Position Description: Assess the controls over application processes, including physical and logical security, systems acquisition and development, system and network infrastructure, system architecture, change management, computer operations, and production support. Evaluates network architecture, infrastructure, and system configurations to identify security risks and weaknesses. Performs penetration testing and vulnerability assessments to identify potential entry points for cyber threats. Primary Responsibilities: Evaluates Fidelity’s information systems, technology, infrastructure, and security protocols. Performs agile audits, evaluating risks, including technology, financial, reputational, and regulatory, and testing controls designed to mitigate risk. Identifies and assess complex risks, communicate issues and findings to management, devise solutions to mitigate identified risks, and follow-up on corrective actions to ensure the safeguarding of sensitive data, protection against cyber threats, and compliance with industry standards and applicable regulations. Develops data analysis and applies leading edge and other automated tools to provide management with proper context of potential exposure and loss of business due to control weaknesses. Develops an ongoing “trusted advisor” relationship with audit clients and Internal Audit business unit colleagues to ensure timely and consistent controls advice. Provides audit advisory services on new and changing products and systems and develops talented professionals for audit and leadership positions. Conducts Data Discovery and Classification Audits to assess how data is being stored, transmitted, and processed across Fidelity. Leads DLP policy effectiveness assessments and reviews to identify policy gaps and areas in need of improvement. Conducts Transmission and Storage Audits to ensure the secure transmission and storage of sensitive data both within and outside the organization. Conducts Insider Threat Detection Audits to identify and prevent potential data breaches caused by insider threats, including employees, contractors, and business partners. Reviews incident response plans and procedures to assess the organization’s readiness to handle cyber security incidents. Provides recommendations for improving incident detection, response, and recovery processes.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level