Third Party Governance Role

7

Applications

Pune
Chennai
Remote
Hybrid
Senior: 7 to 10 years
24L - 25L (Per Year)
Posted on Apr 06 2024

Not Accepting Applications

About the Job

Skills

Revise the Vendor Risk Assessment Playbook, Process, and Procedures to ensure they're up-todate with industry practices
Construct a risk assessment plan using a standardized approach to minimize the bank's exposure to third-party vendor risks
Analyse third-party cyber risk assessment documents and procedures to ensure comprehensive risk management.
Continually monitor and adapt to new risks, ensuring that assessment strategies are proactive.
Scrutinize and validate cyber tools and create test cases to assess the effectiveness of thirdparty cyber risk tools.
Optimize the use of JIRA for improved tracking and management of cyber assessments.
Establish a Cyber Program Management Office to oversee and align cyber risk projects with organizational goals.
Provide ongoing support for cyber risk initiatives and ensure effective communication among all stakeholders.



Vendor Risk Identification and Analysis:

• Revise the Vendor Risk Assessment Playbook, Process, and Procedures to ensure they're up-todate with industry practices. • Construct a risk assessment plan using a standardized approach to minimize the bank's exposure to third-party vendor risks.

b. Third Party Cyber Risk Assessments:

• Analyse third-party cyber risk assessment documents and procedures to ensure comprehensive risk management.

• Continually monitor and adapt to new risks, ensuring that assessment strategies are proactive.

c. Tools, Measurement, and Analysis:

• Scrutinize and validate cyber tools and create test cases to assess the effectiveness of thirdparty cyber risk tools.

• Optimize the use of JIRA for improved tracking and management of cyber assessments.

d. Program Governance

Cyber PMO: • Establish a Cyber Program Management Office to oversee and align cyber risk projects with organizational goals.

• Provide ongoing support for cyber risk initiatives and ensure effective communication among all stakeholders.


Vendor Risk Assessment and Mitigation

1. Walkthroughs and Understanding: Conducting in-depth sessions with application owners to comprehend the application architecture, services provided, and IT processes involved.

2. Assessment Scope and Connectivity: Defining the scope of the assessment and identifying how vendor services connect with the organization’s existing architecture.

3. Questionnaire Distribution and Assistance: Tailoring assessment questionnaires based on vendor service applicability and facilitating stakeholders in completing them.

4. Evidence Review and Follow-ups: Reviewing the evidence provided by stakeholders and conducting follow-up meetings for clarification and understanding of responses.

5. Gap Analysis and Validation: Analysing the questionnaires to identify gaps and conducting validation sessions with stakeholders on the findings.

6. Risk Assessment Reporting: Compiling the findings into a Risk Assessment Report that details the risks and their ratings. The deliverables from this stage include a controls checklist for vendors and a comprehensive Risk Assessment report.


For Risk Mitigation:

• Propose recommendations and create an action plan for risk treatment. • Review and evaluate proposed actions against the organization's risk acceptance criteria.

For the Cyber TPG Vendor Assessment:

• Conduct a thorough analysis of vendor architecture and applications.

• Study and evaluate advanced assessment methodologies for vendors, including their effectiveness and applicability.

• Compare assessment methodologies like vBSIMM, SAMM against current vendor risk profiles.

• Determine the effectiveness of vendors' application code reviews and data flow mapping.

• Evaluate vendors' implementation and maintenance of Cloud SIEM solutions. For Inherent Risk Profiling of the vendors:

• Review the inherent cyber risk profiles (IRPs) for vendors within scope.

• Present a categorization of the vendors based on risk and determine the necessity of onsite assessments.

• Outline the scope of the assessment domains for the vendors.

• Analyze the alignment of vendor risk profiles with the organization's cybersecurity framework.

• Assess the necessity for an onsite assessment based on the vendor's risk tier and engagement level.

• Develop a comprehensive risk assessment timeline that accounts for the complexity and scope of vendor services. The deliverables for these stages include detailed Inherent Risk Profiling which encompasses risk categorization, engagement level risk tiering, scheduling for assessments, and the approach and scope for each vendor.


Min 5 to Max 10 yrs of relevant experience. Location: Pune (Onsite role)


Notice Period – Immediate to 30 days.


The roles will start remotely and those selected to convert to Full time would be expected to be onsite in Pune (preferred) or Chennai. Hybrid - 3 days onsite/2 remote

About the company

We are pleased to introduce ourselves as Recruitment Firm”. Innovative Talent Solutions having put up in Delhi / NCR has a team of experienced professionals from reputed organizations, occupied in providing customized manpower solutions to various industries. We are committed to giving superior performance and we promise you of a high level of truthfulness and speed in the assignments we ha ...Show More

Industry

Recruitment and HR

Company Size

2-10 Employees

Headquarter

New Delhi

Other open jobs from Innovative Talent Solutions