[Close] 

Risk Information Technology Analyst

Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career --- a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice.
Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored for a set period of time. You may review, modify, or update your information by visiting and logging into the careers section of the system.
Job Description:
At Regions, the Risk Information Technology (IT) Analyst is a key member of the Innovation and IT Risk Management (IITRM) organization and perform activities consistent with the second line of defense. The Risk IT Analyst will influence enterprise innovation and manage IT risk identification, measurement, mitigation, monitoring, and reporting (IMMMR) activities in accordance with the enterprise strategy and enterprise risk appetite. This position is responsible for recurring or operational work, focused on administering generally defined procedures and processes.
Primary Responsibilities
Manages key tasks and/or projects to perform IT Risk Assessments, IT Advisory Reviews, IT Project Assessments, 3rd Party IT Testing, and other project reviews as identified across all aspects of Information Technology, including application development, cyber security, enterprise architecture, business continuity and disaster recovery, and change management
Stays abreast of innovative business and technology trends in IT security, risk, and controls and advise leadership on technology initiatives that support these trends
Manages relationships with key stakeholders within strategic business groups and technology to ensure effective execution of the risk management framework
Performs deep dives on IT security-related processes and systems
Identifies applicable regulatory risks from changes or releases to regulatory guidance and requirements and provide subject matter expertise for resolution and risk mitigation
Manages targeted reviews of internal risk and control assessments on current and/or emerging IT risks
Develops, tracks, and reports on Key Risk Indicators (KRIs) for Information Technology
Monitors, tracks, and reports mitigation and resolution of IT risk issues
Develops and manages reporting to effectively communicate key risks, findings, and recommendations for improvement and discuss results with key stakeholders
This position is exempt from timekeeping requirements under the Fair Labor Standards act and is not eligible for overtime pay.
Requirements
Bachelor's degree
Five (5) years of experience in Information Technology, System Development, and Information Security including key existing and emerging risks
Skills and Competencies
Solid understanding of risk management functions, including IT Audit, Cyber Security, and/or IT compliance
Experience or knowledge of 3rd party/vendor management lifecycle
Experience in a Financial Institution and/ or Public Accounting is preferred but not required
Excellent oral and written communication skills and the ability to work effectively with employees at all levels of the organization
Receptive to guidance from manager and able to effectively communicate results to manager
Excellent leadership skills, organizational skills, and the ability to work independently is essential
Proficiency with Microsoft Excel, Word, and PowerPoint
Preferences
CISA
CRISC
CISSP
Location:Hoover, Alabama
EEO/AA/Minorities/Females/Disabled/Veterans



Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Risk Information Technology Analyst
Birmingham, AL Regions Bank
Telecommute Business Technology Analyst 4
Birmingham, AL U.S. Bank (U.S. Bancorp)
Risk Cybersecurity Vulnerability Analyst
Birmingham, AL Regions Bank
Virtual Information Technology Architect
Birmingham, AL AccruePartners
Telecommute Senior Content Applications Inform...
Birmingham, AL Daily Kos