Information Security Independent Risk Review Specialist - VP
Listed on 2026-01-13
-
IT/Tech
Information Security, Cybersecurity, Data Security, IT Consultant
Information Security Independent Risk Review Specialist - VP
Join to apply for the Information Security Independent Risk Review Specialist - VP role at Robert Walters.
My client, an International Financial Services firm based in London, are looking for an Information Security Lead (Director level). You will need to be in the office 2 days per week.
What You Will Be DoingThe Cyber and Information Risk Independent Risk Review Manager is responsible for independent reviews of the efficacy of the client’s Information Security and Data Management programs, including review and challenge of large‑scale risk remediation efforts. The successful candidate will provide credible challenge of the effectiveness of information security and data management processes and controls in mitigating key risks to the firm.
This position is highly engaged with firm‑wide Information Security and Data Management teams and corporate departments that own these risks.
- Independent Reviews
- Execute horizontal reviews of top information security risks, identifying gaps in control coverage and recommending improvements to address identified gaps.
- Complete thematic reviews of information security and data management operational risk events and associated proposed actions to propose control enhancements that reduce risk of recurrence.
- Work with the Information Security and Data Management teams to review control capabilities against industry standards and lead efforts to strengthen the control environment in line with the evolving threat landscape.
- Review and challenge actions to address gaps, monitor progress of actions, and validate sufficiency of closure evidence.
- Prepare status reports as needed and present to Technology Leadership, Audit, and regulatory bodies as required.
- Risk Remediation Oversight
- Review and challenge the sufficiency of planned actions to address identified problems, provide stated benefits, and meet regulatory expectations.
- Review and monitor the progress of actions and validate sufficiency of closure evidence.
- Prepare status reports as needed and present to Technology Leadership, Audit, and regulatory bodies as required.
- Governance – Actively present to various committees and forums to keep management educated on status of independent reviews, challenges to risk remediation efforts, and progress on control improvements.
- Relationship Management – Serve as a respected point of contact to stakeholders across the business and technology functions, providing credible operational risk coverage for information security and data management risk.
- Policy & Procedures – Review and challenge relevant policies, standards, and procedures related to information security and data management processes.
- Mentorship – Provide guidance and support to junior members of the team.
- Ability to influence and gain credibility with the business.
- 5+ years of experience specifically related to information security and data management risk governance, operations, and risk management functions.
- Broad-based technology experience at substantial scale and complexity in a global, highly regulated, high-volume transaction environment, including continuous availability and high security.
- Experience working in a complex matrixed organization, ideally in a global firm with a dynamic and rapidly changing environment.
- Experience operating within a highly regulated environment, with preference for international and federal level experience.
- Deep knowledge of information security and data management risk and control frameworks and a strong understanding of related policies, procedures, guidelines, and structure.
- Functional expertise, with operational knowledge of and exposure to various current and emerging information security and data management areas such as:
- B.S. in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). M.S. desired.
- Relevant certification desirable, e.g., CISSP, CISM, CISA.
- Working knowledge of information security and data management life cycles based on an established framework: CRI, NIST…
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: