• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Jobs » Control Officer – Information & Cyber Security

Control Officer – Information & Cyber Security

2021-05-24 by Geo

Weehawken New Jersey

Control Officer – Information & Cyber Security – Wells Fargo Summit, NJ

Note: We may earn a commission from products or services when you click on a link and make a purchase.

Important Note: During the application process, ensure your contact information (email and phone number) is up to date and upload your current resume when submitting your application for consideration. To participate in some selection activities you will need to respond to an invitation. The invitation can be sent by both email and text message. In order to receive text message invitations, your profile must include a mobile phone number designated as ‘Personal Cell’ or ‘Cellular’ in the contact information of your application.

At Wells Fargo, we are looking for talented people who will put our customers at the center of everything we do. We are seeking candidates who embrace diversity, equity and inclusion in a workplace where everyone feels valued and inspired.

Help us build a better Wells Fargo. It all begins with outstanding talent. It all begins with you.

Technology sets IT strategy; enhances the design, development, and operations of our systems; optimizes the Wells Fargo infrastructure; provides information security; and enables Wells Fargo global customers to have 24 hours a day, 7 days a week banking access through in-branch, online, ATMs, and other channels.

Our mission is to deliver stable, secure, scalable, and innovative services at speeds that delight and satisfy our customers and unleash the skills potential of our employees.

This is an exciting opportunity for a Business Risk & Control Officer in our Divisional Control Team (DCT) Technology Controls team supporting Information and Cyber Security (ICS). This individual will provide leadership and strategic guidance for the implementation and effective execution of tasks to identify, assess, and mitigate risks within DCT and ICS. The successful candidate will be a highly motivated team player that has expertise in risk and program management, is a self-starter who is accustomed to working in complex organizations with a diverse group of stakeholders, and someone who is able to withstand challenges and adapt accordingly.

READ Get More Than 300 Hours of Cyber Security Training for Under $700

Responsibilities Include

  • Provide strategic thought leadership and be the trusted advisor to the Control Executive, Risk leadership and the ICS teams.
  • Provide operational risk and regulatory compliance expertise and consult on projects/programs and initiatives with moderate/high risk, which may include providing systems security consulting on complex issues.
  • Provide credible challenge and recommendations to technology and business teams on appropriate risk management.
  • Drive risk strategy across the supported ICS LOB; and establish, administer, and execute long-term goals for controlling risk in accordance with risk program requirements.
  • Implementation of the front line risk management program requirements and related business procedures, processes, and systems of internal controls to ensure adequacy and effectiveness across ICS functions.
  • Evaluate key risk and performance indicators to identify emerging trends within the business and across risk domains.
  • Interact with senior leaders, control function leaders, independent risk management and external audit to foster transparency and appropriate awareness of risk control activities.
  • Establish and maintain communication protocols to foster information sharing and collaboration
  • Promote a strong risk culture, cultivate relationships and foster a team orientation with ICS business partners, independent risk management, and internal audit
  • May provide guidance to less experienced operational risk consultants.

Learn Cyber Security Skills Online at Your Own Pace

  • Google Cloud Security
  • Google Cloud Networking
  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Linux Security
  • Cyber Security 10 Domains
  • IBM Fundamentals
  • AWS Cloud Native

Required Qualifications

7+ years of experience in risk management or 7+ years of financial services industry experience, of which 5+ years must include direct experience in risk management

Desired Qualifications

  • Ability to evaluate risks and the impact of decisions on an overall organization
  • Ability to influence and build relationships with LOB stakeholders, technology CIO leadership, external service providers, and architecture teams
  • Experience reviewing testing strategies and methodologies; evaluating the adequacy and effectiveness of policies, procedures, processes, initiatives, products and internal controls; and identifying issues resulting from internal and/or external compliance examinations
  • Ability to interact with all levels of an organization
  • Ability to work effectively, as well as independently, in a team environment
  • Excellent verbal, written, and interpersonal communication skills
  • Strong time management skills and ability to meet deadlines
  • Experience resolving and working through escalated and complex issues
  • Experience working with internal and external auditors and examiners
  • Ability to articulate complex concepts in a clear manner
  • 1+ year of financial services industry experience
  • Advanced Microsoft Office (Word, Excel, and Outlook) skills
  • Experience with information security and risk management including: policy and standards, information security assessment, and mitigation solution design and implementation
  • A BS/BA degree or higher
  • Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified in Risk and Information Systems Control (CRISC)

Amazon Web Services Training On Demand

Amazon Web Services Logo
  • AWS Fundamentals: Going Cloud-Native
  • AWS Fundamentals Specialization

Other Desired Qualifications

  • Minimum of 3 years’ experience in IT, Information Cyber Security or IT consulting involving large projects.
  • ICS LOB experience
  • Knowledge of Wells Fargo risk management practices over multiple lines of business and/or the independent risk management
  • Knowledge and understanding of eGRC tools, such as Archer, that enable reporting and issue management

Job Expectations

Ability to travel up to 10% of the time

Disclaimer

All offers for employment with Wells Fargo are contingent upon the candidate having successfully completed a criminal background check. Wells Fargo will consider qualified candidates with criminal histories in a manner consistent with the requirements of applicable local, state and Federal law, including Section 19 of the Federal Deposit Insurance Act.

Relevant military experience is considered for veterans and transitioning service men and women.

Wells Fargo is an Affirmative Action and Equal Opportunity Employer, Minority/Female/Disabled/Veteran/Gender Identity/Sexual Orientation.

Benefits

Reference Number

5578336-4

LinkedIn Apply
Apply on LinkedIn

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version