Holborn, United Kingdom; Custom House Quay, Ireland
\n
Information Technology
\n
Hybrid (Remote / On Site)
\n
4711
\n\n
\n
\n\n
\n
\n
Job Description
\nJob Overview
Do you have a strong understanding of Information Security operations and technologies? Have you built lasting relationships with business owners and vendors? We’re looking for a creative problem-solver and a self-starter with a finesse for risk management and compliance to join our Information Security team as a Sr. Security GRC Analyst.. You’ll work closely with our CISO and GRC Leader to manage diverse governance, risk and compliance security-related tasks and issues for our rapidly growing company, with a focus on people, practices, systems and metrics. You’ll be asked to keep up with the latest industry requirements and will lead iCIMS program for the identification of security risks and the associated execution of remediation and corrective action plans. This position is critical to ensuring iCIMS is following up with those steps previously agreed upon by the business. Additionally, you’ll provide audit and sales support. If you’re a highly organized, detail-oriented, risk focused, an expert communicator, and have experience with eGRC technology, let’s chat!
About Us
When you join iCIMS, you join the team helping global companies transform business and the world through the power of talent. Our customers do amazing things: design rocket ships, create vaccines, deliver consumer goods globally, overnight, with a smile. As the Talent Cloud company, we empower these organizations to attract, engage, hire, and advance the right talent. We’re passionate about helping companies build a diverse, winning workforce and about building our home team. We're dedicated to fostering an inclusive, purpose-driven, and innovative work environment where everyone belongs.
Responsibilities
\n
Collaborate with the Manager, Information Security to ensure alignment and seamless Intergrations of risk management strategies within the iCIMS security governance framework, supporting Security’s goals and initiatives.
\n
Support our Sales teams regarding prospect and customer security questions, assessments, and audits, including speaking to technical controls and their alternatives and appropriate risk mitigation.
\n
Conduct assessments related to iCIMS compliance framework and assist the business with management of associated findings & treatment plans.
\n
Engage in risk communication, explaining technical controls, alternative measures, and the corresponding risk mitigation strategies as employed and coordinated with iCIMS technical teams.
\n
Provide support and act as key stakeholder of regulatory and compliance initiatives and a variety of security frameworks.
\n
Participate in associated related audits to ensure risk management objectives are captured and met.
\n
Assist with iCIMS information security policy & procedures as related to current and future risks, non-conformities.
\n
Coordinate with InfoSec teams and business units on the development, and monitoring of all Security risk based corrective action plans.
\n
Assist in identifying & tracking information security risks, assessing their impact, and overseeing the implementation / execution of mitigation plans ensuring risk mitigation.
\n
Manage and track information security risk acceptances, exceptions, and the execution of remediation plans, ensuring alignment with risk management objectives.
\n
Ensure timely resolution for all audit and risk assessment findings/issues identified by information security, while promoting a culture of continuous improvement in risk management practices.
\n
As needed, support the business continuity (BC) and disaster recovery (DR) planning and testing.
\n
In conjunction with our Security Analyst team, develop control key performance indictors (KPI) to ensure compliance-related controls are operating to an acceptable tolerance level.
\n
Conduct periodic compliance checks across the iCIMS organization. Develop and define associated metrics to allow clear visibility into iCIMS governance, risk, and compliance status.
\n
Work with the Manager, Information Security on coordination and execution of integration plans for iCIMS acquisitions, ensuring risk management considerations are adequately addressed.
\n
Assist with the annual review and update of information security related policies and processes.
\n
Participate in and manage annual security awareness campaigns.
\n
Work with the Information Security Engineering teams supporting GRC for our detection/prevention systems (IDS/IPS), integrity monitoring, anti-virus/anti-malware, vulnerability management, data loss prevention (DLP), advanced persistent treat (APT), and policy compliance, as appropriate.
\n
Evaluate and recommend GRC related technologies and solutions for future implementation.
\n
Handle sensitive and/or confidential material and information with suitable discretion.
\n
Design and implement business integrated workflows for real time tracking and monitoring of identified risks, ensuring seamless flow of information among relevant stake holders.
\n
Maintain the Security Risk repository, in a shared repository with other teams, to ensure information is accurate, up to date, reportable, and consistent to the designed workflows.
\n
Qualifications
\n
A minimum of 5 years of experience in information security risk and/or compliance roles.
\n
eGRC technology experience preferred
\n
Additional consideration with experience building out risk workflows
\n
Prior experience with cloud-based security tools, technologies, and controls a plus (e.g, Amazon AWS, Azure) or ability to demonstrate a wholistic understanding of risks associated with these environments.
\n
Demonstrate experience in assessing, identifying and managing risk for a 1,000+ (people) sized organization.
\n
Familiar with and able to apply generally-accepted security methods, concepts and techniques, including an understanding of networks, operating systems, cloud operations and associated technologies and services for enterprise level organizations.
\n
Highly developed organizational skills and attention to detail including the ability to handle multiple projects and priorities simultaneously with a high degree of professionalism and client service orientation
\n
Excellent communication and interpersonal skills. Articulates thoughts and ideas clearly, concisely, and persuasively including the ability to communicate security and risk-related concepts across all stakeholder groups (written and oral): Executive team, management, peers, and external customers
\n
Ability to work effectively within a fast paced, changing environment that is going through high growth
\n
Self-starter with the demonstrated ability to take initiative, and who can proactively identify issues/opportunities, take-action or when necessary, recommend actions.
\n
Strategic analysis/creative problem solving and business judgment are required.
\n
Knowledge of common Information Security governance frameworks such as Unified Control Frameworks (UCF), ISO 27001, Service Organization Control (SOC2), Control Objectives for Information and Related Technology (CoBIT), Information Technology Infrastructure Library (ITIL), National Institute of Standards and Technology (NIST), FedRAMP, and/or FFIEC preferred.
\n
Experience with Office365, OneTrust, Exchange, Sumologic, Alertlogic, AWS, Azure, SIEM tools, IDS, CASb, Vulnerability Management is a plus.
\n
Bilingual in English and French is a plus
\n
\n
\n
Education/Certifications/Licenses Required
\n
\n
Bachelor’s Degree in Information Technology, Computer Science, related curriculum or equivalent experience.
\n
CISA, CISSP or similar security/GRC focused certifications a plus.
\n
EEO Statement
We celebrate diversity and are committed to creating an inclusive environment for all employees. Our approach helps us to build a winning team that represents a variety of backgrounds, perspectives, and abilities. So, regardless of how your diversity expresses itself, you can find a home here at iCIMS.
\n
\n
We are proud to be an equal opportunity and affirmative action employer. We prohibit discrimination and harassment of any kind based on race, color, religion, national origin, sex (including pregnancy), sexual orientation, gender identity, gender expression, age, veteran status, genetic information, disability, or other applicable legally protected characteristics. If you would like to request an accommodation due to a disability, please contact us at careers@icims.com.
Compensation and Benefits
iCIMS offers the following benefits: medical insurance (employees and dependent family members), personal life insurance, 28 days of paid vacation per year, reimbursement of lifestyle expense accounts, wellness service offerings, and a Retirement Plan.
