Job Details

ID #15547609
State Texas
City Arlington
Job type Permanent
Salary USD TBD TBD
Source GM Financial
Showed 2021-06-17
Date 2021-06-16
Deadline 2021-08-15
Category Security
Create resume

Cybersecurity Analyst - Vendor Risk Assessment

Texas, Arlington, 76014 Arlington USA

Vacancy expired!

Overview

GM Financial (GMF) is the wholly owned captive finance subsidiary of General Motors and is headquartered in Texas. We are a global provider of auto finance solutions, with operations in North America, South America and Asia. Through our long-standing relationships with auto dealers, we offer attractive retail financing and lease programs to meet the needs of each customer. We also offer commercial lending products to dealers to help them finance and grow their businesses.

At GMF our Cybersecurity organization is a global team consisting of architecture, engineering, operations, governance, and risk functions under the Chief Information Security Officer reporting directly to the CEO.

The Cybersecurity Risk Analyst is responsible for executing a portion of the GM Financial (GMF) Cybersecurity Program designed to advise the organization on its management of third party cybersecurity risk. The Cybersecurity Analyst is responsible for performing, complex risk assessments which contributes to the overall success of the Cybersecurity department's initiatives. The Cybersecurity Analyst will develop strong partnerships with the internal business partners and third party vendors to ensure customer, employee, and company information is protected at the appropriate level

Responsibilities

JOB DUTIES

  • Demonstrate proficiency conducting third party vendor assessments in accordance with NIST Cybersecurity Framework
  • Identify and assess risk, determine applicable controls which mitigate risk, and communicate opportunities for control improvements to third party vendors
  • Challenge security control design at third parties that use the latest information technology, from cloud to big data analytics
  • Develop process for assessing security controls within cloud environments
  • Serve as the subject matter expert and/or provides direction on process, projects, and issues pertaining to third party cloud security practices
  • Develop and managing third party operational (KPI) and (KRI) metrics
  • Track and manage remediation items and/or findings to completion
  • Demonstrate capability to collaborate with business partners to manage Cybersecurity needs
  • Develop security requirements to protect the company from external and internal needs
  • Build, deploy, and manage a vendor risk management solution
  • Serve as a mentor and shares knowledge with more junior team members and internal stakeholders
  • Keep abreast of the latest information security trends, apply them to risk analysis and incorporate them into the team's risk assessment methodology
  • Perform other duties as assigned

Qualifications

Knowledge

  • Local and wide area networking concepts, principles and protocols
  • Advanced knowledge in Infrastructure design and management
  • Working knowledge of management processes such as personnel administration, planning and budgeting
  • Strong working knowledge of Intel platforms, iSeries and pSeries servers
  • Advanced understanding of IT Service Management (ITSM) best practices and processes
  • Advanced knowledge of TCP/IP, OSI model and imp subnetting
  • High level understanding of technology infrastructure, security concepts and platforms
  • Demonstrated success in project management
  • Advanced knowledge of IBM pSeries hardware, operating systems and TSM backup infrastructure
  • Advanced knowledge of the OSI model and security that is associated with each layer
  • Understanding of routing and switching protocols as they relate to load balancing
  • Strong understanding of application layer protocols including HTTP, SSH, SSL and DNS
  • Knowledge and stay abreast on the latest security and privacy legislation, regulations, advisories, alerts and vulnerabilities
  • Knowledge of IT security processes and controls as well as IT infrastructure and networking technical knowledge
  • Understanding of cloud technologies and concepts
  • Familiarity with DevOps and Agile development processes

Skills

  • Ability to think strategically and make collaborative decisions
  • Detail oriented
  • Ability to apply structured analysis methods to various types of data to establish trends, determine variability and business impact
  • Communicates quickly, clearly, concisely, appropriately and intelligently
  • Foster open communication, speaks with impact, listens to others and writes effectively
  • Ability to effectively negotiate with vendors on upgrades and acquisitions
  • Effective planning, time management, negotiation and delegation skills
  • IT security processes and controls knowledge as well as IT infrastructure and networking technical knowledge
  • Ability to approach problems with an open-mind and create new and innovative ideas and methods
  • Information security standards/frameworks (ie, NIST Cybersecurity Framework, ISO 27001) skills
  • Analytical skills
  • Ability to approach problems with an open-mind, use existing information and resources
  • Creative, Innovative, problem-solving and maximizing your potential to solve problems and improve methods
  • Think positively when faced with obstacles, build on others ideas, think logically and intuitively

Education

  • Bachelor's Degree in related field or equivalent work experience strongly preferred

Experience

  • Minimum of 1-5 years experience in large and complex business environment with a successful track record working directly with senior level management preferred
  • At least 1 year of experience in one or more of the following domains: Access Control, Telecom and Network Security, Cybersecurity Governance, Risk Management, Software Development Security, Cryptography, Security Architecture and Design, Operational Security, Business Continuity & Disaster Recovery, Legal Regulations, Investigations and Compliance, Physical (Environmental) Security, IT or Security Audit, IT or Security Compliance preferred
  • Experience with UML Design Tools preferred
  • Experience with alternate management methods using SSH, serial connections, and the command-line interface TMSH preferred
  • Experience in documentation tools such as Visio and Microsoft Office products preferred
  • Experience with Network and VLAN segmentation preferred
  • Experience with technical writing preferred

Licenses

  • Information Security Certifications strongly preferred

Working Conditions

  • Normal office environment subject to stressful situations
  • Limited travel may be required to support business needs, including international travel
#LI-EM1

Vacancy expired!

Subscribe Report job