8,730 Cybersecurity Risk jobs in the United States
Cybersecurity Risk Officer
Posted 10 days ago
Job Viewed
Job Description
The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.
Need Help? (
If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility ( ?subject=Accommodation%20request)
(accommodation requests only; other inquiries won't receive a response).
Regular or Temporary:
Regular
Language Fluency: English (Required)
Work Shift:
1st shift (United States of America)
Please review the following job description:
Leader within the Truist second line-of-defense (LOD2) Cyber Security Risk team responsible for independent risk oversight of one or more Cyber Security and Identity and Access Management domains within Information Risk management. Develop trusted advisor relationship with Enterprise Technology leaders in assigned oversight areas, provide credible challenge to Enterprise Technology execution activities through risk identification and mitigation strategy development, partner with other internal teams to assess and mitigate technology risk and manage teammates to execute on technology risk oversight activities and grow their professional skillsets.
Essential Duties and Responsibilities
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
-
Provide independent risk oversight (i.e. second line of defense/LOD2) for Truist Technology and related consult to Truist Business Units through the effective identification, mitigation, monitoring and reporting of operational, technology, and compliance related risks within Enterprise Technology.
-
Communicate and drive the Information Risk Framework and associated Risk Program Office activities in alignment with Truist corporate risk framework and enterprise risk reduction activities.
-
Provide independent assessment and oversight of the maturity of technology and adequacy of technology controls to achieve business outcomes for performance, stability, security and service availability.
-
Strengthen and sustain proactive risk culture through leadership and influence with teammates and business partners and through conducting effective risk focused management and partnership routines.
-
Review and attest to/challenge adequacy of risk assessments of Technology produced by first-line-of-defense Business Unit Risk Management and other risk partners.
-
Ensure effectiveness and structure in regulatory engagement practices, including responses out of Enterprise Technology.
-
Develop and maintain effective channels of communication with Enterprise Technology partners, other risk and control functions, Business Unit (BU) management, as well as regulatory agencies.
-
Drive improved risk measurement and performance monitoring for all Cyber Security Risk domains and Enterprise Technology teams and leverage to monitor and challenge Truist Technology Risk appetite.
-
Recruit, develop and retain high-performing teams and teammates. Develop the knowledge, skills and abilities of teammates directly & indirectly.
Qualifications
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
-
Bachelor's Degree or an equivalent combination of education and experience.
-
Twelve+ years of banking, technology, operations or risk management experience including experience working within one or more Cyber Risk oversight domains such VPM, DLP, encryption, IAM, network security, security operations.
-
Strong business knowledge, management experience, problem solving and decision-making skills.
-
Excellent interpersonal and communication skills demonstrating the ability to establish credibility with all levels of management effectively.
5.Adept with Microsoft Office products.
Preferred Qualifications:
-
Master's degree in Business Administration (MBA) or advanced degree in Business Management, Technology or Finance.
-
Familiarity with financial services technology-related laws, rules, regulations, and risk management standards (e.g. Federal Financial Institutions Examination Council (FFIEC), NIST (National Institute of Standards and Technology), Control Objectives for Information and Related Technology (COBIT), Information Technology Infrastructure Library (ITIL)).
-
Familiarity with risk measurement approaches including development of Key Risk Indicators and thresholds and associated reporting and analytics tools (e.g. Tableau, RSA Archer).
-
Professional risk management designations such as Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (Information Systems Audit and Control Association), and/or Project Management certification.
General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist's generous benefit plans, please visit our Benefits site (
. Depending on the position and division, this job may also be eligible for Truist's defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.
Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace.
EEO is the Law (
Pay Transparency Nondiscrimination Provision (
E-Verify (
Cybersecurity Risk Officer

Posted today
Job Viewed
Job Description
Need Help? ( you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility ( ?subject=Accommodation%20request)_
_(accommodation requests only; other inquiries won't receive a response)._
**Regular or Temporary:**
Regular
**Language Fluency:** English (Required)
**Work Shift:**
1st shift (United States of America)
**Please review the following job description:**
Leader within the Truist second line-of-defense (LOD2) Cyber Security Risk team responsible for independent risk oversight of one or more Cyber Security and Identity and Access Management domains within Information Risk management. Develop trusted advisor relationship with Enterprise Technology leaders in assigned oversight areas, provide credible challenge to Enterprise Technology execution activities through risk identification and mitigation strategy development, partner with other internal teams to assess and mitigate technology risk and manage teammates to execute on technology risk oversight activities and grow their professional skillsets.
**Essential Duties and Responsibilities**
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
1. Provide independent risk oversight (i.e. second line of defense/LOD2) for Truist Technology and related consult to Truist Business Units through the effective identification, mitigation, monitoring and reporting of operational, technology, and compliance related risks within Enterprise Technology.
2. Communicate and drive the Information Risk Framework and associated Risk Program Office activities in alignment with Truist corporate risk framework and enterprise risk reduction activities.
3. Provide independent assessment and oversight of the maturity of technology and adequacy of technology controls to achieve business outcomes for performance, stability, security and service availability.
4. Strengthen and sustain proactive risk culture through leadership and influence with teammates and business partners and through conducting effective risk focused management and partnership routines.
5. Review and attest to/challenge adequacy of risk assessments of Technology produced by first-line-of-defense Business Unit Risk Management and other risk partners.
6. Ensure effectiveness and structure in regulatory engagement practices, including responses out of Enterprise Technology.
