Job Title: Information Security Manager 3 (Remote)
Location: Austin TX
Duration: 03 Months with possible extension
Job Description:
Define end to end governance workflows for:
- Risk identification and intake
- Risk review and validation
- Risk acceptance mitigation or transfer
- Ongoing monitoring and periodic reassessment
- Establish roles and responsibilities for risk owners reviewers and governance bodies.
- Design escalation and reporting processes for high risk and accepted risks.
- Engage key stakeholders across business technology security and governance functions to validate risk requirements and workflows.
- Facilitate working sessions or workshops to socialize the risk register and governance processes.
- Support onboarding of initial risks into the enterprise risk register.
Produce clear audit ready documentation covering:
- Risk register structure and data definitions
- Risk scoring methodology
- Governance workflows and decision authorities
- Provide knowledge transfer to designated security staff to ensure sustainability beyond the contract term.
The contractor shall provide the following deliverables during the engagement:
Enterprise Risk Register Framework
- Standardized risk register template and taxonomy
Risk Scoring and Prioritization Model
- Documented likelihood and impact scales
- Scoring methodology and prioritization logic
Risk Governance Model
- Defined workflows for risk intake review acceptance and monitoring
- Roles and responsibilities matrix
Initial Population of Risk Register
- Initial set of documented risks reflecting current cybersecurity and technology risk posture
Final Documentation Package
- Consolidated guidance and operating procedures for ongoing risk management
CANDIDATE SKILLS AND QUALIFICATIONS
| Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. |
| Years | Required/Preferred | Experience |
| 8 | Required | Experience with Risk Register Design and Framework |
| 8 | Required | Experience with Risk Scoring and Prioritization Model |
| 8 | Required | Experience with Governance Processes and Workflows |
| 8 | Required | Experience with Stakeholder and Enablement |
| 8 | Required | Demonstrated skill with documentation and knowledge transfer |
Job Title: Information Security Manager 3 (Remote) Location: Austin TX Duration: 03 Months with possible extension Job Description: Define end to end governance workflows for: Risk identification and intake Risk review and validation Risk acceptance mitigation or transfer Ongoing monitoring an...
Job Title: Information Security Manager 3 (Remote)
Location: Austin TX
Duration: 03 Months with possible extension
Job Description:
Define end to end governance workflows for:
- Risk identification and intake
- Risk review and validation
- Risk acceptance mitigation or transfer
- Ongoing monitoring and periodic reassessment
- Establish roles and responsibilities for risk owners reviewers and governance bodies.
- Design escalation and reporting processes for high risk and accepted risks.
- Engage key stakeholders across business technology security and governance functions to validate risk requirements and workflows.
- Facilitate working sessions or workshops to socialize the risk register and governance processes.
- Support onboarding of initial risks into the enterprise risk register.
Produce clear audit ready documentation covering:
- Risk register structure and data definitions
- Risk scoring methodology
- Governance workflows and decision authorities
- Provide knowledge transfer to designated security staff to ensure sustainability beyond the contract term.
The contractor shall provide the following deliverables during the engagement:
Enterprise Risk Register Framework
- Standardized risk register template and taxonomy
Risk Scoring and Prioritization Model
- Documented likelihood and impact scales
- Scoring methodology and prioritization logic
Risk Governance Model
- Defined workflows for risk intake review acceptance and monitoring
- Roles and responsibilities matrix
Initial Population of Risk Register
- Initial set of documented risks reflecting current cybersecurity and technology risk posture
Final Documentation Package
- Consolidated guidance and operating procedures for ongoing risk management
CANDIDATE SKILLS AND QUALIFICATIONS
| Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. |
| Years | Required/Preferred | Experience |
| 8 | Required | Experience with Risk Register Design and Framework |
| 8 | Required | Experience with Risk Scoring and Prioritization Model |
| 8 | Required | Experience with Governance Processes and Workflows |
| 8 | Required | Experience with Stakeholder and Enablement |
| 8 | Required | Demonstrated skill with documentation and knowledge transfer |
View more
View less