\n
\n\n
\n\n
\n
\n\n \n\n \n\n \n \n\n \n
<!-- FOR BRANDING SPECIFIC TRACKING SCRIPTS -->\n\n\n\n\n <footer class="footer defaults">\n
<script> window.jobDescriptionConfig = {"socialShare":true,"job":{"slug":"4711","category":[" Information Technology"],"full_location":"Holborn, United Kingdom; Custom House Quay, Ireland","short_location":"Multiple","language":"en-gb","languages":["en-gb"],"client_code":"customer0","req_id":"4711","title":"Sr. Security GRC Analyst","description":"<strong>Job Overview</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Do you have a strong understanding of Information Security operations and technologies? Have you built lasting relationships with business owners and vendors? We’re looking for a creative problem-solver and a self-starter with a finesse for risk management and compliance to join our Information Security team as a Sr. Security GRC Analyst.. You’ll work closely with our CISO and GRC Leader to manage diverse governance, risk and compliance security-related tasks and issues for our rapidly growing company, with a focus on people, practices, systems and metrics. You’ll be asked to keep up with the latest industry requirements and will lead iCIMS program for the identification of security risks and the associated execution of remediation and corrective action plans. This position is critical to ensuring iCIMS is following up with those steps previously agreed upon by the business. Additionally, you’ll provide audit and sales support. If you’re a highly organized, detail-oriented, risk focused, an expert communicator, and have experience with eGRC technology, let’s chat!</span></p> <br><strong>About Us</strong> <br><br><p style=\\"margin: 0px;\\"><span style=\\"font-size: 12pt; font-family: arial, helvetica, sans-serif;\\">When you join iCIMS, you join the team helping global companies transform business and the world through the power of talent. Our customers do amazing things: design rocket ships, create vaccines, deliver consumer goods globally, overnight, with a smile. As the Talent Cloud company, we empower these organizations to attract, engage, hire, and advance the right talent. We’re passionate about helping companies build a diverse, winning workforce and about building our home team. We're dedicated to fostering an inclusive, purpose-driven, and innovative work environment where everyone belongs.</span></p> <br><strong>Responsibilities</strong> <br><br><ul><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Collaborate with the Manager, Information Security to ensure alignment and seamless Intergrations of risk management strategies within the iCIMS security governance framework, supporting Security’s goals and initiatives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Support our Sales teams regarding prospect and customer security questions, assessments, and audits, including speaking to technical controls and their alternatives and appropriate risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct assessments related to iCIMS compliance framework and assist the business with management of associated findings & treatment plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Engage in risk communication, explaining technical controls, alternative measures, and the corresponding risk mitigation strategies as employed and coordinated with iCIMS technical teams.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Provide support and act as key stakeholder of regulatory and compliance initiatives and a variety of security frameworks.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in associated related audits to ensure risk management objectives are captured and met.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with iCIMS information security policy & procedures as related to current and future risks, non-conformities.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Coordinate with InfoSec teams and business units on the development, and monitoring of all Security risk based corrective action plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist in identifying & tracking information security risks, assessing their impact, and overseeing the implementation / execution of mitigation plans ensuring risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Manage and track information security risk acceptances, exceptions, and the execution of remediation plans, ensuring alignment with risk management objectives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ensure timely resolution for all audit and risk assessment findings/issues identified by information security, while promoting a culture of continuous improvement in risk management practices.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">As needed, support the business continuity (BC) and disaster recovery (DR) planning and testing.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">In conjunction with our Security Analyst team, develop control key performance indictors (KPI) to ensure compliance-related controls are operating to an acceptable tolerance level.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct periodic compliance checks across the iCIMS organization. Develop and define associated metrics to allow clear visibility into iCIMS governance, risk, and compliance status.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Manager, Information Security on coordination and execution of integration plans for iCIMS acquisitions, ensuring risk management considerations are adequately addressed.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with the annual review and update of information security related policies and processes.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in and manage annual security awareness campaigns.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Information Security Engineering teams supporting GRC for our detection/prevention systems (IDS/IPS), integrity monitoring, anti-virus/anti-malware, vulnerability management, data loss prevention (DLP), advanced persistent treat (APT), and policy compliance, as appropriate.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Evaluate and recommend GRC related technologies and solutions for future implementation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Handle sensitive and/or confidential material and information with suitable discretion.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Design and implement business integrated workflows for real time tracking and monitoring of identified risks, ensuring seamless flow of information among relevant stake holders.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Maintain the Security Risk repository, in a shared repository with other teams, to ensure information is accurate, up to date, reportable, and consistent to the designed workflows. </span></li></ul> <br><strong>Qualifications</strong> <br><br><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">A minimum of 5 years of experience in information security risk and/or compliance roles.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">eGRC technology experience preferred</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Additional consideration with experience building out risk workflows</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Prior experience with cloud-based security tools, technologies, and controls a plus (e.g, Amazon AWS, Azure) or ability to demonstrate a wholistic understanding of risks associated with these environments.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Demonstrate experience in assessing, identifying and managing risk for a 1,000+ (people) sized organization.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Familiar with and able to apply generally-accepted security methods, concepts and techniques, including an understanding of networks, operating systems, cloud operations and associated technologies and services for enterprise level organizations.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Highly developed organizational skills and attention to detail including the ability to handle multiple projects and priorities simultaneously with a high degree of professionalism and client service orientation</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Excellent communication and interpersonal skills. Articulates thoughts and ideas clearly, concisely, and persuasively including the ability to communicate security and risk-related concepts across all stakeholder groups (written and oral): Executive team, management, peers, and external customers</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ability to work effectively within a fast paced, changing environment that is going through high growth</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Self-starter with the demonstrated ability to take initiative, and who can proactively identify issues/opportunities, take-action or when necessary, recommend actions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Strategic analysis/creative problem solving and business judgment are required.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Knowledge of common Information Security governance frameworks such as Unified Control Frameworks (UCF), ISO 27001, Service Organization Control (SOC2), Control Objectives for Information and Related Technology (CoBIT), Information Technology Infrastructure Library (ITIL), National Institute of Standards and Technology (NIST), FedRAMP, and/or FFIEC preferred.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Experience with Office365, OneTrust, Exchange, Sumologic, Alertlogic, AWS, Azure, SIEM tools, IDS, CASb, Vulnerability Management is a plus.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bilingual in English and French is a plus</span></li></ul><p style=\\"margin: 0px;\\"> </p><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\"><strong>Education/Certifications/Licenses Required</strong></span></p><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bachelor’s Degree in Information Technology, Computer Science, related curriculum or equivalent experience.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">CISA, CISSP or similar security/GRC focused certifications a plus.</span></li></ul> <br><strong>EEO Statement</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">We celebrate diversity and are committed to creating an inclusive environment for all employees. Our approach helps us to build a winning team that represents a variety of backgrounds, perspectives, and abilities. So, regardless of how your diversity expresses itself, you can find a home here at iCIMS. </span></p><p style=\\"margin: 0px;\\"> </p><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">We are proud to be an equal opportunity and affirmative action employer. We prohibit discrimination and harassment of any kind based on race, color, religion, national origin, sex (including pregnancy), sexual orientation, gender identity, gender expression, age, veteran status, genetic information, disability, or other applicable legally protected characteristics. If you would like to request an accommodation due to a disability, please contact us at careers@icims.com.</span></p> <br><strong>Compensation and Benefits</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">iCIMS offers the following benefits: medical insurance (employees and dependent family members), personal life insurance, 28 days of paid vacation per year, reimbursement of lifestyle expense accounts, wellness service offerings, and a Retirement Plan.</span></p>","location_name":"London, UK","street_address":"125 Kingsway","city":"Holborn","country":"United Kingdom","country_code":"GB","postal_code":"WC2B","location_type":"LAT_LNG","latitude":51.5085,"longitude":-0.1257,"additional_locations":[{"city":"Custom House Quay","state":"Dublin","country":"Ireland"}],"categories":[{"name":"Information Technology"}],"tags1":["Experienced"],"tags2":["Hybrid (Remote / On Site)"],"department":"","benefits":[],"qualifications":"<ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">A minimum of 5 years of experience in information security risk and/or compliance roles.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">eGRC technology experience preferred</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Additional consideration with experience building out risk workflows</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Prior experience with cloud-based security tools, technologies, and controls a plus (e.g, Amazon AWS, Azure) or ability to demonstrate a wholistic understanding of risks associated with these environments.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Demonstrate experience in assessing, identifying and managing risk for a 1,000+ (people) sized organization.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Familiar with and able to apply generally-accepted security methods, concepts and techniques, including an understanding of networks, operating systems, cloud operations and associated technologies and services for enterprise level organizations.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Highly developed organizational skills and attention to detail including the ability to handle multiple projects and priorities simultaneously with a high degree of professionalism and client service orientation</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Excellent communication and interpersonal skills. Articulates thoughts and ideas clearly, concisely, and persuasively including the ability to communicate security and risk-related concepts across all stakeholder groups (written and oral): Executive team, management, peers, and external customers</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ability to work effectively within a fast paced, changing environment that is going through high growth</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Self-starter with the demonstrated ability to take initiative, and who can proactively identify issues/opportunities, take-action or when necessary, recommend actions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Strategic analysis/creative problem solving and business judgment are required.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Knowledge of common Information Security governance frameworks such as Unified Control Frameworks (UCF), ISO 27001, Service Organization Control (SOC2), Control Objectives for Information and Related Technology (CoBIT), Information Technology Infrastructure Library (ITIL), National Institute of Standards and Technology (NIST), FedRAMP, and/or FFIEC preferred.