Sr. Business Information Security Officer (Sr. BISO) - Consumer Technology
Role details
Job location
Tech stack
Job description
The Sr. Business Information Security Officer (SR. BISO) - Consumer and Wealth Management Technology will be a member of the Business Information Security Officer's (BISO) organization and work closely with the line of business Front Line Units (FLU) / CIO executives. In this role, you will be supporting a group/team to develop a deep understanding of the business in order to have specialized information security risk-based discussions. This relationship will ensure a focus on the right risk priorities. You will also provide guidance on information security topics.
Scale/Scope
- Contribute to the ongoing information security initiatives and improvements development, implementation and maintenance of information security for FLU/Ops
- Serves as an Information Security subject matter expert and participates in the development, implementation and maintenance of information security for FLU/Ops
- Provides guidance and advocacy regarding the prioritization of investments that impact information security
- Advises management on risk issues related to information security and recommends actions in support of the bank's wider risk management and compliance programs
- Monitors information security trends internal and external to the bank and keeps leadership informed
- Manages quality control and reporting
- Ensures compliance with policies and laws, * Architecture
- Business Intelligence
- Risk Management
- Threat Analysis
- Vendor Management
- Advisory
- Business Acumen
- Cloud Solutions
- Controls Management
- Technology System Assessment
Shift:
1st shift (United States of America)
Hours Per Week:
40
Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.
View your "Know your Rights (https://www.eeoc.gov/sites/default/files/2023-06/22-088_EEOC_KnowYourRights6.12.pdf) " poster.
View the LA County Fair Chance Ordinance (https://dcba.lacounty.gov/wp-content/uploads/2024/08/FCOE-Official-Notice-Eng-Final-8.30.2024.pdf) .
Requirements
- Information Security & Technology professional with 10+ years' experience
- 5+ years of risk management experience with proven ability to effectively apply risk principles to challenging business situations
- Subject matter expertise in application security, vulnerability testing and development of risk appetite
- Experience evaluating cyber security controls and providing guidance for platform or distributed computing platforms (Cloud, PaaS)
- Experience with information security for No SQL, Big Data , and unstructured data stores (Cassandra, Hadoop, and /or Teradata)
- Knowledge in Windows, Midrange and Mainframe Platforms with emphasis on security and access controls
- Exceptional executive presentation and communication skills
- Excellent influencing and problem resolution skills
- Ability to be comfortable delivering messages across a wide spectrum of individuals having varying degrees of technical understanding
- Strong leadership skills and qualities which enable you to work with peers and various levels of management
Desired Skills
- Bachelor's and/or Master's degree in Computer Science, Information Technology or related field
Risk Management
- Drives GIS/FLU/Ops risk deliverables
- Collaborates with risk partners on info security critical priorities
- Participates in senior FLU/Ops specific Risk Management & Business Continuity Routines
- Identifies and measures global information security (GIS) controls on most critical business processes or channels, * Customer and Client Focus
- Cyber Security
- Data Governance
- Executive Presence