Highly accomplished TPRM Manager with 10+ years, evaluating vendor risks, internal application, and system risk, and ensuring compliance to Federal, State and Regulatory policies and standards. Highly effective and organized Project Manager and Lead Coordinator of Information Security Vendor Risk Program and Security and Control Assessment program for a Financial Institution and Insurance company in the Southeast.
Lead Security Consultant and Information Security Project Coordinator responsible for the assessment of Vendor Information Security risk, and negotiation of risk mitigation. Information Security Team Resource Manager responsible for assignment of projects and risk assessments, tracking work progress and reporting results to Management. Facilitate and coordinate Internal and External Audits as required by the business and participate in Corporate Governance Meetings.
Key Accomplishments are:
● Risk assessments for technology and applications based on SOX, SAS70 (now known as SSAE16 SOC 1&2) and ISO standards. The threats and vulnerabilities noted by these standards and guidelines were set forth in the RBC assessment procedures to identify gaps and deficiencies in systems and application solution. Remediation of those area lacking to comply with these standards was actioned according to the overall risks to the product or company data.
● Facilitate and maintain relationships between RBC Bank and vendors/partners, negotiating contracts, creating standards for the vendors.
● Ensures compliance with regulations and controls by examining and analyzing records, reports, operating practices, and documentation; recommending opportunities to strengthen the internal control structure.
● Conducts regulatory, policy and compliance audits for management to assess effectiveness of compliance procedures and controls, accuracy, and timeliness of documentation.
● Prepare and maintain audit work papers and audit reports; prepare recommendations for improvement and communicate compliance audit findings and recommendations to department/ functional management for management development of a corrective action plan.
● Audit remediation action taken on non-conformities and issues brought up during previous audits.
● Conduct Vendor Assessments for existing and new vendors.
● Assist with both internal and client requested audits.
● Identifying possible security threats and determining the best security measures.
● Implementing, and maintaining security protocols, policies, plans, and systems to cover all possible security threats.
● Completing risk assessment and security tests and designing countermeasures to eliminate as many potential risks as possible.
● The assessment process required technical knowledge to adequately lead project teams to complete and accurate results.
● Worked extensively performing technical risk assessments for technology providers, system implementation and software development. the primary tool used to complete assessments internally was a Security Control Document (SCD)
● Perform the identification of assets, asset vulnerabilities, their associated risks, and any risk mitigating controls in place.
● Conduct investigative activities research & discover risks and the associated IS assets.
Project Manager who successfully managed Technology projects from Idea Creation to deployment in production. Initiated projects, defined scope, accurately developed estimates, negotiated for resources, established schedules and commitments and persistently managed scope, budget, time, quality and hitting the targets. Maintained communications with all levels of management regarding project success and risks and ensured Corporate Project Management Framework was enforce throughout the life of each project.
Key Accomplishments are:
● Maintained organization's effectiveness and efficiency by defining, delivering, and supporting strategic plans for implementing information technologies. Directs technological research by studying organization goals, strategies, practices, and user projects.
● Completed projects by coordinating resources and timetables with user departments and data center.
● Led change management efforts including stakeholder engagement, impact analysis, and business readiness. Both the communication and change management efforts supported ongoing business needs, as well as a large transformation program of technology applications.
● Verified application results by conducting system audits of technologies implemented.
● Preserved assets by implementing disaster recovery and back-up procedures and information security and control structures.
● Recommend information technology strategies, policies, and procedures by evaluating organization outcomes; identifying problems; evaluating trends; anticipating requirements.
● Accomplished financial objectives by forecasting requirements; preparing an annual budget; scheduling expenditures; analyzing variances; initiating corrective action.
● Maintained quality service by establishing and enforcing organization standards.
● Maintained professional and technical knowledge by attending educational workshops; reviewing professional publications; establishing personal networks; participating in professional societies.
● Contribute to team effort by accomplishing related results as needed.