Job added in hotlist
Applied job
Contract job
90-day-old-job
part-time-job
Recruiter job
Employer job
Expanded search
Apply online not available
View more jobs in Detroit, TN
View more jobs in Tennessee

Job Details

Cyber Security Information and Risk Management Engineer II

Company name
Detroit Tigers, Inc.

Location
Detroit, TN, United States

Employment Type
Full-Time

Industry
It, Engineering

Posted on
Jul 08, 2022

Apply for this job






Profile

,AnswerValue:\u003cp\u003e\u003cspan\u003eJob Summary \u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003e\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003eThe Cyber Security Information and Risk Management Engineer will identify, evaluate, and prioritize cyber risks and manage third-party risks, as well as assist in the management of security controls over information throughout its lifecycle. The Engineer will focus primarily on the maintenance of an effective risk program and facilitate the identification of risks, ensuring proper mechanisms are in place to mitigate risks in a manner consistent with global cybersecurity standards.\u0026nbsp; This role will collaborate with colleagues to develop risk-related security policies and standards, risk frameworks, and processes in an innovative and flexible way.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003e\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003eThis role will work closely with various business units to implement the procedures and controls necessary to protect organizational assets, information systems, and data.\u0026nbsp; This position will interface with all levels of the organization and have access to security-sensitive information.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003e\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003e\u003cb\u003eEssential Job Functions \u003c/b\u003e\u003c/span\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eCoordinate with internal business units to assist in the development of an effective cyber risk management program\u0026nbsp;\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eManage and mature a risk framework and processes that allow for effective cyber risk monitoring, management, and reporting\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003ePerform cyber risk assessments, evaluate, and prioritize cyber risk management activities across the organization\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eDevelop, implement, and perform third-party cyber security risk assessments based on cybersecurity standards\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eReview third-party contracts and ensure they are in line with our organization’s cyber risk tolerance\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eEnsure third-party vendors are aware and comply with our organization’s Cybersecurity policies and standards. Work with Legal to ensure cybersecurity requirements and external regulatory mandates are properly addressed in legal contracts\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eOversee the security of sensitive data across the organization and support in the design and implementation of information management controls to address identified risks\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eDevelop, enhance, and maintain Key Risk Indicator (KRI) framework and reporting\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eWork closely with leaders in IT and Operations functional areas to ensure security standards, policies, and procedures are deeply embedded and understood\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eDevelop and maintain our organization’s ability to track any outstanding findings, issues, or observations from external and internal assurance and oversight groups\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eResponsible for keeping abreast of the latest trends in governance, cybersecurity, risk, and compliance management\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003cspan\u003e\u003cb\u003eMinimum Skills, Knowledge and Abilities \u003c/b\u003e\u003c/span\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eBachelors’ degree in Information / Data Management, Systems Engineering, Computer Engineering, Computer Science, or other closely related disciplines\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eMinimum of four (4) years experience in security functions, including risk management, information security, privacy or data protection or assurance-related function\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eTechnical and Functional experience in the domains of Governance, Enterprise Risk Management, and Regulatory Compliance\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eProven understanding of risk assessment methodologies, frameworks, and procedures and the ability to work flexibly with them to meet organizational size, maturity, and culture considerations\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eFacilitates IT governance implementation\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eExperience building a network of relationships across functions and liaising with senior management\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eAbility to think strategically about security risks and tie those to tactical organizational activities\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eDemonstrated ability to prioritize and execute tasks in a high-pressure environment\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eRequires self-motivated approach to work with keen attention to detail\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eEvidence of ability to work in a team-oriented, collaborative environment with minimal oversight, and ability to work well under tight deadlines and effectively interact with a wide range of personnel\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003cspan\u003e\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003e\u003cb\u003ePreferred Minimum Skills, Knowledge and Abilities \u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; \u003c/b\u003e\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003e\u003c/span\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eAt least one of the following certifications is required or must be obtained within your first 12 months of employment CRISC, CISA, CISM, CISSP or CIPP\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eExperience working with a Governance Risk and Compliance tool\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eExperience with technical documentation related to GDPR, PCI DSS, ISO 27001, NIST CSF, SOC 2 and continuous monitoring\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eDemonstrate strong verbal and written communication skills as well as strong analytical and problem-solving abilities\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eProven knowledge of information management, asset management, data classification, and vulnerability resolution techniques\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eAbility to work independently or as a member of a team on various tasks\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eProven ability to effectively research subject matter\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003cspan\u003e\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003e\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan\u003e\u003c/span\u003e\u003c/p\u003e,

Company info

Detroit Tigers, Inc.

I like the volume of jobs on EmploymentCrossing. The quality of jobs is also good. Plus, they get refreshed very often. Great work!
Roberto D - Seattle, WA
  • All we do is research jobs.
  • Our team of researchers, programmers, and analysts find you jobs from over 1,000 career pages and other sources
  • Our members get more interviews and jobs than people who use "public job boards"
Shoot for the moon. Even if you miss it, you will land among the stars.
EngineeringCrossing - #1 Job Aggregation and Private Job-Opening Research Service — The Most Quality Jobs Anywhere
EngineeringCrossing is the first job consolidation service in the employment industry to seek to include every job that exists in the world.
Copyright © 2024 EngineeringCrossing - All rights reserved. 169 192