IT Identity & Access Governance
February 2016 — Present
Mentor and train new team members.
Compare technologies and make recommendations.
Provide advanced level functional security requirements that align with technical architecture and application design.
Identify research, analyze, and document complex security vulnerabilities in detail, including mitigating controls (processes and procedures).
Provide advanced level guidance and recommendations based on applicable regulatory requirements.
Identify and clearly explain complex security vulnerabilities in detail, including mitigating controls to address them.
Assist with development of information security policies, standards, and procedures which includes comparing technologies and making recommendations.
Represent IT and work with the business to define enterprise, business and application roles for Role Based Access Control (RBAC).
Perform complex security risk assessments based on potential data, business, and technology risks.
Regularly review applicable financial industry requirements and laws (FDIC, FFIEC, FINRA, SEC, GLBA).
Research, analyze, and document processes and procedures pertaining to security controls.