Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
Position: Risk Expert III
Job Location: 805 Moberly Lane, Bentonville, AR 72716
Duties: Conducts cyber risk assessment and management techniques. Reviews security risks, threats and vulnerabilities, possible treatments of security risks, threats and vulnerabilities, evolving security landscape and emerging cyber security threats and performs assessment of potential business risks from security gaps. Contributes towards development of cyber risk assessment and/or management techniques to identify security gaps and weaknesses in the business. Designs cyber risk assessments by consolidating insights from the business and various functions. Identifies cyber security risks, threats and vulnerabilities, and their impact on the organization. Identifies possible treatments for cyber risks, threats and vulnerabilities identified. Identifies and propose implementation of endorsed mitigation measures to address security gaps. Performs risk and security governance, including organizational risks and security operational procedures, risk and security gap analysis, security threats and system vulnerabilities, corporate risk and security policies, security frameworks, implementation processes and considerations for security policies and protocols, types of security controls and implementation procedures, techniques for the assessment of processes against security standards. Assesses the security compliance of applications and infrastructure components to risk and security standards and baselines. Identifies lapses in organizational risk and security standards or issues that may endanger information security and integrity. Develops specific action plans for different business units based on corporate risk and security policies, standards, and guidelines. Evaluates technologies and tools that can address security gaps and facilitate alignment with risk and security policies. Introduces/participates in the introduction of security controls in alignment with corporate risk and security policies and frameworks. Implements security guidelines and protocols and ensure understanding and compliance. Reviews the adequacy of information security controls. Identifies areas for improvement and proposes solutions or revisions to risk and security guidelines. Performs security assessment and testing: application and use of basic security assessment tools and tests, general processes and technical requirements of penetration testing system security vulnerabilities and threats, processes, and techniques for secured source code review, threat modeling techniques, security testing techniques and methodologies, network monitoring tools. Participates in authorized penetration testing of systems using a range of penetration testing methodologies, tools, and techniques. Demonstrates awareness of system components and impacts and contributes to the remediation of identified issues. Uses a suite of network monitoring and vulnerability scanning tools to assess threats and vulnerabilities in systems. Identifies vulnerability exploitations and potential attack vectors in systems. Analyzes vulnerability scan results to size and assess security loopholes and threats.
Minimum education and experience required: Bachelor's degree or the equivalent in Computer Science, Information Technology, Engineering or related field plus 2 years of experience in cybersecurity risk or related experience; OR 4 years of experience in cybersecurity risk or related experience.
Skills required: Must have experience with: Security Compliance; Security Compliance Remediation Actions; Compliance standards, security policies, standards; IT Assessment; Reviewing clients' IT processes, risk, controls and compliance against leading practice, industry, or client frameworks, identifying gaps in design and execution, and communicating issues and recommendations to engagement leads and client project manager; Utilizing JIRA for compliance tracking and project management; Leading development and execution of risk assessment methodologies to fit business, regulatory, and technical environment considerations; Cyber Risk Management concepts and controls; Partnering with stakeholders to build credibility and trust while driving alignment around common strategy. Employer will accept any amount of experience with the required skills.
#LI-DNP #LI-DNI
Wal-Mart is an Equal Opportunity Employer.