7. Develop and maintain effective channels of communication with Enterprise Technology partners, other risk and control functions, Business Unit (BU) management, as well as regulatory agencies.
8. Drive improved risk measurement and performance monitoring for all Cyber Security Risk domains and Enterprise Technology teams and leverage to monitor and challenge Truist Technology Risk appetite.
9. Recruit, develop and retain high-performing teams and teammates. Develop the knowledge, skills and abilities of teammates directly & indirectly.
**Qualifications**
**Required Qualifications:**
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
1. Bachelor's Degree or an equivalent combination of education and experience.
2. Twelve+ years of banking, technology, operations or risk management experience including experience working within one or more Cyber Risk oversight domains such VPM, DLP, encryption, IAM, network security, security operations.
3. Strong business knowledge, management experience, problem solving and decision-making skills.
4. Excellent interpersonal and communication skills demonstrating the ability to establish credibility with all levels of management effectively.
5.Adept with Microsoft Office products.
**Preferred Qualifications:**
1. Master's degree in Business Administration (MBA) or advanced degree in Business Management, Technology or Finance.
2. Familiarity with financial services technology-related laws, rules, regulations, and risk management standards (e.g. Federal Financial Institutions Examination Council (FFIEC), NIST (National Institute of Standards and Technology), Control Objectives for Information and Related Technology (COBIT), Information Technology Infrastructure Library (ITIL)).
3. Familiarity with risk measurement approaches including development of Key Risk Indicators and thresholds and associated reporting and analytics tools (e.g. Tableau, RSA Archer).
4. Professional risk management designations such as Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (Information Systems Audit and Control Association), and/or Project Management certification.
**General Description of Available Benefits for Eligible Employees of Truist Financial Corporation:** All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist's generous benefit plans, please visit our Benefits site ( Depending on the position and division, this job may also be eligible for Truist's defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.
**_Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace._**
EEO is the Law ( Transparency Nondiscrimination Provision ( (
Cybersecurity Risk Manager

Posted 5 days ago
Job Viewed
Job Description
Summary:
The Cybersecurity Risk Manager is responsible for oversight and administration of operational and regulatory risk strategy programs for a business segment.
Looking for an experienced Cyber Engineer or Cyber Architect to work as a Risk Manager supporting Huntington's transformation and use of cybersecurity technologies. As a risk manager, you will work with the Huntington Cyber Operations and Engineering teams to help them design and build technologies utilizing best practices from FFIEC guidance, COBIT, NIST framework, and other recommended best practices. You will be responsible for identifying potential deficiencies, assisting the business segment in audit findings and responses, reviewing remediation plans, and be a trusted advisor to identify risk to the company.
Description:
Huntington is on a journey to move applications and infrastructure computing to leverage various Cloud provider services and deploy a hybrid cloud and on premises network. This cyber risk position is tasked with partnering with the cyber security segment providing risk support, control and metric design, and overall challenge on various technical implementations. This resource will help ensure cyber offerings are following defined governance processes, standards, and control requirements.
As a Cyber Security Risk Manager, you'll be a subject matter expert in cyber security solutions that will balance the need for speed and flexibility of cloud and on premises infrastructure while ensuring Huntington is protected against ongoing and potential security threats. Seeking an individual who has supported financial services and helped assess and develop their cloud strategy, information security/cybersecurity and IT risk management programs against regulatory requirements and industry best practices. This person will be influential in our transition to securing our cloud computing and on premises platforms and help build compliant governance programs.
Responsibilities:
+ Provide oversight and challenge to technical configurations, solutions and implementation of cyber security tools, systems, and platforms.
+ Evaluate effective of controls and escalate as appropriate.
+ Direct self-monitoring and testing activities to ensure that they are performed in accordance with Corporate Risk Management requirements.
+ Evaluate the adequacy and effectiveness of enterprise and regulatory controls and the resulting risk and control self-assessments.
+ Deliver timely escalation of all issues requiring attention to senior management.
+ Work with business segment management to ensure that the overall risk function is effectively supporting strategic goals.
+ Collaborate with audit/business segment/corporate risk to address issues with plausible action plans and target dates.
+ Act as the central point for receipt and distribution of important risk information for the business segment and reciprocate the flow of information back to corporate risk management.
+ Ensure business segment adheres to corporate and business unit policies and procedures.
+ Must be aware of and keep abreast of Third-Party risk associated with assigned business segment.
Basic Qualifications:
Bachelor's degree in computer science, cyber security, information technology, computer engineering or equivalent.
Five years of any of the combined experience below in Cyber Security, Audit and Risk Management
+ 2. years experience Anti-Virus/Malware.
+ 2 years' experience in network security, firewalls, WAF, Tufin or similar.
+ 2 years' application and network segmentation.
+ 2 year's breach and attack simulation with tools like MITRE ATT&CK, AttackIQ or similar.
+ 2 years in threat management, vulnerability management
+ 2 years using SAST, DAST, IAST, MAST or SCA tools.
+ 2 years as a security engineer or architect.
Preferred Qualifications:
+ Excellent communication skills required to negotiate internally, often at a senior level.
+ Some external communication may be necessary.
+ Understanding of FFIEC guidance, COBIT and NIST framework
+ Willingness to learn, able to learn on the job and a desire to continually learn and develop new technical skills Strong written and oral communication skills.
