|
Job Description |
This position will support the Security and Privacy Risk Compliance Department with maintenance of the third-party risk management program. The candidate will manage projects within the third-party risk management program, including assessing suppliers against internal policy and external regulations (including both security and privacy domain compliance), assessing suppliers for security and privacy risk, and help drive remediations.
Candidate must be familiar with security controls needed for third parties and be able to review third-party contracts as they relate to security and privacy risk management.
This position will require coordinating, communicating, and working effectively with suppliers, partners, prospects, customers, internal process owners (including the internal legal department, security architecture, development, and operations), internal and external auditors, and all levels of management. The candidate should be familiar with third-party compliance reports, including SOC 1 and SOC 2 reports, as well as understand general IT controls and security controls. The candidate must have security and privacy experience.
Job Responsibilities & Duties:
- Manage and review supplier and partner risk assessments
- Review controls of relevant third parties to address security and privacy risk, which may include controls testing, compliance report reviews, and documentation reviews
- Assess end to end risks and controls with evaluation of existing processes
- Maintain controls documentation with SMEs and ensure compliance with Internal and External Audit
- Perform security and privacy risk assessments
- Review third-party relationships from a security and privacy risk management perspective
- Review third-party contracts from a security and privacy risk management perspective
The position prefers experience in IT compliance, privacy compliance, audit, software development lifecycle (SDLC), and security and privacy best practices in a SaaS/Cloud environment.
Additionally, the below will be considered in hiring the appropriate candidate:
- Candidate must possess at least a Bachelor's/College Degree
- At least 5 year(s) of working experience in Security/Privacy Compliance, Audit, or related field is required for this position
- Candidate should maintain an appropriate professional certification centered around information security or privacy (CISA, CISSP, CIPP, CIPM, etc.)
- Candidate should have hands-on working knowledge and experience with risk assessments and third-party risk management
- Candidate should have hands-on working knowledge and experience with ITGC
- Experience and working knowledge of security-related technology (e.g. Identity Management tools, Firewalls, etc.) is preferred
- Working knowledge of ERP systems (e.g., NetSuite, PeopleSoft FDM and Oracle eBusiness) security and privacy standards and implementation is preferred
- Exposure to cloud environment an advantage
- Security and Privacy work with mergers and acquisitions is an advantage
Supports the strengthening of Oracle’s security posture, focusing on one or more of the following: risk management; regulatory compliance; threat and vulnerability management; incident management and response; security policy development and enforcement; privacy; information security education, training and awareness (ISETA); digital forensics and similar focus areas. Risk Management: Assesses the information security risk associated with existing and proposed business operational programs, systems, applications, practices and procedures in complex, business-critical environments. May conduct and document complex information security risk assessments. May assist in the creation and implementation of security solutions and programs. Regulatory Compliance: assists in programs to establish, document and track compliance to industry and government standards and regulations, e.g. ISO-27001, PCI-DSS, HIPAA, FedRAMP, GDPR, etc. Researches and interprets current and pending governmental laws and regulations, industry standards and customer and vendor contracts to communicate compliance requirements to the business. Threat and Vulnerability Management: May research, evaluate, track, and manage information security threats and vulnerabilities in situations where analysis of well-understood information is required. Incident Management and response: Responds to security events, identifying possible intrusions and responding in line with Oracle incident response playbooks. Digital Forensics: May conduct data collection, preservation and forensic analysis of digital media independently, where a basic understanding of forensic techniques is required. Other areas of focus may include duties managing Information Security Education, Training and Awareness programs. In a Corporate Security role, may manage the creation, review and approval of corporate information security policies. Compiles information and reports for management.
Minimum of 5 years experience in information systems, business operations, or related fields, at least 2 years of which must be from at least one of the following: Information security risk management; information security program management; Industry/Government security compliance program management (ISO-27001, GDPR, HIPAA, FedRamp, etc.); threat and vulnerability management; incident management and response; security policy development and enforcement; privacy, information security education, training and awareness (ISETA), information security solutions development, etc. required. Preferred but not required qualifications include: Bachelor-level university degree in a relevant field from an accredited university, or equivalent. CISSP, CISM, CISA , CIPP or other equivalent certification. Experience managing security incidents and vulnerabilities through their life cycle. Experience designing and developing automated process for responding to possible network intrusions. Knowledge of secure software design principles and the software development life cycle. Experience with at least 1 automation language or framework (Python, Ruby, SALT, Terraform, etc.) or vulnerability scanning tool (Qualys, Burp Suite, etc.).
As part of Oracle's employment process candidates will be required to successfully complete a pre-employment screening process. This will involve identity and employment verification, professional references, education verification and professional qualifications and memberships (if applicable).
Get email alerts for the latest"Security Analyst 3 jobs in Spain"