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Experience with Office365, OneTrust, Exchange, Sumologic, Alertlogic, AWS, Azure, SIEM tools, IDS, CASb, Vulnerability Management is a plus.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bilingual in English and French is a plus</span></li></ul><p style=\\"margin: 0px;\\"> </p><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\"><strong>Education/Certifications/Licenses Required</strong></span></p><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bachelor’s Degree in Information Technology, Computer Science, related curriculum or equivalent experience.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">CISA, CISSP or similar security/GRC focused certifications a plus.</span></li></ul>","hiring_organization":"iCIMS Talent Acquisition","hiring_organization_logo":"https://cms.jibecdn.com/prod/customer0/assets/LP-HEADER-NAV_LOGO-en-us-1658387307482.png","responsibilities":"<ul><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Collaborate with the Manager, Information Security to ensure alignment and seamless Intergrations of risk management strategies within the iCIMS security governance framework, supporting Security’s goals and initiatives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Support our Sales teams regarding prospect and customer security questions, assessments, and audits, including speaking to technical controls and their alternatives and appropriate risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct assessments related to iCIMS compliance framework and assist the business with management of associated findings & treatment plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Engage in risk communication, explaining technical controls, alternative measures, and the corresponding risk mitigation strategies as employed and coordinated with iCIMS technical teams.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Provide support and act as key stakeholder of regulatory and compliance initiatives and a variety of security frameworks.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in associated related audits to ensure risk management objectives are captured and met.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with iCIMS information security policy & procedures as related to current and future risks, non-conformities.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Coordinate with InfoSec teams and business units on the development, and monitoring of all Security risk based corrective action plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist in identifying & tracking information security risks, assessing their impact, and overseeing the implementation / execution of mitigation plans ensuring risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Manage and track information security risk acceptances, exceptions, and the execution of remediation plans, ensuring alignment with risk management objectives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ensure timely resolution for all audit and risk assessment findings/issues identified by information security, while promoting a culture of continuous improvement in risk management practices.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">As needed, support the business continuity (BC) and disaster recovery (DR) planning and testing.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">In conjunction with our Security Analyst team, develop control key performance indictors (KPI) to ensure compliance-related controls are operating to an acceptable tolerance level.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct periodic compliance checks across the iCIMS organization. Develop and define associated metrics to allow clear visibility into iCIMS governance, risk, and compliance status.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Manager, Information Security on coordination and execution of integration plans for iCIMS acquisitions, ensuring risk management considerations are adequately addressed.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with the annual review and update of information security related policies and processes.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in and manage annual security awareness campaigns.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Information Security Engineering teams supporting GRC for our detection/prevention systems (IDS/IPS), integrity monitoring, anti-virus/anti-malware, vulnerability management, data loss prevention (DLP), advanced persistent treat (APT), and policy compliance, as appropriate.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Evaluate and recommend GRC related technologies and solutions for future implementation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Handle sensitive and/or confidential material and information with suitable discretion.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Design and implement business integrated workflows for real time tracking and monitoring of identified risks, ensuring seamless flow of information among relevant stake holders.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Maintain the Security Risk repository, in a shared repository with other teams, to ensure information is accurate, up to date, reportable, and consistent to the designed workflows. </span></li></ul>","posted_date":"2023-11-15T04:25:00+0000","apply_url":"https://globalcareers-customer0.icims.com/jobs/4711/login","internal":false,"searchable":true,"active":true,"applyable":true,"li_easy_applyable":true,"ats_code":"icims","hiring_flow_name":"iCIMS ATS Hiring Flow","meta_data":{"openingjobs":{"openingJobId":"0000f81529cc256001dd0bbaf1b3eef2fda1"},"icims":{"revision_int":2,"uuid":"dfd77a17-25b6-494e-a317-b026ceee99fc","primary_posted_site_object":{"datePosted":"2023-11-15T04:25:00+0000","site":"globalcareers-customer0","siteId":"e6c1c01d-774c-4d43-82c4-5d9858fe53fd","tenantId":"12326","siteType":"ATTRACT"},"date_updated":"2023-11-15T04:26:56Z","config_keys":{"portal.id":"151","ccc.attract.portal.url":"https://careers.icims.com","icims.external.xml.feeds":"icims.indeed.xml.enabled,icims.resume-library.xml.enabled,icims.direct-employers.xml.enabled,icims.monster.xml.enabled,icims.adzuna.xml.enabled,icims.careerbuilder.xml.enabled,icims.ziprecruiter.xml.enabled,icims.craigslist.xml.enabled,icims.itjobscafe.xml.enabled,icims.recruitnet.xml.enabled,icims.upward.xml.enabled,icims.jobbio.xml.enabled,icims.propellum.xml.enabled,icims.snagajob.xml.enabled,icims.inhersight.xml.enabled,icims.pallet-labs.xml.enabled,icims.qkly.xml.enabled,icims.cv-library.xml.enabled,icims.linkedin.xml.enabled,icims.zippia.xml.enabled,icims.puck.xml.enabled","icims.company.facebook.url":"https://www.facebook.com/iCIMS","jobposting.external.company.name":"iCIMS Talent Acquisition","icims.config.web.indeed.easy.apply":"0"},"jps_is_public":true},"elasticsearch":{"es_created":false},"ats_job_hash":"b67845ee1ee235d59ac6fd4b67d77e78","googlejobs":{"jobName":"projects/helpful-passage-853/tenants/cb22eb5b-7e00-0000-0000-007edad744d3/jobs/126024502053085894"},"import_id":"24e80098-c22f-4a3f-8f8a-ee263d63a554","redirectOnApply":true,"questionservice":{"id":"29519288"},"import_source":"ImporterService","client_code":"customer0"},"update_date":"2023-11-15T21:25:02+0000","create_date":"2023-11-15T04:26:48+0000","multipleLocations":true},"jobFormatted":{"categories":"Information Technology","location":"Multiple","title":"Sr. Security GRC Analyst","seo_title":["Information+Technology","Multiple","Sr.+Security+GRC+Analyst"],"description":"<strong>Job Overview</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Do you have a strong understanding of Information Security operations and technologies? Have you built lasting relationships with business owners and vendors? We’re looking for a creative problem-solver and a self-starter with a finesse for risk management and compliance to join our Information Security team as a Sr. Security GRC Analyst.. You’ll work closely with our CISO and GRC Leader to manage diverse governance, risk and compliance security-related tasks and issues for our rapidly growing company, with a focus on people, practices, systems and metrics. You’ll be asked to keep up with the latest industry requirements and will lead iCIMS program for the identification of security risks and the associated execution of remediation and corrective action plans. This position is critical to ensuring iCIMS is following up with those steps previously agreed upon by the business. Additionally, you’ll provide audit and sales support. If you’re a highly organized, detail-oriented, risk focused, an expert communicator, and have experience with eGRC technology, let’s chat!</span></p> <br><strong>About Us</strong> <br><br><p style=\\"margin: 0px;\\"><span style=\\"font-size: 12pt; font-family: arial, helvetica, sans-serif;\\">When you join iCIMS, you join the team helping global companies transform business and the world through the power of talent. Our customers do amazing things: design rocket ships, create vaccines, deliver consumer goods globally, overnight, with a smile. As the Talent Cloud company, we empower these organizations to attract, engage, hire, and advance the right talent. We’re passionate about helping companies build a diverse, winning workforce and about building our home team. We're dedicated to fostering an inclusive, purpose-driven, and innovative work environment where everyone belongs.</span></p> <br><strong>Responsibilities</strong> <br><br><ul><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Collaborate with the Manager, Information Security to ensure alignment and seamless Intergrations of risk management strategies within the iCIMS security governance framework, supporting Security’s goals and initiatives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Support our Sales teams regarding prospect and customer security questions, assessments, and audits, including speaking to technical controls and their alternatives and appropriate risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct assessments related to iCIMS compliance framework and assist the business with management of associated findings & treatment plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Engage in risk communication, explaining technical controls, alternative measures, and the corresponding risk mitigation strategies as employed and coordinated with iCIMS technical teams.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Provide support and act as key stakeholder of regulatory and compliance initiatives and a variety of security frameworks.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in associated related audits to ensure risk management objectives are captured and met.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with iCIMS information security policy & procedures as related to current and future risks, non-conformities.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Coordinate with InfoSec teams and business units on the development, and monitoring of all Security risk based corrective action plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist in identifying & tracking information security risks, assessing their impact, and overseeing the implementation / execution of mitigation plans ensuring risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Manage and track information security risk acceptances, exceptions, and the execution of remediation plans, ensuring alignment with risk management objectives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ensure timely resolution for all audit and risk assessment findings/issues identified by information security, while promoting a culture of continuous improvement in risk management practices.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">As needed, support the business continuity (BC) and disaster recovery (DR) planning and testing.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">In conjunction with our Security Analyst team, develop control key performance indictors (KPI) to ensure compliance-related controls are operating to an acceptable tolerance level.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct periodic compliance checks across the iCIMS organization. Develop and define associated metrics to allow clear visibility into iCIMS governance, risk, and compliance status.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Manager, Information Security on coordination and execution of integration plans for iCIMS acquisitions, ensuring risk management considerations are adequately addressed.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with the annual review and update of information security related policies and processes.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in and manage annual security awareness campaigns.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Information Security Engineering teams supporting GRC for our detection/prevention systems (IDS/IPS), integrity monitoring, anti-virus/anti-malware, vulnerability management, data loss prevention (DLP), advanced persistent treat (APT), and policy compliance, as appropriate.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Evaluate and recommend GRC related technologies and solutions for future implementation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Handle sensitive and/or confidential material and information with suitable discretion.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Design and implement business integrated workflows for real time tracking and monitoring of identified risks, ensuring seamless flow of information among relevant stake holders.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Maintain the Security Risk repository, in a shared repository with other teams, to ensure information is accurate, up to date, reportable, and consistent to the designed workflows. </span></li></ul> <br><strong>Qualifications</strong> <br><br><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">A minimum of 5 years of experience in information security risk and/or compliance roles.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">eGRC technology experience preferred</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Additional consideration with experience building out risk workflows</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Prior experience with cloud-based security tools, technologies, and controls a plus (e.g, Amazon AWS, Azure) or ability to demonstrate a wholistic understanding of risks associated with these environments.