+ Organized, responsive, and highly thorough problem solver demonstrable cyber risk knowledge based on working in real-world environments & situations.
+ Understanding of security requirements, best practices, and execution in various cloud implementation scenarios: IaaS, PaaS, SaaS Mid-level professional with 5-10 years of experience in consulting, financial services, technology/fintech or government regulatory agency with an IT risk-related role.
+ Master's degree or relevant professional qualifications with Risk / Security management.
+ CISSP, CISM, CRISC, CISA, GIAC, CIPP/US or other security/privacy certifications preferred but not required.
#LI-Hybrid
#LI-SG1
#LI-BM1
#Texas
Exempt Status: (Yes = not eligible for overtime pay) (No = eligible for overtime pay)
Yes
Workplace Type:
Office
Our Approach to Office Workplace Type
Certain positions outside our branch network may be eligible for a flexible work arrangement. We're combining the best of both worlds: in-office and work from home. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. Remote roles will also have the opportunity to come together in our offices for moments that matter. Specific work arrangements will be provided by the hiring team.
Huntington is an Equal Opportunity Employer.
Tobacco-Free Hiring Practice: Visit Huntington's Career Web Site for more details.
Note to Agency Recruiters: Huntington Bank will not pay a fee for any placement resulting from the receipt of an unsolicited resume. All unsolicited resumes sent to any Huntington Bank colleagues, directly or indirectly, will be considered Huntington Bank property. Recruiting agencies must have a valid, written and fully executed Master Service Agreement and Statement of Work for consideration.
Cybersecurity Risk Manager

Posted 5 days ago
Job Viewed
Job Description
Summary:
The Cybersecurity Risk Manager is responsible for oversight and administration of operational and regulatory risk strategy programs for a business segment.
Looking for an experienced Cyber Engineer or Cyber Architect to work as a Risk Manager supporting Huntington's transformation and use of cybersecurity technologies. As a risk manager, you will work with the Huntington Cyber Operations and Engineering teams to help them design and build technologies utilizing best practices from FFIEC guidance, COBIT, NIST framework, and other recommended best practices. You will be responsible for identifying potential deficiencies, assisting the business segment in audit findings and responses, reviewing remediation plans, and be a trusted advisor to identify risk to the company.
Description:
Huntington is on a journey to move applications and infrastructure computing to leverage various Cloud provider services and deploy a hybrid cloud and on premises network. This cyber risk position is tasked with partnering with the cyber security segment providing risk support, control and metric design, and overall challenge on various technical implementations. This resource will help ensure cyber offerings are following defined governance processes, standards, and control requirements.
As a Cyber Security Risk Manager, you'll be a subject matter expert in cyber security solutions that will balance the need for speed and flexibility of cloud and on premises infrastructure while ensuring Huntington is protected against ongoing and potential security threats. Seeking an individual who has supported financial services and helped assess and develop their cloud strategy, information security/cybersecurity and IT risk management programs against regulatory requirements and industry best practices. This person will be influential in our transition to securing our cloud computing and on premises platforms and help build compliant governance programs.
Responsibilities:
+ Provide oversight and challenge to technical configurations, solutions and implementation of cyber security tools, systems, and platforms.
+ Evaluate effective of controls and escalate as appropriate.
+ Direct self-monitoring and testing activities to ensure that they are performed in accordance with Corporate Risk Management requirements.
+ Evaluate the adequacy and effectiveness of enterprise and regulatory controls and the resulting risk and control self-assessments.
+ Deliver timely escalation of all issues requiring attention to senior management.
+ Work with business segment management to ensure that the overall risk function is effectively supporting strategic goals.
+ Collaborate with audit/business segment/corporate risk to address issues with plausible action plans and target dates.
+ Act as the central point for receipt and distribution of important risk information for the business segment and reciprocate the flow of information back to corporate risk management.
+ Ensure business segment adheres to corporate and business unit policies and procedures.
+ Must be aware of and keep abreast of Third-Party risk associated with assigned business segment.
Basic Qualifications:
Bachelor's degree in computer science, cyber security, information technology, computer engineering or equivalent.
Five years of any of the combined experience below in Cyber Security, Audit and Risk Management
+ 2. years experience Anti-Virus/Malware.
+ 2 years' experience in network security, firewalls, WAF, Tufin or similar.
+ 2 years' application and network segmentation.
+ 2 year's breach and attack simulation with tools like MITRE ATT&CK, AttackIQ or similar.
+ 2 years in threat management, vulnerability management
+ 2 years using SAST, DAST, IAST, MAST or SCA tools.
+ 2 years as a security engineer or architect.
Preferred Qualifications:
+ Excellent communication skills required to negotiate internally, often at a senior level.
+ Some external communication may be necessary.
+ Understanding of FFIEC guidance, COBIT and NIST framework
+ Willingness to learn, able to learn on the job and a desire to continually learn and develop new technical skills Strong written and oral communication skills.
+ Organized, responsive, and highly thorough problem solver demonstrable cyber risk knowledge based on working in real-world environments & situations.
+ Understanding of security requirements, best practices, and execution in various cloud implementation scenarios: IaaS, PaaS, SaaS Mid-level professional with 5-10 years of experience in consulting, financial services, technology/fintech or government regulatory agency with an IT risk-related role.
+ Master's degree or relevant professional qualifications with Risk / Security management.
+ CISSP, CISM, CRISC, CISA, GIAC, CIPP/US or other security/privacy certifications preferred but not required.
