, and skills

  • CISM, CRISC, CISSP, or similar industry-recognized risk and risk certifications are preferred.
  • Experience working in regulated industries, in particular leveraging technology standards, frameworks, compliance, and industry recognized best practice/standards (e.g., ITIL, NIST, ISO, PCI, SOC).
  • Collaboration with internal and external technology audits (3rdLine of Defense), Operational Risk Management deep dives and testing (2ndLine of Defense), and the ability to advocate on behalf of subject matter experts.