Conduent Senior Security Architect in Austin, Texas
Senior Security Architect
Conduent is the world's largest provider of diversified business process services with leading capabilities in transaction processing, automation, analytics and constituent experience. We work with both government and commercial customers in assisting them to deliver quality services to the people they serve.
We manage interactions with patients and the insured for a significant portion of the U.S. healthcare industry. We are the customer interface for large segments of the technology industry and the operational and processing partner of choice for public transportation systems around the world.
Whether it's digital payments, claims processing, benefit administration, automated tolling, customer care or distributed learning - Conduent manages and modernizes these interactions to create value for both our clients and their constituents. Learn more at www.conduent.com .
Responsible for planning and implementing risk management strategies, processes and programs. Manages resolution of incidents / problems throughout the information system lifecycle, including classification, prioritization and initiation of action, documentation of root causes and implementation of remedies. Development and execution of information risk controls and management strategies. Procures and governs information risk management services and consultants.
The planning and implementation of organization-wide policies, processes and procedures for the management of operational risk.
The resolution of incidents and problems throughout the information system lifecycle, including classification, prioritization and initiation of action, documentation of root causes and implementation of remedies.
Provide expert advice on information risk controls and management strategies to maintain the confidentiality, integrity, availability, accountability and relevant compliance of information systems. Conduct and evaluate risk management assessments and recommendation on remediation actions and business impact.
This role will specialize on a specific technology and/or risk management discipline. Examples of specialization areas can be any technology, technique, method, product or application area as they pertain to the disciplines of information security, privacy, disaster recovery, and regulatory compliance.
Has defined authority and responsibility for a significant area of work, including technical, financial and quality aspects.
Establishes organizational objectives and delegates assignments.
Accountable for actions and decisions taken by self and subordinates.
Influences policy formation on contribution of specialization to business objectives.
Influences at level of division internally and influences customer/suppliers and industry at senior management level.
Decisions impact work of employing organizations, achievement of organizational objectives and financial performance.
Develops high-level relationships with customers, suppliers and industry leaders.
Highly complex work activities covering technical, financial and quality aspects and contributing to formulation of IS strategy.
Work involves creative application of wide range of technical and/or management principles.
Recognized as an expert in own function
Interprets internal or external business issues and recommends solutions/best practices
Decisions are guided by resource availability and functional objectives
Primarily domestic scope/accountability; may include some international scope/accountability
Progression to this level is typically restricted on the basis of business requirement
Plans and manages the implementation of organization-wide processes and procedures, tools and techniques for the identification, assessment and management of risk inherent in the operation of business processes and of potential risks arising from planned IT-enabled change.
Protects and defends information and information systems by ensuring availability, integrity, authentication, confidentiality and non-repudiation. Provides consulting for restoration of information systems by ensuring that protection, detection and reaction capabilities are incorporated.
Ensures that appropriate action is taken to investigate and resolve incidents and problems in systems and services. Ensures that such incidents and problems are fully documented within the relevant reporting systems. Coordinates the implementation of agreed remedies and preventative measures.
Conducts risk assessments for business applications and computer installations; provides authoritative advice and guidance on security strategies to manage the identified risk. Investigates breaches of IT service disruptions and recommends appropriate control improvements. Interprets information risk policy and contributes to development of standards and guidelines.
Maintains an in-depth knowledge of specific technical specialisms and provides expert advice regarding their application. Can supervise technical specialists.
Specific Tasks include:
Business Risk Management
Advises on risk management policies, and contributes to the creation and publication of strategies for managing risk to the continuing effective operation of the business.
Plans and manages the implementation of organization-wide processes and procedures, tools and techniques, within a specific information risk area, for the identification, assessment, and management of risk inherent in the operation of business processes and of potential risks arising from planned IT-enabled change.
Identifies and categorizes strategic and operational risks.
Advises on the evaluation of identified risks (including probability/frequency of occurrence, impact, and severity).
Advises on appropriate action, including contingency planning, and countermeasures
Awareness of legal and best practices relating to availability, integrity, confidentiality, privacy, etc.
Recommends appropriate and practical performance measures and tracks compliance.
In the context of Business Continuity, assesses protection, detection, and reaction capabilities, to determine whether they are sufficient to support restoration of information systems in a secure manner.
Conducts assessments of threats to confidentiality, integrity, availability, accountability and relevant compliance. Participates in security control reviews, business risk assessments, and reviews that follow significant breaches of security controls or IT service disruptions.
Contributes to the development and promotion of the technical specialize. Recommends quality standards and policies relating to the technical specialize.
Maintains knowledge of the technical specialism at the detailed and comprehensive level.
Keeps in close touch with and contributes to current developments in the technical specialism within Conduent.
Conduent is an Equal Opportunity Employer and considers applicants for all positions without regard to race, color, creed, religion, ancestry, national origin, age, gender identity, sex, marital status, sexual orientation, physical or mental disability, use of a guide dog or service animal, military/veteran status, citizenship status, basis of genetic information, or any other group protected by law. People with disabilities who need a reasonable accommodation to apply or compete for employment with Conduent Business Services or one of its subsidiaries may request such accommodation(s) by sending an e-mail to accommodations@Conduent.com . Be sure to include your name, the job you are interested in, and the accommodation you are seeking. Conduent is an Equal Opportunity Employer and considers applicants for all positions without regard to race, color, creed, religion, ancestry, national origin, age, gender identity, gender expression, sex/gender, marital status, sexual orientation, physical or mental disability, medical condition, use of a guide dog or service animal, military/veteran status, citizenship status, basis of genetic information, or any other group protected by law. People with disabilities who need a reasonable accommodation to apply for or compete for employment with Conduent may request such accommodation(s) by clicking on the following link, completing the accommodation request form, and submitting the request by using the -Submit- button at the bottom of the form. For those using Google Chrome or Mozilla Firefox please download the form first: click here to access or download the form at https://downloads.conduent.com/content/usa/en/file/conduent-applicant-adaaa-referral-form.pdf .
Job IM Security
Primary Location United States
Other Locations United States-New Jersey-Secaucus, United States-North Carolina-Morrisville, United States-TX-Austin
Unposting Date Ongoing
Req ID: 18026192