#LI-Hybrid
#LI-SG1
#LI-BM1
#Texas
Exempt Status: (Yes = not eligible for overtime pay) (No = eligible for overtime pay)
Yes
Workplace Type:
Office
Our Approach to Office Workplace Type
Certain positions outside our branch network may be eligible for a flexible work arrangement. We're combining the best of both worlds: in-office and work from home. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. Remote roles will also have the opportunity to come together in our offices for moments that matter. Specific work arrangements will be provided by the hiring team.
Huntington is an Equal Opportunity Employer.
Tobacco-Free Hiring Practice: Visit Huntington's Career Web Site for more details.
Note to Agency Recruiters: Huntington Bank will not pay a fee for any placement resulting from the receipt of an unsolicited resume. All unsolicited resumes sent to any Huntington Bank colleagues, directly or indirectly, will be considered Huntington Bank property. Recruiting agencies must have a valid, written and fully executed Master Service Agreement and Statement of Work for consideration.
Cybersecurity Risk Manager

Posted 6 days ago
Job Viewed
Job Description
Summary:
The Cybersecurity Risk Manager is responsible for oversight and administration of operational and regulatory risk strategy programs for a business segment.
Looking for an experienced Cyber Engineer or Cyber Architect to work as a Risk Manager supporting Huntington's transformation and use of cybersecurity technologies. As a risk manager, you will work with the Huntington Cyber Operations and Engineering teams to help them design and build technologies utilizing best practices from FFIEC guidance, COBIT, NIST framework, and other recommended best practices. You will be responsible for identifying potential deficiencies, assisting the business segment in audit findings and responses, reviewing remediation plans, and be a trusted advisor to identify risk to the company.
Description:
Huntington is on a journey to move applications and infrastructure computing to leverage various Cloud provider services and deploy a hybrid cloud and on premises network. This cyber risk position is tasked with partnering with the cyber security segment providing risk support, control and metric design, and overall challenge on various technical implementations. This resource will help ensure cyber offerings are following defined governance processes, standards, and control requirements.
As a Cyber Security Risk Manager, you'll be a subject matter expert in cyber security solutions that will balance the need for speed and flexibility of cloud and on premises infrastructure while ensuring Huntington is protected against ongoing and potential security threats. Seeking an individual who has supported financial services and helped assess and develop their cloud strategy, information security/cybersecurity and IT risk management programs against regulatory requirements and industry best practices. This person will be influential in our transition to securing our cloud computing and on premises platforms and help build compliant governance programs.
Responsibilities:
+ Provide oversight and challenge to technical configurations, solutions and implementation of cyber security tools, systems, and platforms.
+ Evaluate effective of controls and escalate as appropriate.
+ Direct self-monitoring and testing activities to ensure that they are performed in accordance with Corporate Risk Management requirements.
+ Evaluate the adequacy and effectiveness of enterprise and regulatory controls and the resulting risk and control self-assessments.
+ Deliver timely escalation of all issues requiring attention to senior management.
+ Work with business segment management to ensure that the overall risk function is effectively supporting strategic goals.
+ Collaborate with audit/business segment/corporate risk to address issues with plausible action plans and target dates.
+ Act as the central point for receipt and distribution of important risk information for the business segment and reciprocate the flow of information back to corporate risk management.
+ Ensure business segment adheres to corporate and business unit policies and procedures.
+ Must be aware of and keep abreast of Third-Party risk associated with assigned business segment.
Basic Qualifications:
Bachelor's degree in computer science, cyber security, information technology, computer engineering or equivalent.
Five years of any of the combined experience below in Cyber Security, Audit and Risk Management
+ 2. years experience Anti-Virus/Malware.
+ 2 years' experience in network security, firewalls, WAF, Tufin or similar.
+ 2 years' application and network segmentation.
+ 2 year's breach and attack simulation with tools like MITRE ATT&CK, AttackIQ or similar.
+ 2 years in threat management, vulnerability management
+ 2 years using SAST, DAST, IAST, MAST or SCA tools.
+ 2 years as a security engineer or architect.
Preferred Qualifications:
+ Excellent communication skills required to negotiate internally, often at a senior level.
+ Some external communication may be necessary.
+ Understanding of FFIEC guidance, COBIT and NIST framework
+ Willingness to learn, able to learn on the job and a desire to continually learn and develop new technical skills Strong written and oral communication skills.
+ Organized, responsive, and highly thorough problem solver demonstrable cyber risk knowledge based on working in real-world environments & situations.
+ Understanding of security requirements, best practices, and execution in various cloud implementation scenarios: IaaS, PaaS, SaaS Mid-level professional with 5-10 years of experience in consulting, financial services, technology/fintech or government regulatory agency with an IT risk-related role.
+ Master's degree or relevant professional qualifications with Risk / Security management.
+ CISSP, CISM, CRISC, CISA, GIAC, CIPP/US or other security/privacy certifications preferred but not required.
#LI-Hybrid
#LI-SG1
#LI-BM1
#Texas
Exempt Status: (Yes = not eligible for overtime pay) (No = eligible for overtime pay)
Yes
Workplace Type:
Office
Our Approach to Office Workplace Type
Certain positions outside our branch network may be eligible for a flexible work arrangement. We're combining the best of both worlds: in-office and work from home. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. Remote roles will also have the opportunity to come together in our offices for moments that matter. Specific work arrangements will be provided by the hiring team.
