Compensation is subject to a number of factors like education, certification, experience, etc.
Incident response experience will be prioritized over Third Party Risk experience.
Must-Haves:
- Typically between 3 - 5 years of relevant experience within cyber security for third-party incident response and third-party risk management. Additionally, a post-secondary degree in Cyber/Information Security, Computer Science, Engineering, Information Systems, or a related field of study or an equivalent combination of education and experience
- Experience with third-party incident response, reviewing vulnerability management and penetration test reports, familiarity with OWASP, and ability to identify both risks and root causes
- Experience with conducting cybersecurity assessments on third-party suppliers using common industry frameworks, including NIST Cyber Security Framework (CSF), NIST 800-53, ISO 27001 and 27002, Payment Card Industry (PCI) Data Security Standard (DSS), CIS Top 18/20, or OWASP
- Strong analytical experience, the candidate must be able to independently review technical artifacts to determine if they satisfy industry standard framework requirements and submit reports with their written and detailed analysis, including passing quality assurance processes
- Strong ability to interact and communicate both written and verbally with people at all levels, both technical and non-technical, in a dynamic environment where interactions vary from written to verbal communications. Additionally, must work well independently with the ability to produce deliverables on a daily basis
- Preference for candidates with at least one certification in a related field, with strong preference for Information Security certifications from a well-recognized institution (e.g. (ISC)2, ISACA, SANS)
- Experience with tools such as BitSight, Nessus, SecurityScorecard, Black Kite, Risk Recon, Recorded Future, Threat Connect, Flashpoint, RSA Archer, or Shodan
- Strong proficiency in Microsoft Excel, Word, and Outlook and closely tracking of tasks with frequent status updates
- Excellent written and verbal communication skills for reporting and presenting reviews to senior leaders - in-depth
- Understanding of multiple information security platforms and able to solve complex issues
- Technical and system-level expertise in one or more information security solutions and/or extensive background in security or IT design and engineering.
Job Description
The individual for this role will lead third party incident response and management activities for our client's third and fourth-party suppliers. The analyst will provide cybersecurity subject matter expertise to execute on the following:
- Executes end to end cyber security processes for monitoring, engaging, tracking, and remediation activities related to third-party and fourth-party incident response
- Uses analysis to identify risks, understands the scope of complexity that exists in computing environments, across all layers, and the ways which a security incident may impact that environment. Equipped with the technical skills to determine necessary risk mitigations associated with cyber security incidents and root cause analysis
- Reviews technical artifacts to determine if they satisfy remediation requirements, align to industry standard framework requirements, and submit reports with written and detailed analysis surrounding each incident
- Builds effective relationships and communication with both internal and external stakeholders. Troubleshoots and problem solves complex issues with internal and external stakeholders, as required
- Exercises judgment to identify, diagnose, and solve problems for each unique scenario
- Works independently on a range of complex tasks, which may include unique situations
- Ensures consistent, high quality practices/work and the achievement of business results in alignment with business/group strategies and with productivity goals
- Develops and implements changes to streamline and integrate security processes and systems in the organization
- Identifies opportunities to strengthen the information security capability at BMO, such as: sharing expertise to promote technical development, mentoring and educating peers and employees, building communities and professional networks across BMO
- Stays abreast of industry technical and business trends through participation in professional associations, practice communities & individual learning
- Broader work or accountabilities may be assigned as needed