Menu

Sr. Manager - Information Security - Vendor Risk Management

at Marriott in Springfield, Illinois, United States

Job Description

Job Number 24103216

Job Category Information Technology

Location Marriott International HQ, 7750 Wisconsin Avenue, Bethesda, Maryland, United States

Schedule Full-Time

Located Remotely? Y

Relocation? N

Position Type Management

JOB SUMMARY

The candidate will be responsible for completing and maintaining 3rd Party Hosting Service Provider reviews, including creating risk assessments, and security test and evaluations. The candidate will also be responsible for supporting the overall security program including security policy, procedures, and standards, assessing the risk of the internal and external IT systems, ensuring Marriott iT documents are compliant with Marriott security policies and procedures, and reviewing documents for accuracy and completeness.

Conduct periodic re-assessment with focus on those with highly sensitive data. Perform application security vulnerability scanning and provide remediation options. Candidate will also assist in managing relationship with Service Providers who are responsible for the actual delivery of services, managing outcomes and results, and collaborating with stakeholders across IT and business departments to develop strategies for securing company information and assets. Shares responsibility for planning, directing, and coordinating compliance activities pertaining to technology projects for a given business unit. Verifies that project goals are accomplished and in line with business objectives.

Excellent communication skills are required to effectively communicate (verbally and written) across all levels within the organization.

CANDIDATE PROFILE

Education and Experience

Required:

+ Bachelor’s degree in Information Systems or related field or equivalent experience/certification

+ 7+ years of information technology leadership experience including implementing, managing and governing security policies

+ 3+ years direct work experience in third-party Risk Management

+ One or more current information security certifications such as Certified in Risk and Information Systems Controls (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or Certified Information Systems Security Professional (CISSP)

Preferred:

+ A security certification such as GWAPT, GPEN, AWS Associate Architect, AWS Professional Architect, PCI experience.

+ Technical knowledge in one or more of the following areas is required: Application Security, Operating System security (UNIX, Windows, Mainframe, etc.) and network security (routers, switches, firewalls)

+ Technical leadership experience in an outsourced environment

+ Excellent communication skills and problem-solving ability

+ Experience conducting and maintaining vendor risk assessments

+ Experience with reviewing and assessing security controls of Cloud service providers

+ Proficient with assessing a multi-tiered system architecture (Web Server, App Server & Database)

+ Knowledge of OWASP Top 10 and SANS 25.

+ Working knowledge of the infrastructure and application scanning tools (such as Retina, Nessus, IBM App Scan, HP Web Inspect, Fortified on Demand, Qualys, etc.)

+ Manual Web Application Testing experience.

CORE WORK ACTIVITIES

Security Risk & Compliance

+ Oversee, evaluate, and support the documentation, and validation processes necessary to assure that associates, information technology systems and business processes meet the organization’s information assurance, security, and privacy requirements. Ensures appropriate treatment of risk, compliance, and assurance of internal policies and external regulations.

+ Perform security controls assessments of third-party providers – assess security architecture, adherence to the requirements, conduct application scanning and results validation

+ Document controls gap analysis and risk assessment of the third-party providers

+ Review controls exception requests and make risk-based approval decision

+ Lead, participate or perform various infrastructure compliance initiatives and projects

+ Perform Application Security Testing using (Nessus, IBM App Scan, HP Web Inspect, Fortified on Demand, Qualys, Burp, or Retina)

+ Conduct and validate finding discovered during the scans

+ Monitor compliance to applicable security policies and standards and report related risk issues

+ Manage and administer processes and tools that enable the organization to identify, document, and track third party risks and compliance exceptions

+ Conduct assessments of threats and vulnerabilities, determine deviations from acceptable configurations or enterprise or local policy, assess the level of risk, and develop and/or recommend and operationalize appropriate mitigation countermeasures.

+ Provide sound advice and recommendations to leadership and staff on a variety of relevant topics within the pertinent subject domain. Advocate policy changes and make a case on behalf of the company via a wide range of written and oral work products.

+ Oversee the information assurance (IA) program of an information system in or outside the network environment; may include procurement duties.

Maintaining Goals

+ Submits reports in a timely manner, ensuring delivery deadlines are met.

+ Promotes the documenting of project progress accurately.

+ Provides input and assistance to other teams regarding projects.

Managing Work, Projects, and Policies

+ Manages and implements work and projects as assigned.

+ Generates and provides accurate and timely results in the form of reports, presentations, etc.

+ Analyzes information and evaluates results to choose the best solution and solve problems.

+ Provides timely, accurate, and detailed status reports as requested.

Demonstrating and Applying Discipline Knowledge

+ Provides technical expertise and support to persons inside and outside of the department.

+ Demonstrates knowledge of job-relevant issues, products, systems, and processes.

+ Demonstrates knowledge of function-specific procedures.

+ Keeps up-to-date technically and applies new knowledge to job.

+ Uses computers and computer systems (including hardware and software) to enter data and/ or process information.

Delivering on the Needs of Key Stakeholders

+ Understands and meets the needs of key stakeholders.

+ Develops specific goals and plans to prioritize, organize, and accomplish work.

+ Determines priorities, schedules, plans and necessary resources to ensure completion of any projects on schedule.

+ Collaborates with internal partners and stakeholders to support business/initiative strategies

+ Communicates concepts in a clear and persuasive manner that is easy to understand.

+ Generates and provides accurate and timely results in the form of reports, presentations, etc.

+ Demonstrates an understanding of business priorities

Additional Responsibilities

+ Provides information to supervisors and co-workers by telephone, in written form, e-mail, or in person in a timely manner.

+ Demonstrates self-confidence, energy and enthusiasm.

+ Informs and/or updates leaders on relevant information in a timely manner.

+ Manages time effectively and conducts activities in an organized manner.

+ Presents ideas, expectations and information in a concise, organized manner.

+ Uses problem solving methodology for decision making and follow up.

+ Performs other reasonable duties as assigned by manager.

California Applicants Only: The salary range for this position is $96,038 to $ 209,169 annually.

Colorado Applicants Only: The salary range for this position is $96,038 to $190,154 annually.

Hawaii Applicants Only: The salary range for this position is $116,205 to $209,169 annually.

New York Applicants Only: The salary range for this position is

To view full details and how to apply, please login or create a Job Seeker account
How to Apply Copy Link

Job Posting: JC261447746

Posted On: Jun 18, 2024

Updated On: Aug 23, 2024

Please Wait ...