Huntington is an Equal Opportunity Employer.
Tobacco-Free Hiring Practice: Visit Huntington's Career Web Site for more details.
Note to Agency Recruiters: Huntington Bank will not pay a fee for any placement resulting from the receipt of an unsolicited resume. All unsolicited resumes sent to any Huntington Bank colleagues, directly or indirectly, will be considered Huntington Bank property. Recruiting agencies must have a valid, written and fully executed Master Service Agreement and Statement of Work for consideration.
Cybersecurity Risk Manager

Posted 6 days ago
Job Viewed
Job Description
Summary:
The Cybersecurity Risk Manager is responsible for oversight and administration of operational and regulatory risk strategy programs for a business segment.
Looking for an experienced Cyber Engineer or Cyber Architect to work as a Risk Manager supporting Huntington's transformation and use of cybersecurity technologies. As a risk manager, you will work with the Huntington Cyber Operations and Engineering teams to help them design and build technologies utilizing best practices from FFIEC guidance, COBIT, NIST framework, and other recommended best practices. You will be responsible for identifying potential deficiencies, assisting the business segment in audit findings and responses, reviewing remediation plans, and be a trusted advisor to identify risk to the company.
Description:
Huntington is on a journey to move applications and infrastructure computing to leverage various Cloud provider services and deploy a hybrid cloud and on premises network. This cyber risk position is tasked with partnering with the cyber security segment providing risk support, control and metric design, and overall challenge on various technical implementations. This resource will help ensure cyber offerings are following defined governance processes, standards, and control requirements.
As a Cyber Security Risk Manager, you'll be a subject matter expert in cyber security solutions that will balance the need for speed and flexibility of cloud and on premises infrastructure while ensuring Huntington is protected against ongoing and potential security threats. Seeking an individual who has supported financial services and helped assess and develop their cloud strategy, information security/cybersecurity and IT risk management programs against regulatory requirements and industry best practices. This person will be influential in our transition to securing our cloud computing and on premises platforms and help build compliant governance programs.
Responsibilities:
+ Provide oversight and challenge to technical configurations, solutions and implementation of cyber security tools, systems, and platforms.
+ Evaluate effective of controls and escalate as appropriate.
+ Direct self-monitoring and testing activities to ensure that they are performed in accordance with Corporate Risk Management requirements.
+ Evaluate the adequacy and effectiveness of enterprise and regulatory controls and the resulting risk and control self-assessments.
+ Deliver timely escalation of all issues requiring attention to senior management.
+ Work with business segment management to ensure that the overall risk function is effectively supporting strategic goals.
+ Collaborate with audit/business segment/corporate risk to address issues with plausible action plans and target dates.
+ Act as the central point for receipt and distribution of important risk information for the business segment and reciprocate the flow of information back to corporate risk management.
+ Ensure business segment adheres to corporate and business unit policies and procedures.
+ Must be aware of and keep abreast of Third-Party risk associated with assigned business segment.
Basic Qualifications:
Bachelor's degree in computer science, cyber security, information technology, computer engineering or equivalent.
Five years of any of the combined experience below in Cyber Security, Audit and Risk Management
+ 2. years experience Anti-Virus/Malware.
+ 2 years' experience in network security, firewalls, WAF, Tufin or similar.
+ 2 years' application and network segmentation.
+ 2 year's breach and attack simulation with tools like MITRE ATT&CK, AttackIQ or similar.
+ 2 years in threat management, vulnerability management
+ 2 years using SAST, DAST, IAST, MAST or SCA tools.
+ 2 years as a security engineer or architect.
Preferred Qualifications:
+ Excellent communication skills required to negotiate internally, often at a senior level.
+ Some external communication may be necessary.
+ Understanding of FFIEC guidance, COBIT and NIST framework
+ Willingness to learn, able to learn on the job and a desire to continually learn and develop new technical skills Strong written and oral communication skills.
+ Organized, responsive, and highly thorough problem solver demonstrable cyber risk knowledge based on working in real-world environments & situations.
+ Understanding of security requirements, best practices, and execution in various cloud implementation scenarios: IaaS, PaaS, SaaS Mid-level professional with 5-10 years of experience in consulting, financial services, technology/fintech or government regulatory agency with an IT risk-related role.
+ Master's degree or relevant professional qualifications with Risk / Security management.
+ CISSP, CISM, CRISC, CISA, GIAC, CIPP/US or other security/privacy certifications preferred but not required.
#LI-Hybrid
#LI-SG1
#LI-BM1
#Texas
Exempt Status: (Yes = not eligible for overtime pay) (No = eligible for overtime pay)
Yes
Workplace Type:
Office
Our Approach to Office Workplace Type
Certain positions outside our branch network may be eligible for a flexible work arrangement. We're combining the best of both worlds: in-office and work from home. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. Remote roles will also have the opportunity to come together in our offices for moments that matter. Specific work arrangements will be provided by the hiring team.
Huntington is an Equal Opportunity Employer.
Tobacco-Free Hiring Practice: Visit Huntington's Career Web Site for more details.
Note to Agency Recruiters: Huntington Bank will not pay a fee for any placement resulting from the receipt of an unsolicited resume. All unsolicited resumes sent to any Huntington Bank colleagues, directly or indirectly, will be considered Huntington Bank property. Recruiting agencies must have a valid, written and fully executed Master Service Agreement and Statement of Work for consideration.