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Demonstrate experience in assessing, identifying and managing risk for a 1,000+ (people) sized organization.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Familiar with and able to apply generally-accepted security methods, concepts and techniques, including an understanding of networks, operating systems, cloud operations and associated technologies and services for enterprise level organizations.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Highly developed organizational skills and attention to detail including the ability to handle multiple projects and priorities simultaneously with a high degree of professionalism and client service orientation</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Excellent communication and interpersonal skills. Articulates thoughts and ideas clearly, concisely, and persuasively including the ability to communicate security and risk-related concepts across all stakeholder groups (written and oral): Executive team, management, peers, and external customers</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ability to work effectively within a fast paced, changing environment that is going through high growth</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Self-starter with the demonstrated ability to take initiative, and who can proactively identify issues/opportunities, take-action or when necessary, recommend actions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Strategic analysis/creative problem solving and business judgment are required.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Knowledge of common Information Security governance frameworks such as Unified Control Frameworks (UCF), ISO 27001, Service Organization Control (SOC2), Control Objectives for Information and Related Technology (CoBIT), Information Technology Infrastructure Library (ITIL), National Institute of Standards and Technology (NIST), FedRAMP, and/or FFIEC preferred.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Experience with Office365, OneTrust, Exchange, Sumologic, Alertlogic, AWS, Azure, SIEM tools, IDS, CASb, Vulnerability Management is a plus.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bilingual in English and French is a plus</span></li></ul><p style=\\"margin: 0px;\\"> </p><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\"><strong>Education/Certifications/Licenses Required</strong></span></p><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bachelor’s Degree in Information Technology, Computer Science, related curriculum or equivalent experience.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">CISA, CISSP or similar security/GRC focused certifications a plus.</span></li></ul> <br><strong>EEO Statement</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">We celebrate diversity and are committed to creating an inclusive environment for all employees. Our approach helps us to build a winning team that represents a variety of backgrounds, perspectives, and abilities. So, regardless of how your diversity expresses itself, you can find a home here at iCIMS. </span></p><p style=\\"margin: 0px;\\"> </p><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">We are proud to be an equal opportunity and affirmative action employer. We prohibit discrimination and harassment of any kind based on race, color, religion, national origin, sex (including pregnancy), sexual orientation, gender identity, gender expression, age, veteran status, genetic information, disability, or other applicable legally protected characteristics. If you would like to request an accommodation due to a disability, please contact us at careers@icims.com.</span></p> <br><strong>Compensation and Benefits</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">iCIMS offers the following benefits: medical insurance (employees and dependent family members), personal life insurance, 28 days of paid vacation per year, reimbursement of lifestyle expense accounts, wellness service offerings, and a Retirement Plan.</span></p>","qualifications":"<ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">A minimum of 5 years of experience in information security risk and/or compliance roles.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">eGRC technology experience preferred</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Additional consideration with experience building out risk workflows</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Prior experience with cloud-based security tools, technologies, and controls a plus (e.g, Amazon AWS, Azure) or ability to demonstrate a wholistic understanding of risks associated with these environments.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Demonstrate experience in assessing, identifying and managing risk for a 1,000+ (people) sized organization.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Familiar with and able to apply generally-accepted security methods, concepts and techniques, including an understanding of networks, operating systems, cloud operations and associated technologies and services for enterprise level organizations.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Highly developed organizational skills and attention to detail including the ability to handle multiple projects and priorities simultaneously with a high degree of professionalism and client service orientation</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Excellent communication and interpersonal skills. Articulates thoughts and ideas clearly, concisely, and persuasively including the ability to communicate security and risk-related concepts across all stakeholder groups (written and oral): Executive team, management, peers, and external customers</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ability to work effectively within a fast paced, changing environment that is going through high growth</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Self-starter with the demonstrated ability to take initiative, and who can proactively identify issues/opportunities, take-action or when necessary, recommend actions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Strategic analysis/creative problem solving and business judgment are required.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Knowledge of common Information Security governance frameworks such as Unified Control Frameworks (UCF), ISO 27001, Service Organization Control (SOC2), Control Objectives for Information and Related Technology (CoBIT), Information Technology Infrastructure Library (ITIL), National Institute of Standards and Technology (NIST), FedRAMP, and/or FFIEC preferred.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Experience with Office365, OneTrust, Exchange, Sumologic, Alertlogic, AWS, Azure, SIEM tools, IDS, CASb, Vulnerability Management is a plus.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bilingual in English and French is a plus</span></li></ul><p style=\\"margin: 0px;\\"> </p><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\"><strong>Education/Certifications/Licenses Required</strong></span></p><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bachelor’s Degree in Information Technology, Computer Science, related curriculum or equivalent experience.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">CISA, CISSP or similar security/GRC focused certifications a plus.</span></li></ul>","responsibilities":"<ul><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Collaborate with the Manager, Information Security to ensure alignment and seamless Intergrations of risk management strategies within the iCIMS security governance framework, supporting Security’s goals and initiatives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Support our Sales teams regarding prospect and customer security questions, assessments, and audits, including speaking to technical controls and their alternatives and appropriate risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct assessments related to iCIMS compliance framework and assist the business with management of associated findings & treatment plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Engage in risk communication, explaining technical controls, alternative measures, and the corresponding risk mitigation strategies as employed and coordinated with iCIMS technical teams.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Provide support and act as key stakeholder of regulatory and compliance initiatives and a variety of security frameworks.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in associated related audits to ensure risk management objectives are captured and met.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with iCIMS information security policy & procedures as related to current and future risks, non-conformities.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Coordinate with InfoSec teams and business units on the development, and monitoring of all Security risk based corrective action plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist in identifying & tracking information security risks, assessing their impact, and overseeing the implementation / execution of mitigation plans ensuring risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Manage and track information security risk acceptances, exceptions, and the execution of remediation plans, ensuring alignment with risk management objectives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ensure timely resolution for all audit and risk assessment findings/issues identified by information security, while promoting a culture of continuous improvement in risk management practices.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">As needed, support the business continuity (BC) and disaster recovery (DR) planning and testing.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">In conjunction with our Security Analyst team, develop control key performance indictors (KPI) to ensure compliance-related controls are operating to an acceptable tolerance level.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct periodic compliance checks across the iCIMS organization. Develop and define associated metrics to allow clear visibility into iCIMS governance, risk, and compliance status.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Manager, Information Security on coordination and execution of integration plans for iCIMS acquisitions, ensuring risk management considerations are adequately addressed.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with the annual review and update of information security related policies and processes.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in and manage annual security awareness campaigns.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Information Security Engineering teams supporting GRC for our detection/prevention systems (IDS/IPS), integrity monitoring, anti-virus/anti-malware, vulnerability management, data loss prevention (DLP), advanced persistent treat (APT), and policy compliance, as appropriate.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Evaluate and recommend GRC related technologies and solutions for future implementation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Handle sensitive and/or confidential material and information with suitable discretion.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Design and implement business integrated workflows for real time tracking and monitoring of identified risks, ensuring seamless flow of information among relevant stake holders.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Maintain the Security Risk repository, in a shared repository with other teams, to ensure information is accurate, up to date, reportable, and consistent to the designed workflows. </span></li></ul>","clientName":"careers-home","locations":"Multiple Locations"},"jdSettings":{"options":{"metadata":{"options":{"enabled":false,"data":[]},"categories":{"enabled":true},"locations":{"enabled":true},"req_id":{"enabled":true},"placement":"top"},"video":{"enabled":false,"placement":"above_description"},"displayFields":{"fieldOrder":["locations","categories","employment_type","tags2","req_id"],"fields":[{"item":"locations","token":"JOB_DESCRIPTION.LOCATION","ariaLabel":"JOB_DESCRIPTION.LOCATION_ARIA_LABEL","fieldType":"location"},{"item":"categories","token":"JOB_DESCRIPTION.CATEGORIES","ariaLabel":"JOB_DESCRIPTION.CATEGORIES_ARIA_LABEL","objectArrayKey":"name"},{"item":"tags2","token":"JOB_DESCRIPTION.TAGS2","ariaLabel":"JOB_DESCRIPTION.TAGS2_ARIA_LABEL"},{"item":"employment_type","token":"JOB_DESCRIPTION_EMPLOYMENT_TYPE","type":"dynamic","filterParam":"employmentType","tokenValueMapping":{"FULL_TIME":"JOBS.FILTER_EMPLOYMENT_TYPE.FULL_TIME","TEMPORARY":"JOBS.FILTER_EMPLOYMENT_TYPE.INTERN","PART_TIME":"JOBS.FILTER_EMPLOYMENT_TYPE.PART_TIME","CONTRACTOR":"JOBS.FILTER_EMPLOYMENT_TYPE.CONTRACTOR"}},{"item":"req_id","token":"JOB_DESCRIPTION.REQ_ID","ariaLabel":"JOB_DESCRIPTION.REQ_ID_ARIA_LABEL"}]}}},"sectionOrder":["description"],"getReferredEnabled":false,"addThisDisabled":true,"externalTrackifEnabled":false,"jibeTrackifEnabled":false,"brandName":"careers-home","globalSearchEnabled":true,"jobLangData":[{"code":"en-gb","name":"English (UK)"}],"postingLanguage":{"code":"en-gb","name":"English (UK)"},"referrals":{"enabled":true,"recruit":true},"seoMetaData":{"clientName":"careers-home","data":{"slug":"4711","category":[" Information Technology"],"full_location":"Holborn, United Kingdom; Custom House Quay, Ireland","short_location":"Multiple","language":"en-gb","languages":["en-gb"],"client_code":"customer0","req_id":"4711","title":"Sr. Security GRC Analyst","description":"<strong>Job Overview</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Do you have a strong understanding of Information Security operations and technologies? Have you built lasting relationships with business owners and vendors? We’re looking for a creative problem-solver and a self-starter with a finesse for risk management and compliance to join our Information Security team as a Sr. Security GRC Analyst.. You’ll work closely with our CISO and GRC Leader to manage diverse governance, risk and compliance security-related tasks and issues for our rapidly growing company, with a focus on people, practices, systems and metrics. You’ll be asked to keep up with the latest industry requirements and will lead iCIMS program for the identification of security risks and the associated execution of remediation and corrective action plans. This position is critical to ensuring iCIMS is following up with those steps previously agreed upon by the business. Additionally, you’ll provide audit and sales support. If you’re a highly organized, detail-oriented, risk focused, an expert communicator, and have experience with eGRC technology, let’s chat!