Manager, Risk and Governance

United States, Remote

Ivanti

Ivanti finds, heals and protects every device, everywhere – automatically – so employees can work better from anywhere.

View all jobs at Ivanti

Apply now Apply later

Who We Are:  

In today’s work environment, employees use a myriad of devices to access IT applications and data over multiple networks to stay productive, wherever and however they work. Ivanti elevates and secures Everywhere Work so that people and organizations can thrive.   

While our headquarters is in the U.S., half of our employees and customers are outside the country. We have 36 offices in 23 nations, with significant offices in London, Frankfurt, Paris, Sydney, Shanghai, Singapore, and other major cities around the world.  

Ivanti’s mission is to be a global technology leader enabling organizations to elevate Everywhere Work, automating tasks that discover, manage, secure, and service all their IT assets. Through diverse and inclusive hiring, decision-making, and commitment to our employees and partners, we will continue to build and deliver world-class solutions for our customers.   

Our Culture - Everywhere Work Centered Around You  

At Ivanti, our success begins with our people. This is why we embrace Everywhere Work across the globe, where Ivantians and our customers are thriving. We believe in a healthy work-life blend and act on it by fostering a culture where all perspectives are heard, respected, and valued. Through Ivanti’s Centered Around You approach, our employees benefit from programs focused on their professional development and career growth.   

We align through our core values by locking arms in collaboration, being champions for our customers, focusing on the outcomes that matter most and fighting the good fight against cyber-attacks.  Are you ready to join us on the journey to elevate Everywhere Work?   

Why We Need you!  

As part of Ivanti’s Governance, Risk & Compliance (GRC) team, you will lead a team of skilled individuals in the management and execution of Ivanti’s Governance Program and Enterprise Risk Management Program. 

Critical priorities include management of the foundational pillars of Information Security, such as: 

  • Ensuring compliance of Ivanti’s Policies, Procedures, and Standards 

  • Developing enterprise-wide and role-based security training 

  • Performance of risk and business impact assessments, and 

  • Management of security risks through vendor management 

You will also use your skills and experiences in oversight of a team of skilled risk analysts and technical writers in a dynamic, project-based environment. Risk management in Information Security is a continuous process due to the global environment and capabilities of threat actors. The ideal candidate will have a growth mindset and knowledge of GRC. 

 

The primary focus of this position in Information Security is to mature and oversee Ivanti’s Governance and Risk Management programs and ensure regulatory, contractual, and legal compliance. 

By leveraging your knowledge and expertise on foundational principles of cyber security, you will direct a team of cybersecurity professionals to secure and protect Ivanti against cybersecurity threats in an ever shifting and emerging threat landscape, identify and implement improvements to Ivanti’s Governance and Risk Management programs, and be a champion of risk management as you act as a trusted advisor to executive leadership. 

Your performance in this role with be rated on your ability to provide recommendations and solutions to unique challenges, identify and articulate areas of improvement or risk, and achieve organizational goals and objectives through execution and successful completion of Information Security projects and initiatives. 

You will leverage Ivanti’s best-in-class technology solutions and cutting-edge industry tools to build vendor and enterprise risk management processes that proactively combat threats. In addition to engineering ad-hoc solutions, you will align with NIST, ISO, and other frameworks to develop solutions that will protect Ivanti and support initiatives for certification and compliance across frameworks and regulation in collaboration with Ivanti’s Privacy, Product Security, and Engineering teams. 

To Be Successful in The Role, You Should Have the Following: 

  • Skill in applying confidentiality, integrity, and availability principles 

  • Skill in creating policies that reflect system security objectives 

  • Skill in designing security controls based on cybersecurity principles and tenets 

  • Skill in utilizing or developing learning activities 

  • Skill in assessing security controls based on cybersecurity principles and tenets (eg, CIS CSC, NIST SP 800-53, Cybersecurity Framework, etc) 

  • Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures 

  • Skill in complying with the legal restrictions for targeted information 

  • Skill in conducting research using all available sources 

  • Skill in developing and executing comprehensive cyber operations assessment programs for assessing and validating operational performance characteristics 

  • Skill in preparing and presenting briefings 

  • Skill in researching essential information 

  • Skill in reviewing and editing plans 

  • Skill in reviewing and editing target materials 

  • Skill in writing about facts and ideas in a clear, convincing, and organized manner 

  • Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources 

  • Skill to use critical thinking to analyze organizational patterns and relationships 

  • Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) 

  • Skill to use risk scoring to inform performance-based and cost-effective approaches to help organizations to identify, assess, and manage cybersecurity risk 

  • Skill in developing information requirements 

  • Perform additional job duties as required 

You Can Leverage Your Expertise to: 

  • Apply supply chain risk management standards 

  • Communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means 

  • Design valid and reliable assessments 

  • Develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities 

  • Develop, update, and/or maintain standard operating procedures (SOPs) 

  • Leverage best practices and lessons learned of external organizations and academic institutions dealing with cyber issues 

  • Develop career path opportunities 

  • Monitor and assess the potential impact of emerging technologies on laws, regulations, and/or policies 

  • Adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment 

  • Coordinate cyber operations with other organization functions or support activities 

  • Coordinate, collaborate and disseminate information to subordinate, lateral and higher-level organizations 

  • Develop or recommend planning solutions to problems and situations for which no precedent exists 

  • Function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise 

  • Interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives and understand complex and rapidly evolving concepts 

  • Relate strategy, business, and technology in the context of organizational dynamics 

  • Understand technology, management, and leadership issues related to organization processes and problem solving 

  • Share meaningful insights about the context of an organization’s threat environment that improve its risk management posture 

  • Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) 

  • Ensure information security management processes are integrated with strategic and operational planning processes 

  • Ensure the organization has adequately trained personnel to assist in complying with security requirements in legislation, Executive Orders, policies, directives, instructions, standards, and guidelines 

  • Coordinate with senior leadership of an organization to provide a comprehensive, organization-wide, holistic approach for addressing risk—an approach that provides a greater understanding of the integrated operations of the organization 

  • Coordinate with senior leadership of an organization to develop a risk management strategy for the organization providing a strategic view of security-related risks for the organization 

  • Coordinate with senior leadership of an organization to provide oversight for all risk management-related activities across the organization to help ensure consistent and effective risk acceptance decisions 

  • Approve security plans, memorandums of agreement or understanding, plans of action and milestones, and determine whether significant changes in the systems or environments of operation require reauthorization 

  • Advise authorizing officials, in close coordination with system security officers, chief information officers, senior information security officers, and the senior accountable official for risk management/risk executive (function), on a range of security-related issues (e.g. establishing system boundaries; assessing the severity of weaknesses and deficiencies in the system; plans of action and milestones; risk mitigation approaches; security alerts; and potential adverse effects of identified vulnerabilities) 

You Should be Knowledgeable In: 

  • Risk management processes (eg, methods for assessing and mitigating risk) 

  • Laws, regulations, policies, and ethics as they relate to cybersecurity and privacy 

  • Cybersecurity and privacy principles 

  • Cyber threats and vulnerabilities 

  • Business continuity and disaster recovery continuity of operations plans, and resiliency and redundancy 

  • Cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data 

  • Incident response and handling methodologies 

  • Industry-standard and organizationally accepted analysis principles and methods 

  • Cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) 

  • Risk Management Framework (RMF) requirements 

  • Information technology (IT) security principles and methods (eg, firewalls, demilitarized zones, encryption) 

  • Policy-based and risk adaptive access controls 

  • Key concepts in security management (eg, Release Management, Patch Management) 

  • Capabilities and functionality of various collaborative technologies (eg, groupware, SharePoint) 

  • Organization’s enterprise information technology (IT) goals and objectives 

  • Emerging security issues, risks, and vulnerabilities 

  • Organization's risk tolerance and/or risk management approach 

  • Supply chain risk management standards, processes, and practices 

  • Cyber defense and information security policies, procedures, and regulations 

  • Organizational information technology (IT) user security policies (eg, account creation, password rules, access control) 

  • Information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures 

  • Data classification standards and methodologies based on sensitivity and other risk factors 

  • Organizational training and education policies, processes, and procedures 

  • Acquisition/procurement life cycle process 

  • Industry standard security models 

  • Countermeasures for identified security risks 

  • An organization’s threat environment 

  • Organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations 

  • Risk management and mitigation strategies 

  • Staff management, assignment, and allocation processes 

  • Basics of network security (eg, encryption, firewalls, authentication, honey pots, perimeter protection) 

  • Continuous monitoring, its processes, and Continuous Diagnostics and Mitigation (CDM) program activities 

Other Qualifications: 

  • Experience with communicating effectively and efficiently across diverse teams, through verbal and written exchanges 

  • Project management experience, leading and organizing a team to complete a project within a specific time frame and budget 

  • Confident in delegating tasks and consistent in tracking and monitoring progress 

  • Applicable security or risk certification (CISA, CISSP, CRM, ARM) preferred 

  • Previous professional InfoSec/cybersecurity experience in governance, risk, compliance, or audit, or similar field 

 

 

At Ivanti, we are committed to providing an environment of mutual respect where equal employment opportunities are available to all applicants and teammates without regard to race, color, religion, sex, pregnancy (including childbirth, lactation and related medical conditions), national origin, age, physical and mental disability, marital status, sexual orientation, gender identity, gender expression, genetic information (including characteristics and testing), military and veteran status, and any other characteristic protected by applicable law. Ivanti believes that diversity and inclusion among our teammates is critical to our success as a global company, and we seek to recruit, develop and retain the most talented people from a diverse candidate pool.   

If you require special assistance for the best interview experience, please contact us at recruiting@ivanti.com.  

  

#LI-PD1      

#LI-Remote  

PWDNET   

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  6  2  0

Tags: CISA CISSP Compliance Cyber defense Encryption Firewalls Governance Incident response Monitoring Network security NIST NIST 800-53 Privacy Product security Risk management RMF SharePoint Strategy Vendor management Vulnerabilities

Perks/benefits: Career development Health care

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.