Cybersecurity Risk Manager

Posted 6 days ago
Job Viewed
Job Description
Summary:
The Cybersecurity Risk Manager is responsible for oversight and administration of operational and regulatory risk strategy programs for a business segment.
Looking for an experienced Cyber Engineer or Cyber Architect to work as a Risk Manager supporting Huntington's transformation and use of cybersecurity technologies. As a risk manager, you will work with the Huntington Cyber Operations and Engineering teams to help them design and build technologies utilizing best practices from FFIEC guidance, COBIT, NIST framework, and other recommended best practices. You will be responsible for identifying potential deficiencies, assisting the business segment in audit findings and responses, reviewing remediation plans, and be a trusted advisor to identify risk to the company.
Description:
Huntington is on a journey to move applications and infrastructure computing to leverage various Cloud provider services and deploy a hybrid cloud and on premises network. This cyber risk position is tasked with partnering with the cyber security segment providing risk support, control and metric design, and overall challenge on various technical implementations. This resource will help ensure cyber offerings are following defined governance processes, standards, and control requirements.
As a Cyber Security Risk Manager, you'll be a subject matter expert in cyber security solutions that will balance the need for speed and flexibility of cloud and on premises infrastructure while ensuring Huntington is protected against ongoing and potential security threats. Seeking an individual who has supported financial services and helped assess and develop their cloud strategy, information security/cybersecurity and IT risk management programs against regulatory requirements and industry best practices. This person will be influential in our transition to securing our cloud computing and on premises platforms and help build compliant governance programs.
Responsibilities:
+ Provide oversight and challenge to technical configurations, solutions and implementation of cyber security tools, systems, and platforms.
+ Evaluate effective of controls and escalate as appropriate.
+ Direct self-monitoring and testing activities to ensure that they are performed in accordance with Corporate Risk Management requirements.
+ Evaluate the adequacy and effectiveness of enterprise and regulatory controls and the resulting risk and control self-assessments.
+ Deliver timely escalation of all issues requiring attention to senior management.
+ Work with business segment management to ensure that the overall risk function is effectively supporting strategic goals.
+ Collaborate with audit/business segment/corporate risk to address issues with plausible action plans and target dates.
+ Act as the central point for receipt and distribution of important risk information for the business segment and reciprocate the flow of information back to corporate risk management.
+ Ensure business segment adheres to corporate and business unit policies and procedures.
+ Must be aware of and keep abreast of Third-Party risk associated with assigned business segment.
Basic Qualifications:
Bachelor's degree in computer science, cyber security, information technology, computer engineering or equivalent.
Five years of any of the combined experience below in Cyber Security, Audit and Risk Management
+ 2. years experience Anti-Virus/Malware.
+ 2 years' experience in network security, firewalls, WAF, Tufin or similar.
+ 2 years' application and network segmentation.
+ 2 year's breach and attack simulation with tools like MITRE ATT&CK, AttackIQ or similar.
+ 2 years in threat management, vulnerability management
+ 2 years using SAST, DAST, IAST, MAST or SCA tools.
+ 2 years as a security engineer or architect.
Preferred Qualifications:
+ Excellent communication skills required to negotiate internally, often at a senior level.
+ Some external communication may be necessary.
+ Understanding of FFIEC guidance, COBIT and NIST framework
+ Willingness to learn, able to learn on the job and a desire to continually learn and develop new technical skills Strong written and oral communication skills.
+ Organized, responsive, and highly thorough problem solver demonstrable cyber risk knowledge based on working in real-world environments & situations.
+ Understanding of security requirements, best practices, and execution in various cloud implementation scenarios: IaaS, PaaS, SaaS Mid-level professional with 5-10 years of experience in consulting, financial services, technology/fintech or government regulatory agency with an IT risk-related role.
+ Master's degree or relevant professional qualifications with Risk / Security management.
+ CISSP, CISM, CRISC, CISA, GIAC, CIPP/US or other security/privacy certifications preferred but not required.
#LI-Hybrid
#LI-SG1
#LI-BM1
#Texas
Exempt Status: (Yes = not eligible for overtime pay) (No = eligible for overtime pay)
Yes
Workplace Type:
Office
Our Approach to Office Workplace Type
Certain positions outside our branch network may be eligible for a flexible work arrangement. We're combining the best of both worlds: in-office and work from home. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. Remote roles will also have the opportunity to come together in our offices for moments that matter. Specific work arrangements will be provided by the hiring team.
Huntington is an Equal Opportunity Employer.
Tobacco-Free Hiring Practice: Visit Huntington's Career Web Site for more details.
Note to Agency Recruiters: Huntington Bank will not pay a fee for any placement resulting from the receipt of an unsolicited resume. All unsolicited resumes sent to any Huntington Bank colleagues, directly or indirectly, will be considered Huntington Bank property. Recruiting agencies must have a valid, written and fully executed Master Service Agreement and Statement of Work for consideration.
Be The First To Know
About the latest Cybersecurity risk Jobs in United States !
Cybersecurity Risk Officer
Posted 11 days ago
Job Viewed
Job Description
Need Help? ( you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility ( ?subject=Accommodation%20request)_
_(accommodation requests only; other inquiries won't receive a response)._
**Regular or Temporary:**
Regular
**Language Fluency:** English (Required)
**Work Shift:**
1st shift (United States of America)
**Please review the following job description:**
Leader within the Truist second line-of-defense (LOD2) Cyber Security Risk team responsible for independent risk oversight of one or more Cyber Security and Identity and Access Management domains within Information Risk management. Develop trusted advisor relationship with Enterprise Technology leaders in assigned oversight areas, provide credible challenge to Enterprise Technology execution activities through risk identification and mitigation strategy development, partner with other internal teams to assess and mitigate technology risk and manage teammates to execute on technology risk oversight activities and grow their professional skillsets.
**Essential Duties and Responsibilities**
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
1. Provide independent risk oversight (i.e. second line of defense/LOD2) for Truist Technology and related consult to Truist Business Units through the effective identification, mitigation, monitoring and reporting of operational, technology, and compliance related risks within Enterprise Technology.
2. Communicate and drive the Information Risk Framework and associated Risk Program Office activities in alignment with Truist corporate risk framework and enterprise risk reduction activities.
3. Provide independent assessment and oversight of the maturity of technology and adequacy of technology controls to achieve business outcomes for performance, stability, security and service availability.
4. Strengthen and sustain proactive risk culture through leadership and influence with teammates and business partners and through conducting effective risk focused management and partnership routines.
5. Review and attest to/challenge adequacy of risk assessments of Technology produced by first-line-of-defense Business Unit Risk Management and other risk partners.
6. Ensure effectiveness and structure in regulatory engagement practices, including responses out of Enterprise Technology.
7. Develop and maintain effective channels of communication with Enterprise Technology partners, other risk and control functions, Business Unit (BU) management, as well as regulatory agencies.
8. Drive improved risk measurement and performance monitoring for all Cyber Security Risk domains and Enterprise Technology teams and leverage to monitor and challenge Truist Technology Risk appetite.
9. Recruit, develop and retain high-performing teams and teammates. Develop the knowledge, skills and abilities of teammates directly & indirectly.
**Qualifications**
**Required Qualifications:**
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
1. Bachelor's Degree or an equivalent combination of education and experience.
2. Twelve+ years of banking, technology, operations or risk management experience including experience working within one or more Cyber Risk oversight domains such VPM, DLP, encryption, IAM, network security, security operations.
3. Strong business knowledge, management experience, problem solving and decision-making skills.
4. Excellent interpersonal and communication skills demonstrating the ability to establish credibility with all levels of management effectively.
5.Adept with Microsoft Office products.
**Preferred Qualifications:**
1. Master's degree in Business Administration (MBA) or advanced degree in Business Management, Technology or Finance.
2. Familiarity with financial services technology-related laws, rules, regulations, and risk management standards (e.g. Federal Financial Institutions Examination Council (FFIEC), NIST (National Institute of Standards and Technology), Control Objectives for Information and Related Technology (COBIT), Information Technology Infrastructure Library (ITIL)).
3. Familiarity with risk measurement approaches including development of Key Risk Indicators and thresholds and associated reporting and analytics tools (e.g. Tableau, RSA Archer).
4. Professional risk management designations such as Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (Information Systems Audit and Control Association), and/or Project Management certification.
**General Description of Available Benefits for Eligible Employees of Truist Financial Corporation:** All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist's generous benefit plans, please visit our Benefits site ( Depending on the position and division, this job may also be eligible for Truist's defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.
**_Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace._**
EEO is the Law ( Transparency Nondiscrimination Provision ( (
Cybersecurity Risk Officer
Posted 11 days ago
Job Viewed
Job Description
Need Help? ( you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility ( ?subject=Accommodation%20request)_
_(accommodation requests only; other inquiries won't receive a response)._
**Regular or Temporary:**
Regular
**Language Fluency:** English (Required)
**Work Shift:**
1st shift (United States of America)
**Please review the following job description:**
Leader within the Truist second line-of-defense (LOD2) Cyber Security Risk team responsible for independent risk oversight of one or more Cyber Security and Identity and Access Management domains within Information Risk management. Develop trusted advisor relationship with Enterprise Technology leaders in assigned oversight areas, provide credible challenge to Enterprise Technology execution activities through risk identification and mitigation strategy development, partner with other internal teams to assess and mitigate technology risk and manage teammates to execute on technology risk oversight activities and grow their professional skillsets.
**Essential Duties and Responsibilities**
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
1. Provide independent risk oversight (i.e. second line of defense/LOD2) for Truist Technology and related consult to Truist Business Units through the effective identification, mitigation, monitoring and reporting of operational, technology, and compliance related risks within Enterprise Technology.
2. Communicate and drive the Information Risk Framework and associated Risk Program Office activities in alignment with Truist corporate risk framework and enterprise risk reduction activities.
3. Provide independent assessment and oversight of the maturity of technology and adequacy of technology controls to achieve business outcomes for performance, stability, security and service availability.
4. Strengthen and sustain proactive risk culture through leadership and influence with teammates and business partners and through conducting effective risk focused management and partnership routines.
5. Review and attest to/challenge adequacy of risk assessments of Technology produced by first-line-of-defense Business Unit Risk Management and other risk partners.
6. Ensure effectiveness and structure in regulatory engagement practices, including responses out of Enterprise Technology.
7. Develop and maintain effective channels of communication with Enterprise Technology partners, other risk and control functions, Business Unit (BU) management, as well as regulatory agencies.
8. Drive improved risk measurement and performance monitoring for all Cyber Security Risk domains and Enterprise Technology teams and leverage to monitor and challenge Truist Technology Risk appetite.
