What are the responsibilities and job description for the IT Compliance and Risk Manager position at BlueOval SK?
About the Job Description
">In this role, you will be responsible for managing overall administration security, including security policy management, incident response, and training documentation. You will work closely with our teams to develop and implement effective security measures to protect our systems and data.
">About the Key Responsibilities
">- ">
- Manage system security administration on designated technology platforms, including operating systems, applications, and network security devices. ">
- Oversee incident response and investigate security breaches, working closely with disciplinary and legal teams as necessary. ">
- Provide technical security administration for access to IT systems and applications. ">
- Review new systems designs and major modifications for security implications prior to implementation. ">
- Develop audit plans for systems and processes. ">
- Manage risk programs and perform process analysis and documentation. ">
- Collaborate with other teams to ensure compliance with Information Security Policy and Federal Regulations. ">
- Author Standard Operating Procedures (SOPs) and training documentation. ">
- Maintain security documentation to ensure organization and review by subject matter experts. ">
- Conduct collaborative meetings to address metrics, system controls, and process improvement. ">
- Create reports identifying gaps and remediation recommendations. ">
- Arrange meetings, circulate agendas, and prepare meeting minutes. ">
About the Requirements
">- ">
- Bachelor's degree in Computer Science, Management Information Systems, Engineering, or equivalent work experience. ">
- Bachelor's degree in IT or similar field with 5 years of relevant work experience, or 9 years in lieu of a degree. ">
- Proficiency in problem-solving, analytical thinking, and penetration testing methodologies. ">
- Familiarity with LINUX/UNIX OS, routers/switches/firewalls, Windows PC platforms, NAS platforms, Firewall, Intrusion Detection devices, endpoint security software, network/sever security vulnerability, and protection. ">
- Familiarization with Information Security Policy and security-related Federal Regulations. ">