Applications for this job have closed. This page will redirect to the JP Morgan employer page in 10 seconds.

Technology Risk and Controls Lead

Glasgow City
Full time
Posted
employer logo
JP Morgan
Banking, investment & finance
10,001+ employees
Compare top employers

As a Technology Risk and Controls Lead within our Information Security team, you will be passionate about information security and control solutions for computing environments. You will partner with one or more disciplines, lines of business, regions or locations to respond to evolving business requirements and emerging threats. You will leverage your expert knowledge of today's ever-changing cybersecurity and risk landscape to influence IT operations across the firm. Your responsibilities will include offering guidance, best practices, and support across businesses, leading risk reviews and vulnerability assessments, identifying threats, communicating with senior leaders and other stakeholders, and managing budgets.

Job responsibilities:

  • Offering guidance best practices, and support across businesses
  • Leading risk reviews and vulnerability assessments
  • Identifying threats
  • Communicating with senior leaders and other stakeholders
  • Managing budgets

Required qualifications, capabilities and skills

  • Bachelor’s degree or equivalent experience
  • Strong leadership skills with exceptional communication and presence
  • Advanced knowledge of multiple IT control and project management practices and experience working across large environments
  • Ability to collaborate with high-performing teams and individuals throughout the firm to accomplish common goals
  • Expertise in application and infrastructure high-availability and resiliency architectures with demonstrated experience in business
  • Proficiency in information security domains, including policies and standards, risk and control assessments, access controls, regulatory compliance, technology resiliency, risk and control governance and metrics, incident management, secure systems development lifecycle, vulnerability management, and data protection