9. Recruit, develop and retain high-performing teams and teammates. Develop the knowledge, skills and abilities of teammates directly & indirectly.
**Qualifications**
**Required Qualifications:**
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
1. Bachelor's Degree or an equivalent combination of education and experience.
2. Twelve+ years of banking, technology, operations or risk management experience including experience working within one or more Cyber Risk oversight domains such VPM, DLP, encryption, IAM, network security, security operations.
3. Strong business knowledge, management experience, problem solving and decision-making skills.
4. Excellent interpersonal and communication skills demonstrating the ability to establish credibility with all levels of management effectively.
5.Adept with Microsoft Office products.
**Preferred Qualifications:**
1. Master's degree in Business Administration (MBA) or advanced degree in Business Management, Technology or Finance.
2. Familiarity with financial services technology-related laws, rules, regulations, and risk management standards (e.g. Federal Financial Institutions Examination Council (FFIEC), NIST (National Institute of Standards and Technology), Control Objectives for Information and Related Technology (COBIT), Information Technology Infrastructure Library (ITIL)).
3. Familiarity with risk measurement approaches including development of Key Risk Indicators and thresholds and associated reporting and analytics tools (e.g. Tableau, RSA Archer).
4. Professional risk management designations such as Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (Information Systems Audit and Control Association), and/or Project Management certification.
**General Description of Available Benefits for Eligible Employees of Truist Financial Corporation:** All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist's generous benefit plans, please visit our Benefits site ( Depending on the position and division, this job may also be eligible for Truist's defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.
**_Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace._**
EEO is the Law ( Transparency Nondiscrimination Provision ( (
Cybersecurity Risk Officer
Posted 11 days ago
Job Viewed
Job Description
Need Help? ( you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility ( ?subject=Accommodation%20request)_
_(accommodation requests only; other inquiries won't receive a response)._
**Regular or Temporary:**
Regular
**Language Fluency:** English (Required)
**Work Shift:**
1st shift (United States of America)
**Please review the following job description:**
Leader within the Truist second line-of-defense (LOD2) Cyber Security Risk team responsible for independent risk oversight of one or more Cyber Security and Identity and Access Management domains within Information Risk management. Develop trusted advisor relationship with Enterprise Technology leaders in assigned oversight areas, provide credible challenge to Enterprise Technology execution activities through risk identification and mitigation strategy development, partner with other internal teams to assess and mitigate technology risk and manage teammates to execute on technology risk oversight activities and grow their professional skillsets.
**Essential Duties and Responsibilities**
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
1. Provide independent risk oversight (i.e. second line of defense/LOD2) for Truist Technology and related consult to Truist Business Units through the effective identification, mitigation, monitoring and reporting of operational, technology, and compliance related risks within Enterprise Technology.
2. Communicate and drive the Information Risk Framework and associated Risk Program Office activities in alignment with Truist corporate risk framework and enterprise risk reduction activities.
3. Provide independent assessment and oversight of the maturity of technology and adequacy of technology controls to achieve business outcomes for performance, stability, security and service availability.
4. Strengthen and sustain proactive risk culture through leadership and influence with teammates and business partners and through conducting effective risk focused management and partnership routines.
5. Review and attest to/challenge adequacy of risk assessments of Technology produced by first-line-of-defense Business Unit Risk Management and other risk partners.
6. Ensure effectiveness and structure in regulatory engagement practices, including responses out of Enterprise Technology.
7. Develop and maintain effective channels of communication with Enterprise Technology partners, other risk and control functions, Business Unit (BU) management, as well as regulatory agencies.
8. Drive improved risk measurement and performance monitoring for all Cyber Security Risk domains and Enterprise Technology teams and leverage to monitor and challenge Truist Technology Risk appetite.
9. Recruit, develop and retain high-performing teams and teammates. Develop the knowledge, skills and abilities of teammates directly & indirectly.
**Qualifications**
**Required Qualifications:**
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
1. Bachelor's Degree or an equivalent combination of education and experience.
2. Twelve+ years of banking, technology, operations or risk management experience including experience working within one or more Cyber Risk oversight domains such VPM, DLP, encryption, IAM, network security, security operations.
3. Strong business knowledge, management experience, problem solving and decision-making skills.
4. Excellent interpersonal and communication skills demonstrating the ability to establish credibility with all levels of management effectively.
5.Adept with Microsoft Office products.
**Preferred Qualifications:**
1. Master's degree in Business Administration (MBA) or advanced degree in Business Management, Technology or Finance.
2. Familiarity with financial services technology-related laws, rules, regulations, and risk management standards (e.g. Federal Financial Institutions Examination Council (FFIEC), NIST (National Institute of Standards and Technology), Control Objectives for Information and Related Technology (COBIT), Information Technology Infrastructure Library (ITIL)).
3. Familiarity with risk measurement approaches including development of Key Risk Indicators and thresholds and associated reporting and analytics tools (e.g. Tableau, RSA Archer).
4. Professional risk management designations such as Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (Information Systems Audit and Control Association), and/or Project Management certification.
**General Description of Available Benefits for Eligible Employees of Truist Financial Corporation:** All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist's generous benefit plans, please visit our Benefits site ( Depending on the position and division, this job may also be eligible for Truist's defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.
**_Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace._**
EEO is the Law ( Transparency Nondiscrimination Provision ( (