Posted By

user_img

Naainna

Recruiter at Plug HR

Last Login: 30 June 2017

1634

JOB VIEWS

24

APPLICATIONS

0

RECRUITER ACTIONS

Posted in

IT & Systems

Job Code

389793

Risk Manager - IT Security - BFSI

7 - 10 Years.Mumbai
Posted 7 years ago
Posted 7 years ago

JOB PURPOSE

Summarise briefly, the purpose of the role

This position is to perform the role of information security risk analysis and risk management in the Bank. The Risk management should cover- Risks analysis, risk assessment for various projects and existing solutions. It includes below:

- Follow a risk assessment process that is consistent across all risks and the organisation to identify and evaluate key risks.

- Develop and implement policies, standards and procedures to ensure that all identified risks are managed within the organisation's risk appetite.

- Regularly monitor the risk management processes and the corrective actions.

- Regularly present risk reports to the key stakeholders, and invite feedback into the risk processes.

- Communicate appropriate risk information to the organisation's stakeholders.

- Maintain and track all the risk jobs for reporting and records

Accountability

EXPECTED END RESULTS MAJOR ACTIVITIES

Risk management

a) Centrally execute and track a consistent information security risk assessment process to identify, evaluate and mitigate project related information security risks at an organisation level pertaining to both process and technology.

b) Engage with business and IT teams to report project related information security risks.

c) Process documentation.

d) Manage security assessment team resources and facilitate coordination with business /IT teams as per standard process.

Vendor Information Risk Management

a) Assist with multi-tier vendor risk assessments and tracking findings, corrective and preventive action plans to logical closure.

b) Process documentation.

Exception management

a) Oversee and manage the requests for exceptions to laid down policy, procedure and guidelines with reference to

- Internet access

- Remote/external access

- System acquisition, development/integration, maintenance

b) Collate and present exceptions outside the areas mentioned above via RAF to ISRMC for approval and track the same via a central risk dashboard.

c) Process documentation.

Scale - 200 yearly

Governance

a) Reviewing and incorporating information security into the critical organisational processes

b) Half yearly review of information security policies, processes, standards and guidelines

c) Performance monitoring in the form of metrics, senior management dashboard, timely escalations of non compliance

d) Assist with review of Risk register and risk acceptance forms for acceptable level of risk.

e) Keeping track of various Infosec/cyber fraud committee minutes and follow ups for compliance

f) Developing enterprise security effectiveness criteria including IT security tools on end points, servers, network etc implementation

Digital VAPT

a) Preparation & review of the digital calendar to ensure that all critical applications have undergone testing cycle

b)Periodic updates to CISO & other reporting on progress of the Digital VAPT calendar with open/overdue observations

c)Follow-up and ensuring closure of the open/overdue points based on agreed timelines with business stakeholders

Netbanking/Mobile banking changes/enhancements

a) Risk assessment for change in the rules in the net/mobile banking, rule pertaining to cooling period for functionality introductions, enhancements pertaining to addition of functionality on netbanking/mobile banking to be performed

b) Inputs to be provided based on risk assessment & ensure necessary testing is performed for the same

4. Description of the Relationships and Roles:

Working relationships held by the role (Internal and External)

1. Internal

- Department: Across all departments - Retail, WBO & Support (legal, IT, Admin etc)

- Upwards: Interactions with supervisors and senior management for exceptions, reviews and other assessments

- Sideways: Across various departments in retail, WBO & support

- Downwards: All levels, across departments in retail, WBO & support.

2. External

- Third party vendors who propose new solutions to bank/existing Bank vendors

5. SKILLS AND KNOWLEDGE

State the minimum acceptable proficiency for the job.

Do not state incumbent-specific information

EDUCATIONAL QUALIFICATIONS:

- Essential:

- Bachelor of Science or Bachelor of Engineering, BCA, MCA

- A working knowledge of most aspects of information security is essential, as is the ability to apply this knowledge in an open network environment

- Preferable:

- Information Security technical Certifications such as CISA, CISSP

RELEVANT EXPERIENCE:

- 7-8 experience in the field of Information Technology

- Over three-five years in information security or related technical areas.

PERSONAL CHARACTERISTICS & BEHAVIOURS:

- Dedication to work & goal defined which is in line with department & organization goal

- Ready to take up new challenges and redefining the current working style

- Independent

- Determination to complete the task & goals defined as per timeline

- Communicate effectively the risks highlighted which can be actioned as appropriate levels

Pinnacle
9970180000

Didn’t find the job appropriate? Report this Job

Posted By

user_img

Naainna

Recruiter at Plug HR

Last Login: 30 June 2017

1634

JOB VIEWS

24

APPLICATIONS

0

RECRUITER ACTIONS

Posted in

IT & Systems

Job Code

389793

UPSKILL YOURSELF

My Learning Centre

Explore CoursesArrow