In this role, the selected candidate will develop new audit techniques, revise existing procedures and perform risk analyses of areas in order to determine the frequency of audits; identify and analyze complex issues, problems and improvement opportunities and develop conclusions and recommendations.
In this role, you will be responsible to Coordinates, schedules, scopes and leads team activities on audits (incl. large, cross-functional). Leads analysis of control deficiencies as well as expansion and refinement of documentation for more complex control deficiencies to drive actionable business impact, influences management on sufficiency of correctives actions, recommends audit rating.
This role touches both the operational and IT audit areas because the lines between operations and technology are increasingly coming together (generally speaking) and because the Head of Audit views the team from a holistic perspective and looks at ways for associates to become involved in multiple areas in order to strengthen the individual and team capabilities.
The candidate must have a well-versed and broad understanding of IT processes, systems, IT general controls and emerging technologies including third-party governance, system implementations, cybersecurity, cloud computing, privacy and mobile computing.
In this role, you will conduct audit of Operating systems, database systems and application systems. Conducts audit of IT General Controls and Information Security. Conducts integrated audit. Conducts SOX IT General Controls and Application Control testing.
In this role, the selected candidate must have a relevant experience in areas such as data analytics, cybersecurity, cloud computing, SAP, Oracle, mobile technology, or application infrastructure, including actual "hands-on" experience with the technologies.
In this role, the selected candidate will support audits and consulting engagements related to software development, general computing controls, client-server and open systems architecture, internet and intranet functionality, database extraction, technology strategy, data communication and network security.