Applications for this job have closed. This page will redirect to the JP Morgan jobs page in 10 seconds.

Technology and Cybersecurity Operational Risk Manager - Vice President

Dorset
Full time
Posted
employer logo
JP Morgan
Banking, investment & finance
10,001+ employees
480 jobs
Compare top employers

As part of Technology & Cyber CCOR, you are at the centre of keeping JPMorgan Chase strong and resilient. You help the firm grow its business in a responsible way by anticipating new and emerging risks, leveraging analytics and automation, and using your expert judgement to solve real-world challenges that impact our company, customers and communities. Our culture is all about thinking outside the box, challenging the status quo and striving to be best-in-class.

The EMEA Technology & Cybersecurity team is responsible for the successful implementation and execution of the CCOR framework across the region, and provides 2nd Line of Defence challenge and oversight to its technology and cybersecurity partners. It also plays a critical role in monitoring and testing activities, assessment of key initiatives, oversight of technology programs, and regulatory engagement.

This role represents an excellent opportunity for the successful candidate to:

  • Drive tangible development of the Technology & Cybersecurity operational risk management practice in a fast-paced and growing business environment and the broader EMEA region
  • Work closely with senior line of business, and technology stakeholders to provide credible independent evaluation of technology & cybersecurity risks and controls
  • Presenting our independent view of technology and cybersecurity Risk to senior management and governance forums
  • Partner with local and global teams across the Compliance, Conduct and Operational Risk (CCOR) organization

Job responsibilities

  • Executing monitoring and testing activities, to independently assess the effectiveness controls including software development and cybersecurity
  • Technology team engagement, to gain full understanding of the technology and controls environment
  • Providing challenge and oversight of our 1st Line of Defence across initiatives in the International Consumer Banking Line of Business
  • Independent review and challenge of the 1st Line of Defence’s self-assessments
  • Key Risk and Performance Indicators & Analytics – oversight of business and technology owned Key Performance Indicators including governance, analysis of trends, outliers, and underlying drivers across the technology control domains.
  • Continuous Monitoring - Perform oversight of operational risks through significant programs, business change management programs, point-in-time issue escalation, industry and regulatory meetings, and review of internal operational risk events
  • Reviewing significant technology events and incidents (including security events) to help hold our technology Incident and Problem Management practices to the highest standard

Required qualifications, capabilities, and skills

  • Experience in technology/software development environments
  • Experience working within the financial services industry is desired
  • Experience performing data analysis to produce meaningful insights to drive decision making
  • Ability to understand complex technical systems and the business processes they support and synthesize the corresponding risks and controls and recommend adjustments if required
  • Understanding of technology risk management and control principles with a proven ability to anticipate and identify risks and effective mitigating actions
  • Adept at developing relationships with strong stakeholder management skills with the confidence to take ideas forward and to challenge others, where appropriate
  • Strong organizational, project management, and multi-tasking skills with demonstrated ability to manage expectations and deliver results with a high level of professionalism, self-motivation, and integrity

Preferred qualifications, capabilities, and skills

  • Bachelor’s Degree or equivalent in Computer Science, Computer Engineering, Engineering, Information Security or related field; post-graduate degree a plus
  • Professional certifications such as CISSP, CCSP, CISA, CISM, CRISC are beneficial