Information Security Risk Manager (Risk Advisor)
Job Type: Full‑Time/Contract – 2 years (renewable)
Location: Trinidad and Tobago / Fully Remote
Role Summary:
Provide Information Security & Technology Risk Management consulting services to project teams based on risk‑management processes and procedures. Participate in project meetings, security reviews, walkthroughs, and risk assessments.
Key Responsibilities
- Review and interpret requirements documentation, architecture diagrams, and solution designs to determine project feasibility and security risk; recommend enhancements to the information security landscape.
- Assess applications, infrastructure, business units, business processes, and external suppliers for information security risks, identifying potential threats and exposures.
- Examine and interpret requirements documents, architecture diagrams, solution designs, and other written and verbal information to determine if a project, application, infrastructure or external supplier presents security risk to the bank.
- Work with third‑party teams and internal development groups to interpret and review results from penetration tests on internet‑facing applications as needed.
- Ensure that code scans are completed for all new or modified code deployments.
- Track to completion any issues raised during risk‑management reviews (TRA / ISA / PEN test / CIRA, Code scans/PIRT). Log identified issues as deficiencies when mitigation cannot be achieved prior to project implementation and the risk is within the bank’s risk appetite.
- Collaborate with relevant teams as required.
- Provide information‑security risk consulting services to projects to embed policies, standards, and processes in designed and delivered solutions.
- Support senior management with any other related requests.
- Develop a risk‑based schedule for business‑as‑usual baseline risk assessments in consultation with the senior manager; collaborate with technology and business owners to mitigate significant issues identified.
- Review all contract and third‑party arrangements to ensure adherence to information‑security policies and adequate protection of information assets, as requested by the senior manager.