Cyber Security Risk Expert IV Design, administer, and execute procedures for the identification, assessment, documentation, and communication of risks that could compromise data and operations stemming from weaknesses in technology platforms, solution architectures, governance processes, and security capabilities, against industry standards and best practices. Provide recommendations to improve and sustain the security of the enterprise's data and operations and document the organizational risk response plan (accept, mitigate, transfer, or avoid). Monitor, report on, and validate, the status and efficacy of risk mitigation, transfer, or avoidance plans. Task description and/or any specific requirements: • Demonstrate expert-level knowledge and proficiency with ServiceNow (SNow) Vulnerability Response (VR) and generally associated modules, including but not limited to the following skills, abilities and knowledge: o General: Deep understanding of SNow platform's core functionalities and components, including forms, MID servers, tables, dashboards and access control lists (ACLs) o Scripting: Proficiency in rules and scripting (e.g., JavaScript), adequate to develop, test and deploy o Integrations: Proficiency to develop and troubleshoot VR integrations, including knowledge of APIs and service graph connectors o Dashboarding: Proficiency in designing and developing VR-focused dashboards and reports • Design and administer procedures within the organization to sustain the security of the organization's data and access to its technology and communication systems • Assess the risk of exposure of proprietary data through weaknesses in platforms, access procedures and forms of access, to the organization's systems and data contained within • Ability to review, collate, understand and present data, from various sources, to meet the remediation needs and expectations of the organization • Knowledge of automation coding, to automate data extrapolation, organization and dissemination, to meet the needs of the organization • Ability to review, investigate and assign cybersecurity vulnerabilities, for a variety of applications, systems and hardware, including cloud computing • Manage several projects/initiatives of various sizes, complexities and risks • Demonstrated proficiency in successfully evaluating and supporting documentation, validation and remediation processes required to ensure new and existing information technology (IT) systems meet the organization's vulnerability remediation expectations and requirements • Demonstrated ability to review and understand security blueprints, principles, models, designs, standards, and guidelines to ensure enterprise cybersecurity remediation support is consistent and beneficial to the organization • Experience with vulnerability remediation and remediation processes and efforts, as well as remediation tools • Ability to serve as subject matter expert (SME) for the VRM process, including providing guidance to stakeholders, business units and new CISO resources, as necessary • Strong organizational skills and ability to build and maintain schedules and step-by-step action plans • Effective communication and collaboration skills to work with cross-functional teams, business units, stakeholders and IT professionals, and to conduct presentations to varying audiences and technical knowledge levels.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Career Level
Mid Level
Number of Employees
51-100 employees