</span></p> <br><strong>About Us</strong> <br><br><p style=\\"margin: 0px;\\"><span style=\\"font-size: 12pt; font-family: arial, helvetica, sans-serif;\\">When you join iCIMS, you join the team helping global companies transform business and the world through the power of talent. Our customers do amazing things: design rocket ships, create vaccines, deliver consumer goods globally, overnight, with a smile. As the Talent Cloud company, we empower these organizations to attract, engage, hire, and advance the right talent. We’re passionate about helping companies build a diverse, winning workforce and about building our home team. We're dedicated to fostering an inclusive, purpose-driven, and innovative work environment where everyone belongs.</span></p> <br><strong>Responsibilities</strong> <br><br><ul><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Collaborate with the Manager, Information Security to ensure alignment and seamless Intergrations of risk management strategies within the iCIMS security governance framework, supporting Security’s goals and initiatives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Support our Sales teams regarding prospect and customer security questions, assessments, and audits, including speaking to technical controls and their alternatives and appropriate risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct assessments related to iCIMS compliance framework and assist the business with management of associated findings & treatment plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Engage in risk communication, explaining technical controls, alternative measures, and the corresponding risk mitigation strategies as employed and coordinated with iCIMS technical teams.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Provide support and act as key stakeholder of regulatory and compliance initiatives and a variety of security frameworks.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in associated related audits to ensure risk management objectives are captured and met.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with iCIMS information security policy & procedures as related to current and future risks, non-conformities.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Coordinate with InfoSec teams and business units on the development, and monitoring of all Security risk based corrective action plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist in identifying & tracking information security risks, assessing their impact, and overseeing the implementation / execution of mitigation plans ensuring risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Manage and track information security risk acceptances, exceptions, and the execution of remediation plans, ensuring alignment with risk management objectives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ensure timely resolution for all audit and risk assessment findings/issues identified by information security, while promoting a culture of continuous improvement in risk management practices.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">As needed, support the business continuity (BC) and disaster recovery (DR) planning and testing.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">In conjunction with our Security Analyst team, develop control key performance indictors (KPI) to ensure compliance-related controls are operating to an acceptable tolerance level.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct periodic compliance checks across the iCIMS organization. Develop and define associated metrics to allow clear visibility into iCIMS governance, risk, and compliance status.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Manager, Information Security on coordination and execution of integration plans for iCIMS acquisitions, ensuring risk management considerations are adequately addressed.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with the annual review and update of information security related policies and processes.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in and manage annual security awareness campaigns.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Information Security Engineering teams supporting GRC for our detection/prevention systems (IDS/IPS), integrity monitoring, anti-virus/anti-malware, vulnerability management, data loss prevention (DLP), advanced persistent treat (APT), and policy compliance, as appropriate.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Evaluate and recommend GRC related technologies and solutions for future implementation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Handle sensitive and/or confidential material and information with suitable discretion.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Design and implement business integrated workflows for real time tracking and monitoring of identified risks, ensuring seamless flow of information among relevant stake holders.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Maintain the Security Risk repository, in a shared repository with other teams, to ensure information is accurate, up to date, reportable, and consistent to the designed workflows. </span></li></ul> <br><strong>Qualifications</strong> <br><br><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">A minimum of 5 years of experience in information security risk and/or compliance roles.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">eGRC technology experience preferred</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Additional consideration with experience building out risk workflows</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Prior experience with cloud-based security tools, technologies, and controls a plus (e.g, Amazon AWS, Azure) or ability to demonstrate a wholistic understanding of risks associated with these environments.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Demonstrate experience in assessing, identifying and managing risk for a 1,000+ (people) sized organization.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Familiar with and able to apply generally-accepted security methods, concepts and techniques, including an understanding of networks, operating systems, cloud operations and associated technologies and services for enterprise level organizations.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Highly developed organizational skills and attention to detail including the ability to handle multiple projects and priorities simultaneously with a high degree of professionalism and client service orientation</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Excellent communication and interpersonal skills. Articulates thoughts and ideas clearly, concisely, and persuasively including the ability to communicate security and risk-related concepts across all stakeholder groups (written and oral): Executive team, management, peers, and external customers</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ability to work effectively within a fast paced, changing environment that is going through high growth</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Self-starter with the demonstrated ability to take initiative, and who can proactively identify issues/opportunities, take-action or when necessary, recommend actions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Strategic analysis/creative problem solving and business judgment are required.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Knowledge of common Information Security governance frameworks such as Unified Control Frameworks (UCF), ISO 27001, Service Organization Control (SOC2), Control Objectives for Information and Related Technology (CoBIT), Information Technology Infrastructure Library (ITIL), National Institute of Standards and Technology (NIST), FedRAMP, and/or FFIEC preferred.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Experience with Office365, OneTrust, Exchange, Sumologic, Alertlogic, AWS, Azure, SIEM tools, IDS, CASb, Vulnerability Management is a plus.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bilingual in English and French is a plus</span></li></ul><p style=\\"margin: 0px;\\"> </p><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\"><strong>Education/Certifications/Licenses Required</strong></span></p><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bachelor’s Degree in Information Technology, Computer Science, related curriculum or equivalent experience.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">CISA, CISSP or similar security/GRC focused certifications a plus.</span></li></ul> <br><strong>EEO Statement</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">We celebrate diversity and are committed to creating an inclusive environment for all employees. Our approach helps us to build a winning team that represents a variety of backgrounds, perspectives, and abilities. So, regardless of how your diversity expresses itself, you can find a home here at iCIMS. </span></p><p style=\\"margin: 0px;\\"> </p><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">We are proud to be an equal opportunity and affirmative action employer. We prohibit discrimination and harassment of any kind based on race, color, religion, national origin, sex (including pregnancy), sexual orientation, gender identity, gender expression, age, veteran status, genetic information, disability, or other applicable legally protected characteristics. If you would like to request an accommodation due to a disability, please contact us at careers@icims.com.</span></p> <br><strong>Compensation and Benefits</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">iCIMS offers the following benefits: medical insurance (employees and dependent family members), personal life insurance, 28 days of paid vacation per year, reimbursement of lifestyle expense accounts, wellness service offerings, and a Retirement Plan.</span></p>","location_name":"London, UK","street_address":"125 Kingsway","city":"Holborn","country":"United Kingdom","country_code":"GB","postal_code":"WC2B","location_type":"LAT_LNG","latitude":51.5085,"longitude":-0.1257,"additional_locations":[{"city":"Custom House Quay","state":"Dublin","country":"Ireland"}],"categories":[{"name":"Information Technology"}],"tags1":["Experienced"],"tags2":["Hybrid (Remote / On Site)"],"department":"","benefits":[],"qualifications":"<ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">A minimum of 5 years of experience in information security risk and/or compliance roles.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">eGRC technology experience preferred</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Additional consideration with experience building out risk workflows</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Prior experience with cloud-based security tools, technologies, and controls a plus (e.g, Amazon AWS, Azure) or ability to demonstrate a wholistic understanding of risks associated with these environments.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Demonstrate experience in assessing, identifying and managing risk for a 1,000+ (people) sized organization.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Familiar with and able to apply generally-accepted security methods, concepts and techniques, including an understanding of networks, operating systems, cloud operations and associated technologies and services for enterprise level organizations.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Highly developed organizational skills and attention to detail including the ability to handle multiple projects and priorities simultaneously with a high degree of professionalism and client service orientation</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Excellent communication and interpersonal skills. Articulates thoughts and ideas clearly, concisely, and persuasively including the ability to communicate security and risk-related concepts across all stakeholder groups (written and oral): Executive team, management, peers, and external customers</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ability to work effectively within a fast paced, changing environment that is going through high growth</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Self-starter with the demonstrated ability to take initiative, and who can proactively identify issues/opportunities, take-action or when necessary, recommend actions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Strategic analysis/creative problem solving and business judgment are required.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Knowledge of common Information Security governance frameworks such as Unified Control Frameworks (UCF), ISO 27001, Service Organization Control (SOC2), Control Objectives for Information and Related Technology (CoBIT), Information Technology Infrastructure Library (ITIL), National Institute of Standards and Technology (NIST), FedRAMP, and/or FFIEC preferred.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Experience with Office365, OneTrust, Exchange, Sumologic, Alertlogic, AWS, Azure, SIEM tools, IDS, CASb, Vulnerability Management is a plus.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bilingual in English and French is a plus</span></li></ul><p style=\\"margin: 0px;\\"> </p><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\"><strong>Education/Certifications/Licenses Required</strong></span></p><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bachelor’s Degree in Information Technology, Computer Science, related curriculum or equivalent experience.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">CISA, CISSP or similar security/GRC focused certifications a plus.