The Cybersecurity & Technology Controls group at JPMorgan Chase aligns the firm’s cybersecurity, access management, controls and resiliency teams. The group proactively and strategically partners with all lines of business and functions to enable them to design, adopt and integrate appropriate controls; deliver processes and solutions efficiently and consistently; and drive automation of controls. The group’s number one priority is to enable the business by keeping the firm safe, stable and resilient.
As the Cybersecurity Assurance Cyber Risk Pillar Lead the primary responsibility is to support the cybersecurity standards construct for Cybersecurity Assurance. Aligned to the key security areas within the Cybersecurity Cyber Risk Pillar you will focus on governance and compliance of regulatory and control obligations for the Cybersecurity of the firm including such disciplines as SIEM, DLP, Digital Forensics, Network Telemetry and File Analysis, Cyber Intel, Vulnerability Management, Attack Simulation, Security Configuration, and Endpoint Detection and Response. You will play an important role in securely enabling the firm through managing the risk profile, and aligning cybersecurity and technology controls requirements and product capabilities. The Cybersecurity Assurance Cyber Risk Pillar Lead is responsible for coordinating the organization, framework, program, and approach for the JPMC security architecture, policies, standards, risk assessments, monitoring, and certification around technology. This role engages in areas of development, design, and monitoring of corporate and global control programs, and acts as a liaison between management, the Lines of Business, internal and external audit, and regulators. The key focus of this role will be to lead a team of professional cybersecurity experts in the areas of Security Operations (SIEM, DLP, Digital Forensics, Attack Simulation, Fraud Intel, Threat Intel, and Cybersecurity Incident management and Attack Analysis).
Job responsibilities
1. Investigation, analysis, documentation, remediation, tracking, and reporting of technology risks and associated controls
2. Design and development of control requirements based on new and emerging technological solutions in a measurable way
3. Ensure existing and new solutions are designed to be continuously compliant with JPMC policies and standards
4. Collaborate with team members and stakeholders on firm-mandated, cross-LOB, and regional audits where the CDA is engaged
5. Provide strategic drive for engagement efficiency, effectiveness and transparent, measurable, sustainable control improvements, including process enhancements and use of automated data collection techniques
6. Define and proactively monitor Key Risk Indicators to identify non-compliance and assist in remediation with compensating controls to address security, risk and control gaps
7. Advise on material remediation activities ensuring appropriate resolution of issues, action plans, breaks, and remedies and support the closure verification process
8. Aid in training and spreading technology risk and control awareness within the organization
9. Develop and maintain strong business and technology relationships, becoming a trusted partner
10. Communicate risk and other control findings with key stakeholders, develop recommendations and provide accurate metrics and management reports on a timely basis
11. Maintain an in depth understanding of the Cybersecurity Operations Technology areas consisting of Security Configuration, Security Operations and Vulnerability Management
12. Support risk decisions for product roadmap prioritization and control implementations supported by documentation and substantiated evidence.
13. Manage the risk profile of aligned products, and translate risks into functional requirements, non-functional requirements and constraints together with the LOB business partners, Cyber Architecture and Product Management teams
14. Ensure that all pertinent Information Risk and Control regulatory requirements and applicable JPMC policies are understood by LOB business partners, technologists, and the Information Security Management function team members, and that these policies are implemented and monitored successfully
15. Work with technology teams to walkthrough, gather control design requirements facilitate discussions and bring to closure control issues
16. Lead the efforts to create and manage agile process for controls related assessment, and build automation/self service capabilities for analysis, reporting and reusing of information to address control issues
17. Communicate issues and evaluate issues/findings and best practices with the rest of the team and management
18. Effectively create, maintain and communicate operational metrics and status of control related initiatives and issues
Required qualifications, capabilities, and skills
19. Excellent command of Cybersecurity organization practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies
20. Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity
21. Noted cybersecurity expert, keeping technical skills current and participating in multiple forums
22. Expertise in Agile and can work with at least one of the common frameworks
23. Ability to identify network attacks and systemic security issues as they relate to threats and vulnerabilities, with focus on recommendations for enhancements or remediation
24. Candidates with a minimum 10+ years of experience in technology risk and controls, risk based consulting, risk assessments, audit and regulatory activities
25. Bachelor's degree in Computer Science, Management Information Systems, Accounting Information Systems, or a related field is required. Experience within financial services areas is preferred
26. Experience with implementation and oversight of technology risk and controls, coordination of activities for audits and assessing an IT controls environment
27. Detail oriented with ability to evaluate processes, controls and issues to determine the risks
28. Bachelor's degree preferably in Computer Science or Information Technology or equivalent
29. CISSP/CRISC/CISM or equivalent industry certifications
30. Subject matter expert on information security and technology risk management with understanding of IT control policies preferred
Preferred qualifications, capabilities, and skills
31. Ability to maintain high standards with a drive to achieve the right answer in difficult and/or ever changing situations
32. Subject matter expert on technology risk management with complete understanding of IT control policie
33. Proven ability to examine, improve and execute the organization's existing processes and procedures for risk assessment
34. Able to review, understand, and rely on technical and software documentation and apply that knowledge into practice
35. Experience operating in environments that are heavily governed under compliance, regulatory, or risk reduction controls
36. Stakeholder engagement skills, including ability to interact with senior levels of management
37. Knowledge of process-focused methodologies for IT related activities (Networks, Cloud, Change Management, Incident Management, SDLC)
38. Knowledge of industry-standard risk/control frameworks: ITIL, COSO, NIST, PCI-DSS, COBIT, etc.
39. Proficient verbal and written communication skills, including the ability to effectively lead discussions and meetings with internal management, external / internal audit, peer groups, regulators and senior stakeholders
40. Ability to prioritize and work under stringent timelines
41. Ability to lead within a cross line of business technology organization, empower people, build rapport, garnering respect and appropriately exercising authority in a collaborative cross-cultural environment