In this role, the selected candidate will participate in technical design sessions, working with technical resources, to provide insight during solution development; identify and communicate project risks and recommend solutions.
In this role, the selected candidate will implement processes to document and monitor the network portfolio using a risk based approach; lead new and recurring network security risk assessments, develop mitigation plans, and work with internal stakeholders to assign remediation tracking responsibility.
In this role, the selected candidate will provide initial assessment of categorization and prioritization for reported Incidents and Service Requests and provides initial support, targeting a higher level of first contact resolution.
The selected candidate will facilitate metric review routines with each GIS organization to ensure the organization is measuring what matters and obtain the needed data to contextualize what the numbers are reflecting.
The applicant will also perform administrative duties including scheduling appointments/meetings, providing information to users and external vendors, approve changes and create detailed weekly/monthly/quarterly reporting for management. The applicant will rely on instructions and pre-established guidelines to perform the functions of the job and will report to the Citi Global CDNR Manager.
In this role, the selected candidate will assist in the review, development, testing and implementation of security plans, products and control techniques; coordinate the reporting data security incidents.
The role is a for a CACS system administrator/analyst. This role will interface with internal business operations customers in order to support Collections strategies. The role will require creativity, analytical thinking, problem solving, and the ability to work under pressure while managing multiple responsibilities.
In this role, the selected candidate will assist information security leadership with the continual development and refinement of information security policies and associated processes to enforce, monitor, maintain and evaluate the information security systems.