</span></li></ul>","hiring_organization":"iCIMS Talent Acquisition","hiring_organization_logo":"https://cms.jibecdn.com/prod/customer0/assets/LP-HEADER-NAV_LOGO-en-us-1658387307482.png","responsibilities":"<ul><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Collaborate with the Manager, Information Security to ensure alignment and seamless Intergrations of risk management strategies within the iCIMS security governance framework, supporting Security’s goals and initiatives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Support our Sales teams regarding prospect and customer security questions, assessments, and audits, including speaking to technical controls and their alternatives and appropriate risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct assessments related to iCIMS compliance framework and assist the business with management of associated findings & treatment plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Engage in risk communication, explaining technical controls, alternative measures, and the corresponding risk mitigation strategies as employed and coordinated with iCIMS technical teams.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Provide support and act as key stakeholder of regulatory and compliance initiatives and a variety of security frameworks.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in associated related audits to ensure risk management objectives are captured and met.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with iCIMS information security policy & procedures as related to current and future risks, non-conformities.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Coordinate with InfoSec teams and business units on the development, and monitoring of all Security risk based corrective action plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist in identifying & tracking information security risks, assessing their impact, and overseeing the implementation / execution of mitigation plans ensuring risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Manage and track information security risk acceptances, exceptions, and the execution of remediation plans, ensuring alignment with risk management objectives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ensure timely resolution for all audit and risk assessment findings/issues identified by information security, while promoting a culture of continuous improvement in risk management practices.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">As needed, support the business continuity (BC) and disaster recovery (DR) planning and testing.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">In conjunction with our Security Analyst team, develop control key performance indictors (KPI) to ensure compliance-related controls are operating to an acceptable tolerance level.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct periodic compliance checks across the iCIMS organization. Develop and define associated metrics to allow clear visibility into iCIMS governance, risk, and compliance status.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Manager, Information Security on coordination and execution of integration plans for iCIMS acquisitions, ensuring risk management considerations are adequately addressed.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with the annual review and update of information security related policies and processes.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in and manage annual security awareness campaigns.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Information Security Engineering teams supporting GRC for our detection/prevention systems (IDS/IPS), integrity monitoring, anti-virus/anti-malware, vulnerability management, data loss prevention (DLP), advanced persistent treat (APT), and policy compliance, as appropriate.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Evaluate and recommend GRC related technologies and solutions for future implementation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Handle sensitive and/or confidential material and information with suitable discretion.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Design and implement business integrated workflows for real time tracking and monitoring of identified risks, ensuring seamless flow of information among relevant stake holders.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Maintain the Security Risk repository, in a shared repository with other teams, to ensure information is accurate, up to date, reportable, and consistent to the designed workflows. </span></li></ul>","posted_date":"2023-11-15T04:25:00+0000","apply_url":"https://globalcareers-customer0.icims.com/jobs/4711/login","internal":false,"searchable":true,"active":true,"applyable":true,"li_easy_applyable":true,"ats_code":"icims","hiring_flow_name":"iCIMS ATS Hiring Flow","meta_data":{"openingjobs":{"openingJobId":"0000f81529cc256001dd0bbaf1b3eef2fda1"},"icims":{"revision_int":2,"uuid":"dfd77a17-25b6-494e-a317-b026ceee99fc","primary_posted_site_object":{"datePosted":"2023-11-15T04:25:00+0000","site":"globalcareers-customer0","siteId":"e6c1c01d-774c-4d43-82c4-5d9858fe53fd","tenantId":"12326","siteType":"ATTRACT"},"date_updated":"2023-11-15T04:26:56Z","config_keys":{"portal.id":"151","ccc.attract.portal.url":"https://careers.icims.com","icims.external.xml.feeds":"icims.indeed.xml.enabled,icims.resume-library.xml.enabled,icims.direct-employers.xml.enabled,icims.monster.xml.enabled,icims.adzuna.xml.enabled,icims.careerbuilder.xml.enabled,icims.ziprecruiter.xml.enabled,icims.craigslist.xml.enabled,icims.itjobscafe.xml.enabled,icims.recruitnet.xml.enabled,icims.upward.xml.enabled,icims.jobbio.xml.enabled,icims.propellum.xml.enabled,icims.snagajob.xml.enabled,icims.inhersight.xml.enabled,icims.pallet-labs.xml.enabled,icims.qkly.xml.enabled,icims.cv-library.xml.enabled,icims.linkedin.xml.enabled,icims.zippia.xml.enabled,icims.puck.xml.enabled","icims.company.facebook.url":"https://www.facebook.com/iCIMS","jobposting.external.company.name":"iCIMS Talent Acquisition","icims.config.web.indeed.easy.apply":"0"},"jps_is_public":true},"elasticsearch":{"es_created":false},"ats_job_hash":"b67845ee1ee235d59ac6fd4b67d77e78","googlejobs":{"jobName":"projects/helpful-passage-853/tenants/cb22eb5b-7e00-0000-0000-007edad744d3/jobs/126024502053085894"},"import_id":"24e80098-c22f-4a3f-8f8a-ee263d63a554","redirectOnApply":true,"questionservice":{"id":"29519288"},"import_source":"ImporterService","client_code":"customer0"},"update_date":"2023-11-15T21:25:02+0000","create_date":"2023-11-15T04:26:48+0000","multipleLocations":true},"formattedData":{"categories":"Information Technology","location":"Multiple","title":"Sr. Security GRC Analyst","seo_title":["Information+Technology","Multiple","Sr.+Security+GRC+Analyst"],"description":"<strong>Job Overview</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Do you have a strong understanding of Information Security operations and technologies? Have you built lasting relationships with business owners and vendors? We’re looking for a creative problem-solver and a self-starter with a finesse for risk management and compliance to join our Information Security team as a Sr. Security GRC Analyst.. You’ll work closely with our CISO and GRC Leader to manage diverse governance, risk and compliance security-related tasks and issues for our rapidly growing company, with a focus on people, practices, systems and metrics. You’ll be asked to keep up with the latest industry requirements and will lead iCIMS program for the identification of security risks and the associated execution of remediation and corrective action plans. This position is critical to ensuring iCIMS is following up with those steps previously agreed upon by the business. Additionally, you’ll provide audit and sales support. If you’re a highly organized, detail-oriented, risk focused, an expert communicator, and have experience with eGRC technology, let’s chat!</span></p> <br><strong>About Us</strong> <br><br><p style=\\"margin: 0px;\\"><span style=\\"font-size: 12pt; font-family: arial, helvetica, sans-serif;\\">When you join iCIMS, you join the team helping global companies transform business and the world through the power of talent. Our customers do amazing things: design rocket ships, create vaccines, deliver consumer goods globally, overnight, with a smile. As the Talent Cloud company, we empower these organizations to attract, engage, hire, and advance the right talent. We’re passionate about helping companies build a diverse, winning workforce and about building our home team. We're dedicated to fostering an inclusive, purpose-driven, and innovative work environment where everyone belongs.</span></p> <br><strong>Responsibilities</strong> <br><br><ul><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Collaborate with the Manager, Information Security to ensure alignment and seamless Intergrations of risk management strategies within the iCIMS security governance framework, supporting Security’s goals and initiatives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Support our Sales teams regarding prospect and customer security questions, assessments, and audits, including speaking to technical controls and their alternatives and appropriate risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct assessments related to iCIMS compliance framework and assist the business with management of associated findings & treatment plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Engage in risk communication, explaining technical controls, alternative measures, and the corresponding risk mitigation strategies as employed and coordinated with iCIMS technical teams.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Provide support and act as key stakeholder of regulatory and compliance initiatives and a variety of security frameworks.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in associated related audits to ensure risk management objectives are captured and met.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with iCIMS information security policy & procedures as related to current and future risks, non-conformities.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Coordinate with InfoSec teams and business units on the development, and monitoring of all Security risk based corrective action plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist in identifying & tracking information security risks, assessing their impact, and overseeing the implementation / execution of mitigation plans ensuring risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Manage and track information security risk acceptances, exceptions, and the execution of remediation plans, ensuring alignment with risk management objectives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ensure timely resolution for all audit and risk assessment findings/issues identified by information security, while promoting a culture of continuous improvement in risk management practices.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">As needed, support the business continuity (BC) and disaster recovery (DR) planning and testing.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">In conjunction with our Security Analyst team, develop control key performance indictors (KPI) to ensure compliance-related controls are operating to an acceptable tolerance level.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct periodic compliance checks across the iCIMS organization. Develop and define associated metrics to allow clear visibility into iCIMS governance, risk, and compliance status.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Manager, Information Security on coordination and execution of integration plans for iCIMS acquisitions, ensuring risk management considerations are adequately addressed.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with the annual review and update of information security related policies and processes.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in and manage annual security awareness campaigns.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Information Security Engineering teams supporting GRC for our detection/prevention systems (IDS/IPS), integrity monitoring, anti-virus/anti-malware, vulnerability management, data loss prevention (DLP), advanced persistent treat (APT), and policy compliance, as appropriate.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Evaluate and recommend GRC related technologies and solutions for future implementation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Handle sensitive and/or confidential material and information with suitable discretion.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Design and implement business integrated workflows for real time tracking and monitoring of identified risks, ensuring seamless flow of information among relevant stake holders.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Maintain the Security Risk repository, in a shared repository with other teams, to ensure information is accurate, up to date, reportable, and consistent to the designed workflows. </span></li></ul> <br><strong>Qualifications</strong> <br><br><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">A minimum of 5 years of experience in information security risk and/or compliance roles.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">eGRC technology experience preferred</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Additional consideration with experience building out risk workflows</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Prior experience with cloud-based security tools, technologies, and controls a plus (e.g, Amazon AWS, Azure) or ability to demonstrate a wholistic understanding of risks associated with these environments.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Demonstrate experience in assessing, identifying and managing risk for a 1,000+ (people) sized organization.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Familiar with and able to apply generally-accepted security methods, concepts and techniques, including an understanding of networks, operating systems, cloud operations and associated technologies and services for enterprise level organizations.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Highly developed organizational skills and attention to detail including the ability to handle multiple projects and priorities simultaneously with a high degree of professionalism and client service orientation</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Excellent communication and interpersonal skills. Articulates thoughts and ideas clearly, concisely, and persuasively including the ability to communicate security and risk-related concepts across all stakeholder groups (written and oral): Executive team, management, peers, and external customers</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ability to work effectively within a fast paced, changing environment that is going through high growth</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Self-starter with the demonstrated ability to take initiative, and who can proactively identify issues/opportunities, take-action or when necessary, recommend actions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Strategic analysis/creative problem solving and business judgment are required.