• Group Nine
  • $76,675.00 -129,040.00/year*
  • Phoenix, AZ
  • Information Technology
  • Full-Time
  • 3601 E Greenway Rd

position filled body

Check out similar listings!

Loading some great jobs for you...

Information Security Risk Assessment Coordinator San Jose, CA 6 months plus Phone and In-person The client is in need of individuals with expertise in Information Security, Technology and Disaster Recovery Experience (Global if possible). Job Description- bull Excellent communication skills (both written and oral). bull Demonstrating a high level of professional judgment, commitment, integrity and teamwork. bull Ability to quickly adapt to internal policies, procedures, systems and software. bull Excels within a fast-paced environment by maintaining composure and demonstrating the ability to make sound decisions under pressure. bull 5-10 yearsrsquo experience and proficiency in the Financial Services regulatory compliance andor risk environment. Includes, technology, and finance or customer service related experience. bull Ability to effectively challenge risk assessment results and opinions through prior experience. bull Experience with consumer protection, financial crime, privacy, information security, andor money transmitter regulations and regulatory expectations desired. bull Demonstrated ability in informally influencing stakeholders to achieve projects within compliance or risk. bull Proven ability to develop effective, matrixed, cross-organization relationships, collaborating and communicating across business and technology stakeholders and multiple geographies. bull Knowledge of project management process and project management toolstechniques. bull Proficiency in Microsoft Excel and PowerPoint experience with GRC systems desired. Focus on people with risk assessment experience in the financial industry and people with IT security experience - especially people with GRC listed on their resume. Thanks and Regards Harshit Mittal GroupNine LLC
Associated topics: attack, identity, identity access management, iam, idm, information technology security, malicious, security officer, violation, vulnerability

* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.

Launch your career - Upload your resume now!