Work with business stakeholders and other SMEs to assess current capabilities, understand high-level business requirements and apply technical background/understanding in the development of requirements in the form of user stories managed in Jira.
Lead or contribute to risk and control design assessments for an assigned business application, business portfolio, and overall enterprise, as well as risk mitigation and remediation plans and remediation strategy.
The scope of the role includes working with key business stakeholders to interpret business needs and issues, translate them into actionable requirements, participate in design activities, configure software and reports, develop test scenarios and participate in testing, implementation activities including training, and providing post - implementation support.
Identifies effective solutions to operational issues transaction processing business information etc. Documents, edits and reviews requirements, specifications, business processes and recommendations related to proposed solutions.
The Technology Risk Mgmt. & Information Security IT Specialist assisting with the Enterprise Supplier Risk Management Program is responsible for Third Party Cyber Risk Assessment processes, procedures, and additional program deliverables.
Support sales system project implementation Communicate data and system tool requirements with the vendor and internal developer.Coordinate and facilitate sales execution of the business initiative. Communicate effectively throughout the sales organization and collaborate effectively with cross-functional teams.
Ensure Solution & Design standards are aligned to organizational strategic objectives and departmental (DM&T) objectives by engaging the technical delivery team and architecture as required during the initiative lifecycle.
In this role, you will combine functional finance expertise and project management capabilities with their other broad skills and experiences in internal audit, process reengineering, compliance, and systems to help clients drive business change.
Guide and advise partners on a broad range of specific Technology Controls and Information Security programs, policies, standards and incidents. Engage in assessments related to risk, controls, implemented control procedures, vulnerability etc.