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Knowledge of common Information Security governance frameworks such as Unified Control Frameworks (UCF), ISO 27001, Service Organization Control (SOC2), Control Objectives for Information and Related Technology (CoBIT), Information Technology Infrastructure Library (ITIL), National Institute of Standards and Technology (NIST), FedRAMP, and/or FFIEC preferred.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Experience with Office365, OneTrust, Exchange, Sumologic, Alertlogic, AWS, Azure, SIEM tools, IDS, CASb, Vulnerability Management is a plus.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bilingual in English and French is a plus</span></li></ul><p style=\\"margin: 0px;\\"> </p><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\"><strong>Education/Certifications/Licenses Required</strong></span></p><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bachelor’s Degree in Information Technology, Computer Science, related curriculum or equivalent experience.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">CISA, CISSP or similar security/GRC focused certifications a plus.</span></li></ul> <br><strong>EEO Statement</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">We celebrate diversity and are committed to creating an inclusive environment for all employees. Our approach helps us to build a winning team that represents a variety of backgrounds, perspectives, and abilities. So, regardless of how your diversity expresses itself, you can find a home here at iCIMS. </span></p><p style=\\"margin: 0px;\\"> </p><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">We are proud to be an equal opportunity and affirmative action employer. We prohibit discrimination and harassment of any kind based on race, color, religion, national origin, sex (including pregnancy), sexual orientation, gender identity, gender expression, age, veteran status, genetic information, disability, or other applicable legally protected characteristics. If you would like to request an accommodation due to a disability, please contact us at careers@icims.com.</span></p> <br><strong>Compensation and Benefits</strong><br><br><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">iCIMS offers the following benefits: medical insurance (employees and dependent family members), personal life insurance, 28 days of paid vacation per year, reimbursement of lifestyle expense accounts, wellness service offerings, and a Retirement Plan.</span></p>","qualifications":"<ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">A minimum of 5 years of experience in information security risk and/or compliance roles.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">eGRC technology experience preferred</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Additional consideration with experience building out risk workflows</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Prior experience with cloud-based security tools, technologies, and controls a plus (e.g, Amazon AWS, Azure) or ability to demonstrate a wholistic understanding of risks associated with these environments.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Demonstrate experience in assessing, identifying and managing risk for a 1,000+ (people) sized organization.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Familiar with and able to apply generally-accepted security methods, concepts and techniques, including an understanding of networks, operating systems, cloud operations and associated technologies and services for enterprise level organizations.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Highly developed organizational skills and attention to detail including the ability to handle multiple projects and priorities simultaneously with a high degree of professionalism and client service orientation</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Excellent communication and interpersonal skills. Articulates thoughts and ideas clearly, concisely, and persuasively including the ability to communicate security and risk-related concepts across all stakeholder groups (written and oral): Executive team, management, peers, and external customers</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ability to work effectively within a fast paced, changing environment that is going through high growth</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Self-starter with the demonstrated ability to take initiative, and who can proactively identify issues/opportunities, take-action or when necessary, recommend actions.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Strategic analysis/creative problem solving and business judgment are required.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Knowledge of common Information Security governance frameworks such as Unified Control Frameworks (UCF), ISO 27001, Service Organization Control (SOC2), Control Objectives for Information and Related Technology (CoBIT), Information Technology Infrastructure Library (ITIL), National Institute of Standards and Technology (NIST), FedRAMP, and/or FFIEC preferred.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Experience with Office365, OneTrust, Exchange, Sumologic, Alertlogic, AWS, Azure, SIEM tools, IDS, CASb, Vulnerability Management is a plus.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bilingual in English and French is a plus</span></li></ul><p style=\\"margin: 0px;\\"> </p><p style=\\"margin: 0px;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\"><strong>Education/Certifications/Licenses Required</strong></span></p><ul><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Bachelor’s Degree in Information Technology, Computer Science, related curriculum or equivalent experience.</span></li><li><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">CISA, CISSP or similar security/GRC focused certifications a plus.</span></li></ul>","responsibilities":"<ul><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Collaborate with the Manager, Information Security to ensure alignment and seamless Intergrations of risk management strategies within the iCIMS security governance framework, supporting Security’s goals and initiatives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Support our Sales teams regarding prospect and customer security questions, assessments, and audits, including speaking to technical controls and their alternatives and appropriate risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct assessments related to iCIMS compliance framework and assist the business with management of associated findings & treatment plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Engage in risk communication, explaining technical controls, alternative measures, and the corresponding risk mitigation strategies as employed and coordinated with iCIMS technical teams.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Provide support and act as key stakeholder of regulatory and compliance initiatives and a variety of security frameworks.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in associated related audits to ensure risk management objectives are captured and met.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with iCIMS information security policy & procedures as related to current and future risks, non-conformities.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Coordinate with InfoSec teams and business units on the development, and monitoring of all Security risk based corrective action plans.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist in identifying & tracking information security risks, assessing their impact, and overseeing the implementation / execution of mitigation plans ensuring risk mitigation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Manage and track information security risk acceptances, exceptions, and the execution of remediation plans, ensuring alignment with risk management objectives.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Ensure timely resolution for all audit and risk assessment findings/issues identified by information security, while promoting a culture of continuous improvement in risk management practices.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">As needed, support the business continuity (BC) and disaster recovery (DR) planning and testing.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">In conjunction with our Security Analyst team, develop control key performance indictors (KPI) to ensure compliance-related controls are operating to an acceptable tolerance level.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Conduct periodic compliance checks across the iCIMS organization. Develop and define associated metrics to allow clear visibility into iCIMS governance, risk, and compliance status.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Manager, Information Security on coordination and execution of integration plans for iCIMS acquisitions, ensuring risk management considerations are adequately addressed.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Assist with the annual review and update of information security related policies and processes.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Participate in and manage annual security awareness campaigns.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Work with the Information Security Engineering teams supporting GRC for our detection/prevention systems (IDS/IPS), integrity monitoring, anti-virus/anti-malware, vulnerability management, data loss prevention (DLP), advanced persistent treat (APT), and policy compliance, as appropriate.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Evaluate and recommend GRC related technologies and solutions for future implementation.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Handle sensitive and/or confidential material and information with suitable discretion.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Design and implement business integrated workflows for real time tracking and monitoring of identified risks, ensuring seamless flow of information among relevant stake holders.</span></li><li style=\\"text-align: left;\\"><span style=\\"font-family: arial, helvetica, sans-serif; font-size: 12pt;\\">Maintain the Security Risk repository, in a shared repository with other teams, to ensure information is accurate, up to date, reportable, and consistent to the designed workflows. </span></li></ul>","clientName":"careers-home","locations":"Multiple Locations"}},"isNoIndex":false,"preloginConfiguration":null,"contextSettings":{"contextDefinitions":[{"name":"sales","search":{"categories":"Sales|Account Management"},"recentJobs":{"limit":5},"metadata":{"title":"Sales | iCIMS Careers"}},{"name":"internal","metadata":{"title":"Internal Careers | iCIMS"},"isSSO":true,"search":{"internal":"true"},"personalizationConfig":{"enabled":true,"metadataDefaults":{"internal":true}},"overrides":{"omp":{"enabled":true,"cookieExpiration":180,"disablePorfileEditing":true}},"jobDescriptionConfig":{"addThisDisabled":true},"redirectConfiguration":{"enabled":true,"url":"/internal/jobs"}},{"name":"technology","search":{"categories":"Information Technology|Engineering|Analytics"},"recentJobs":{"limit":5},"metadata":{"title":"Technology & Infrastructure | iCIMS Careers"}},{"name":"business-support","search":{"categories":"Human Resources|Legal|Administrative/Clerical|Accounting/Finance"},"recentJobs":{"limit":5},"metadata":{"title":"Business Support | iCIMS Careers"}},{"name":"marketing","search":{"categories":"Marketing"},"recentJobs":{"limit":5},"metadata":{"title":"Marketing & Communications | iCIMS Careers"}},{"name":"customer-team","search":{"categories":"Project Management|Customer Success|Technical Support"},"recentJobs":{"limit":5},"metadata":{"title":"Customer Support | iCIMS Careers"}},{"name":"culture","metadata":{"title":"Culture | iCIMS Careers"}},{"name":"benefits","metadata":{"title":"Benefits | iCIMS Careers"}},{"name":"careers-home","metadata":{"title":"Careers | iCIMS Careers"},"iamOrgID":"org_Yp9KvWQdXBMfJE4K"},{"name":"diversity","metadata":{"title":"Diversity | iCIMS Careers"}},{"name":"our-locations","metadata":{"title":"Locations | iCIMS Careers"}},{"name":"benefits","metadata":{"title":"Benefits | iCIMS Careers"}},{"name":"internships","search":{"tags1":"Intern | Early Career"},"metadata":{"title":"Interns & Early Career| iCIMS Careers"}}],"defaultContext":"careers-home","currentContext":"careers-home","redirectWithSources":true,"currentClient":"customer0"},"similarJobsEnabled":false,"login":{},"inhouseAlertsEnabled":false}; </script>\n<script> window.jobDescriptionTemplates = {\n sectionTop: "<!-- FOR BRANDING ELEMENTS TO BE PLACED ABOVE JOB DESCRIPTION BODY -->",\n sectionBottom: "<!-- FOR BRANDING ELEMENTS TO BE PLACED BELOW JOB DESCRIPTION BODY -->",\n additionalButton: "<!-- additional button on JD page -->",\n getReferred: "<a href=\\"undefined\\" class=\\"get-referred cta-button\\">\\n <span class=\\"fa fa-users\\" aria-hidden=\\"true\\"></span>\\n Get Referred\\n</a>",\n rightRailMedia: "",\n};\n</script>\n\n <script src="https://app.jibecdn.com/prod/descriptions/1.1.45/polyfills-es5.js" nomodule=""></script>\n <script src="https://app.jibecdn.com/prod/descriptions/1.1.45/polyfills.js"></script>\n <script src="https://app.jibecdn.com/prod/descriptions/1.1.45/scripts.js"></script>\n <script src="https://app.jibecdn.com/prod/descriptions/1.1.45/main.js"></script>\n\n\n\n <script src="https://app.jibecdn.com/prod/social-share/0.0.34/runtime.js"></script>\n <script src="https://app.jibecdn.com/prod/social-share/0.0.34/polyfills.js"></script>\n <script src="https://app.jibecdn.com/prod/social-share/0.0.34/polyfills-es5.js" nomodule=""></script>\n <script src="https://app.jibecdn.com/prod/social-share/0.0.34/vendor.js"></script>\n <script src="https://app.jibecdn.com/prod/social-share/0.0.34/main.js"></script>\n\n\n\n\n\n\n<script src="https://widget.altrulabs.com/main.js" data-altru-widget-id="9052" data-altru-global-region="us"></script>\n\n<script data-cookieconsent="statistics">\n
\n
/**
\n
\n
@description: send an arbitrary payload to the server-side for later consumption.
