Engage stakeholders and service providers to formalize TISM processes, procedures and checklists.
Maintain oversight alignment and adherence to established TISM processes, procedures and checklists.
Manage and maintain oversight of service providers (including financials).
Track and review financials for outsourced service providers.
Manage audit issues and ensure that remedial actions are executed to address the underlying risks and timely closure of audit findings.
Drive and manage security projects or initiatives under tight timeline.
User Project Manager for TISM projects to manage scope, solution, timeline and governance.
Work closely with IT PM and delivery teams to get projects delivered on time and within budget.
Security review of systems ensuring compliance to bank security standards, highlight security risks, and make recommendations to mitigate the risks.
Advice stakeholders on security gap remediation, track identified security gaps to closure and escalate potential delays to management in a timely manner.
Manage the rule sets for SIEM (ie Arcsight , RSA Security Analytics) and DAM tool (ie. Imperva SecureSphere) to correlate events from various devices throughout the network and identify anomalies that require further investigation.
Manage life-cycle of SIEM, DAM and UATM platforms including maintain hardware/software revisions, configurations, security patches, hardening, and documentation.
Guide Security Monitoring Unit (SMU) and CSOC (Cyber Security Operation Center) Security Analysts in security case management.
Perform scheduled CSIRT duties, and support CSIRT Commander in the event of a security incident.
Investigate indicators of compromise (IOCs) provided by Cyber Threat Intelligence or the Cyber Hunter function.
Familiar with security technologies and operational experience with SIEM (ie. ArcSight, RSA Security Analytics), DAM (Imperva SecureSphere) in an end user environment is preferred.
Possess strong knowledge and experience in Windows, AIX, MS SQL anti-virus, NIDS, firewalls and network equipment.
Able to articulate and/or develop Information Security principles, standards and best practices
Understand IT and IS processes/methodology e.g. ITIL, SDLC.
Familiar with regulatory requirements and have experience in applying or advising stakeholders.
Possessed one of the following professional certifications such as CISSP, CISA or CRISC.