<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Information Security Risk Manager in Cybersecurity Job Openings</title>
    <link>https://community.isc2.org/t5/Cybersecurity-Job-Openings/Information-Security-Risk-Manager/m-p/44421#M63</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Job Opportunity with ASML in Wilton, Connecticut.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;R&amp;amp;D Security Risk Management (RD SRM) operates within the R&amp;amp;D domain, which includes Development &amp;amp; Engineering and System Engineering. The&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Information Security Risk Manager&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;is responsible for keeping information security risks within the R&amp;amp;D risk appetite by identifying and assessing risks, driving risk mitigation and monitoring execution.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;As part of this profile, you will support the RD SRM department as a whole, with responsibility for information security across multiple focus areas, including identity and access management, application security, cloud security, intellectual property protection and projects.&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Job Description&lt;/STRONG&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Perform information security risk management activities across all focus areas. These activities include the execution of generic risk assessments, analysis/evaluation of identified risks and proposed mitigating controls. This may also include:&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Conducting Information Systems Security Assessments (Application Security)&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Completing GRC assessments for new business/IT projects (on-premise and cloud)&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Assessing DevOps environments&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Prepare risk reports, guiding the process on management response and driving the mitigation of agreed controls&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Maintain the R&amp;amp;D security risk register (including product security risks)&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Identify product security exceptions&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Support the product security incident management process&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Alignment with other security competences (IT and Business) within the security community&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Perform generic risk assessments for identified risks and create risk reports&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Ensure compliance to security policies and standards&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Provide and contribute to security awareness trainings for specialized topics, such as secure software development.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;STRONG&gt;Education&lt;/STRONG&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Bachelor degree and relevant education in Information Security.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;In possession of one or more valid industry certifications (CISM, CISA, CISSP, CRISC, CCSP).&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;7+ years of relevant experience in information security risk management.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;STRONG&gt;Experience&lt;/STRONG&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Proven experience with the ISO27001/2 framework; background in ISO31000 is also beneficial.&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Knowledgeable of relevant laws and regulations (GDPR, privacy and US export regulations).&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Proven knowledge and experience in the IT security domain.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Experience in dealing with IaaS and PaaS (information) security risks (preferably on Azure and GCP.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Knowledge of Identity and Access Management processes.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Familiarity with development and engineering processes, way of working and culture.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Ability to translate IT threats and vulnerabilities into business risk and drive mitigation.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If interested, please apply:&amp;nbsp;&lt;A href="https://www.asml.com/en/careers/find-your-job/2/0/1/information-security-risk-manager-req20145" target="_blank" rel="noopener"&gt;https://www.asml.com/en/careers/find-your-job/2/0/1/information-security-risk-manager-req20145&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:50:42 GMT</pubDate>
    <dc:creator>mrduaneh</dc:creator>
    <dc:date>2023-10-09T09:50:42Z</dc:date>
    <item>
      <title>Information Security Risk Manager</title>
      <link>https://community.isc2.org/t5/Cybersecurity-Job-Openings/Information-Security-Risk-Manager/m-p/44421#M63</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Job Opportunity with ASML in Wilton, Connecticut.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;R&amp;amp;D Security Risk Management (RD SRM) operates within the R&amp;amp;D domain, which includes Development &amp;amp; Engineering and System Engineering. The&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Information Security Risk Manager&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;is responsible for keeping information security risks within the R&amp;amp;D risk appetite by identifying and assessing risks, driving risk mitigation and monitoring execution.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;As part of this profile, you will support the RD SRM department as a whole, with responsibility for information security across multiple focus areas, including identity and access management, application security, cloud security, intellectual property protection and projects.&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Job Description&lt;/STRONG&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Perform information security risk management activities across all focus areas. These activities include the execution of generic risk assessments, analysis/evaluation of identified risks and proposed mitigating controls. This may also include:&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Conducting Information Systems Security Assessments (Application Security)&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Completing GRC assessments for new business/IT projects (on-premise and cloud)&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Assessing DevOps environments&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Prepare risk reports, guiding the process on management response and driving the mitigation of agreed controls&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Maintain the R&amp;amp;D security risk register (including product security risks)&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Identify product security exceptions&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Support the product security incident management process&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Alignment with other security competences (IT and Business) within the security community&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Perform generic risk assessments for identified risks and create risk reports&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Ensure compliance to security policies and standards&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Provide and contribute to security awareness trainings for specialized topics, such as secure software development.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;STRONG&gt;Education&lt;/STRONG&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Bachelor degree and relevant education in Information Security.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;In possession of one or more valid industry certifications (CISM, CISA, CISSP, CRISC, CCSP).&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;7+ years of relevant experience in information security risk management.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;STRONG&gt;Experience&lt;/STRONG&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Proven experience with the ISO27001/2 framework; background in ISO31000 is also beneficial.&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Knowledgeable of relevant laws and regulations (GDPR, privacy and US export regulations).&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Proven knowledge and experience in the IT security domain.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Experience in dealing with IaaS and PaaS (information) security risks (preferably on Azure and GCP.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Knowledge of Identity and Access Management processes.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Familiarity with development and engineering processes, way of working and culture.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;FONT size="3"&gt;Ability to translate IT threats and vulnerabilities into business risk and drive mitigation.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If interested, please apply:&amp;nbsp;&lt;A href="https://www.asml.com/en/careers/find-your-job/2/0/1/information-security-risk-manager-req20145" target="_blank" rel="noopener"&gt;https://www.asml.com/en/careers/find-your-job/2/0/1/information-security-risk-manager-req20145&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:50:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cybersecurity-Job-Openings/Information-Security-Risk-Manager/m-p/44421#M63</guid>
      <dc:creator>mrduaneh</dc:creator>
      <dc:date>2023-10-09T09:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: Information Security Risk Manager</title>
      <link>https://community.isc2.org/t5/Cybersecurity-Job-Openings/Information-Security-Risk-Manager/m-p/46788#M80</link>
      <description>Is this job still available?, I am interested, with over 7 years experience in IT Risk, Audit and Security and a holder of CISA, CRISC, CISM and CISSP certs.&lt;BR /&gt;&lt;BR /&gt;bmuzhanje@gmail.com</description>
      <pubDate>Wed, 04 Aug 2021 09:38:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cybersecurity-Job-Openings/Information-Security-Risk-Manager/m-p/46788#M80</guid>
      <dc:creator>bmuzhanje</dc:creator>
      <dc:date>2021-08-04T09:38:02Z</dc:date>
    </item>
  </channel>
</rss>