\n
@param {Object} payload - a json payload that contains arbitrary data
\n
@param {String} payload.event_name - the unique name to associate with the event
\n
@param {String} payload.slug - the job id to associate with the event
\n
@param {String} payload.language - the locale to associate with the event\n */\n function sendEvent(payload) {\n// validation check\nif (!(payload || payload.event_name)) {\n console.error('insufficient data for meaningful response.');\n return;\n}
\n
\n
else {\n\n // send ajax request to backend for consumption\n $.ajax({\n method: 'POST',\n url: '/api/impression',\n data: payload,\n success: function (res) {\n // console.log('successful ajax call with response: ', res);\n }\n });\n}\n
<div class="cookie-consent">\n <div class="jibe-container cookie-consent-container">\n <div class="third-party-consent-text column-container">\n <p id="cookieconsent:desc">\n Cookies are used on this site to assist in continually improving the candidate experience and all the interaction data we store of our visitors is anonymous.\n
\n
Learn more about your rights on our Privacy Policy page.\n
We use cookies to provide website functionality and to analyze our traffic. If we have detected an opt-out preference signal then it will be honored. For more information, please see our Cookie Notice.\n
\n
\n
\n
\n \n
\n\n
\n\n\n
\n
\n
\n
\n
\n\n
\n
\n
\n\nYour Opt Out Preference Signal is Honored\n
\n
Privacy Preference Center
\n
When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. A description of the cookie types is provided below each category heading. Click on the button next to each category heading to change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.\n iCIMS Cookie Notice\n
\n
Manage Consent Preferences
\n
\n
\n
\n\n
\n
Strictly Necessary Cookies
\n
Always Active
\n
\n
These cookies are necessary for the Websites to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in, or filling in forms. You can set your browser to block or alert you about these cookies, but then some parts of the Websites will not work.
\n
\n
\n
\n
\n\n
\n
Performance Cookies
\n
\n
\n
\n
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our Websites. They help us to know which pages are the most and least popular and see how visitors move around the Websites. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our Websites and will not be able to monitor the performance of our Websites.
\n
\n
\n
\n
\n\n
\n
Targeting Cookies
\n
\n
\n
\n
These cookies may be set through our Websites by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant advertisements on other websites. They store uniquely identifying information about your browser and device. If you do not allow these cookies, you will experience less targeted advertising.
Holborn, United Kingdom; Custom House Quay, Ireland
Information Technology
Hybrid (Remote / On Site)
4711
Job Description
Job Overview
Do you have a strong understanding of Information Security operations and technologies? Have you built lasting relationships with business owners and vendors? We’re looking for a creative problem-solver and a self-starter with a finesse for risk management and compliance to join our Information Security team as a Sr. Security GRC Analyst.. You’ll work closely with our CISO and GRC Leader to manage diverse governance, risk and compliance security-related tasks and issues for our rapidly growing company, with a focus on people, practices, systems and metrics. You’ll be asked to keep up with the latest industry requirements and will lead iCIMS program for the identification of security risks and the associated execution of remediation and corrective action plans. This position is critical to ensuring iCIMS is following up with those steps previously agreed upon by the business. Additionally, you’ll provide audit and sales support. If you’re a highly organized, detail-oriented, risk focused, an expert communicator, and have experience with eGRC technology, let’s chat!
About Us
When you join iCIMS, you join the team helping global companies transform business and the world through the power of talent. Our customers do amazing things: design rocket ships, create vaccines, deliver consumer goods globally, overnight, with a smile. As the Talent Cloud company, we empower these organizations to attract, engage, hire, and advance the right talent. We’re passionate about helping companies build a diverse, winning workforce and about building our home team. We're dedicated to fostering an inclusive, purpose-driven, and innovative work environment where everyone belongs.
Responsibilities
Collaborate with the Manager, Information Security to ensure alignment and seamless Intergrations of risk management strategies within the iCIMS security governance framework, supporting Security’s goals and initiatives.
Support our Sales teams regarding prospect and customer security questions, assessments, and audits, including speaking to technical controls and their alternatives and appropriate risk mitigation.
Conduct assessments related to iCIMS compliance framework and assist the business with management of associated findings & treatment plans.
Engage in risk communication, explaining technical controls, alternative measures, and the corresponding risk mitigation strategies as employed and coordinated with iCIMS technical teams.
Provide support and act as key stakeholder of regulatory and compliance initiatives and a variety of security frameworks.
Participate in associated related audits to ensure risk management objectives are captured and met.
Assist with iCIMS information security policy & procedures as related to current and future risks, non-conformities.
Coordinate with InfoSec teams and business units on the development, and monitoring of all Security risk based corrective action plans.
Assist in identifying & tracking information security risks, assessing their impact, and overseeing the implementation / execution of mitigation plans ensuring risk mitigation.
Manage and track information security risk acceptances, exceptions, and the execution of remediation plans, ensuring alignment with risk management objectives.
Ensure timely resolution for all audit and risk assessment findings/issues identified by information security, while promoting a culture of continuous improvement in risk management practices.
As needed, support the business continuity (BC) and disaster recovery (DR) planning and testing.
In conjunction with our Security Analyst team, develop control key performance indictors (KPI) to ensure compliance-related controls are operating to an acceptable tolerance level.
Conduct periodic compliance checks across the iCIMS organization. Develop and define associated metrics to allow clear visibility into iCIMS governance, risk, and compliance status.
Work with the Manager, Information Security on coordination and execution of integration plans for iCIMS acquisitions, ensuring risk management considerations are adequately addressed.
Assist with the annual review and update of information security related policies and processes.
Participate in and manage annual security awareness campaigns.
Work with the Information Security Engineering teams supporting GRC for our detection/prevention systems (IDS/IPS), integrity monitoring, anti-virus/anti-malware, vulnerability management, data loss prevention (DLP), advanced persistent treat (APT), and policy compliance, as appropriate.
Evaluate and recommend GRC related technologies and solutions for future implementation.
Handle sensitive and/or confidential material and information with suitable discretion.
Design and implement business integrated workflows for real time tracking and monitoring of identified risks, ensuring seamless flow of information among relevant stake holders.
Maintain the Security Risk repository, in a shared repository with other teams, to ensure information is accurate, up to date, reportable, and consistent to the designed workflows.
Qualifications
A minimum of 5 years of experience in information security risk and/or compliance roles.
eGRC technology experience preferred
Additional consideration with experience building out risk workflows
Prior experience with cloud-based security tools, technologies, and controls a plus (e.g, Amazon AWS, Azure) or ability to demonstrate a wholistic understanding of risks associated with these environments.
Demonstrate experience in assessing, identifying and managing risk for a 1,000+ (people) sized organization.
Familiar with and able to apply generally-accepted security methods, concepts and techniques, including an understanding of networks, operating systems, cloud operations and associated technologies and services for enterprise level organizations.
Highly developed organizational skills and attention to detail including the ability to handle multiple projects and priorities simultaneously with a high degree of professionalism and client service orientation
Excellent communication and interpersonal skills. Articulates thoughts and ideas clearly, concisely, and persuasively including the ability to communicate security and risk-related concepts across all stakeholder groups (written and oral): Executive team, management, peers, and external customers
Ability to work effectively within a fast paced, changing environment that is going through high growth
Self-starter with the demonstrated ability to take initiative, and who can proactively identify issues/opportunities, take-action or when necessary, recommend actions.
Strategic analysis/creative problem solving and business judgment are required.
Knowledge of common Information Security governance frameworks such as Unified Control Frameworks (UCF), ISO 27001, Service Organization Control (SOC2), Control Objectives for Information and Related Technology (CoBIT), Information Technology Infrastructure Library (ITIL), National Institute of Standards and Technology (NIST), FedRAMP, and/or FFIEC preferred.
Experience with Office365, OneTrust, Exchange, Sumologic, Alertlogic, AWS, Azure, SIEM tools, IDS, CASb, Vulnerability Management is a plus.
Bilingual in English and French is a plus
Education/Certifications/Licenses Required
Bachelor’s Degree in Information Technology, Computer Science, related curriculum or equivalent experience.
CISA, CISSP or similar security/GRC focused certifications a plus.
EEO Statement
We celebrate diversity and are committed to creating an inclusive environment for all employees. Our approach helps us to build a winning team that represents a variety of backgrounds, perspectives, and abilities. So, regardless of how your diversity expresses itself, you can find a home here at iCIMS.
We are proud to be an equal opportunity and affirmative action employer. We prohibit discrimination and harassment of any kind based on race, color, religion, national origin, sex (including pregnancy), sexual orientation, gender identity, gender expression, age, veteran status, genetic information, disability, or other applicable legally protected characteristics. If you would like to request an accommodation due to a disability, please contact us at careers@icims.com.
Compensation and Benefits
iCIMS offers the following benefits: medical insurance (employees and dependent family members), personal life insurance, 28 days of paid vacation per year, reimbursement of lifestyle expense accounts, wellness service offerings, and a Retirement Plan.
Cookies are used on this site to assist in continually improving the candidate experience and all the interaction data we store of our visitors is anonymous.
Learn more about your rights on our Privacy Policy page.
We use cookies to provide website functionality and to analyze our traffic. If we have detected an opt-out preference signal then it will be honored. For more information, please see our Cookie Notice.
Your Opt Out Preference Signal is Honored
Privacy Preference Center
When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. A description of the cookie types is provided below each category heading. Click on the button next to each category heading to change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
iCIMS Cookie Notice
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the Websites to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in, or filling in forms. You can set your browser to block or alert you about these cookies, but then some parts of the Websites will not work.
Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our Websites. They help us to know which pages are the most and least popular and see how visitors move around the Websites. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our Websites and will not be able to monitor the performance of our Websites.
Targeting Cookies
These cookies may be set through our Websites by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant advertisements on other websites. They store uniquely identifying information about your browser and device. If you do not allow these cookies, you will experience less targeted advertising.