This individual s primary day to day responsibilities are mentioned below (but are not limited to these):
- Perform information security risk assessment processes for new and existing Northern Trust s third parties business partners.
- Demonstrate some proven knowledge on some of the following domains:
- Information Security Governance and Risk Management
- Access Control
- Vulnerability and Penetration
- Network Security
- Application Security
- Cryptography
- Security Architecture and Design
- Operations Security
- Business Continuity and Disaster Recovery Planning
- Legal, Regulations, Investigations and Compliance
- Physical and Environmental Security
- Cloud Security
- Perform assessment of IT controls operation, identifying, gaps, risks and areas for improvement.
- Report writing skills.
- Knowledge on regulations related to banking and compliance
- Should be well versed with contract language, analysis and negotiation process. Responsible for reviewing master services contracts of the third parties to identify information technology and security related clauses.
- Responsible for working with procurement teams to formulate/renew the contracts as per the information security team guidelines.
- Responsible for documenting, and reporting to management, all findings from risk assessment processes.
- Collaborate with internal stakeholders & functional teams to ensure that all identified risks within each third party are assigned to business owners and tracked for timely closure.
- Able to interact in a professional manner and develop relationships with individuals and teams at any level in Northern Trust.
- Foster a positive and collaborative environment.
- Demonstrate ability to work well in both an individual contributor and team capacity.
- Rapidly and effectively adapt to a highly dynamic and fast-paced work environment.
Major Duties :1. Provides technical expertise and support to client, IT management
and staff in risk assessments, implement. 2. Identifies, evaluates, conducts, schedules and leads technical analyses functions to ensure all applicable IS security requirements are met. 3. Participates in the evaluation, development, implementation, communication, monitoring and maintenance of information technology security policies and procedures. 4. May act as Project Leader. 5. May be involved in providing assistance and training to lower level specialists. 6. Keeps abreast on the direction of emerging industry standards. 7. Provides technical analysis of requirements necessary for the protection of all information processed, stored, or transmitted by systems. 8. Serves as an expert resource or go to person within a group. 9. Conducts preliminary analysis. 10. Reviews work of others. 11. Handles more extensive, high-profile work. 12. Responsible for direct interaction with different committees and/or management. Knowledge :Is a technical expert with in-depth knowledge in area of expertise and strong knowledge of other areas. Requires excellent analytical ability, consultative and communication skills, strong judgment and the ability to work effectively with client, IT management and staff, vendors and consultants. Experience :Bachelor degree in Computer Science or a related discipline and at least four, typically six or more years of technical experience in the security aspects of multiple platforms, operating systems, software, communications and network protocols or an equivalent combination of education and work experience.