As an IT Consultant the roles’ primary responsibility will be IT riskauditing. This position requires a solid technical background and understanding of IT audit standards and must have prior IT auditexperience. This position could be based out of any of our Schenck offices.
The duties identified below are the essential functions of the position. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
o Accountable for assessing information systems and IT General Controls, identifying deficiencies and recommendations, and preparing documentation to support the audit.
o Manage and perform Service Organization Control (SOC) 1 and 2 engagements.
o Use advanced statistical and inferential analysis programs to provide specialized data analysis.
o Responsible for leading and/or participating in all phases of a project’s lifecycle, from inception to completion.
o Work with internal financialaudit team to determine an organization’s IT environment through testing, audit, and risk assessment.
o Demonstrate advanced understanding of business processes, internal control risk management, IT controls, and related standards.
o Track the status of deficiencies and their remediation by process owner.
o Develop and maintain relationships with firm clients and market services to prospective clients.
o Keep abreast of current IT environment and industry trends.
Skills & Requirements
To perform this position successfully, an individual must demonstrate regular, predictable attendance and be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge and skill required. The individual must be able to successfully pass background checks.
o Bachelor’s degree in related field required
o 3-5 years in related field
o IT specific auditexperiencepreferred
Knowledge and skills required:
o General Information Technology
o Ability to work on numerous projects and audits concurrently
o SQL experience
o Strong ability to operate independently with little supervision
o Solid grasp of information security concepts, IT controls, procedures and policies