Vendor Risk Analyst Resume
4.00/5 (Submit Your Rating)
SUMMARY:
- 6 years of experience in internal controls, IT risk management, IT general control testing and
- Third - Party Risk Management (TPRM). Great understanding of SOC 2 report, SIG, ISO 27001
- Nist, COBIT and COSO framework required by SEC for SOX Compliance
TECHNICAL SKILLS:
- Microsoft Word, Excel, SOC1, SOC2, ISO 27001
- Access, PowerPoint, Security, Risk management
- Active directory IT Operations
- (Logging and monitoring and Back-up Recovery)
- NIST Framework and FISMA Requirements
- Review and Recommendation.
PROFESSIONAL EXPERIENCE:
Vendor Risk Analyst
Confidential
Responsibilities:
- Managed teh third-party assessment process by reviewing vendor assessment questionnaires including Soc 2 reports, SIG, and ISO 27001.
- Created draft reports for management and client review.
- Performed third party vendor risk assessments, identified control gaps, and recommend remediation initiatives.
- Conducted onsite/virtual assessments of high-Risk vendors.
- Partnered wif third-party executives and staff members to suggest mitigation solutions for risk areas.
- Analyzed controls and performed control assurance testing activities.
- Provided professional day to day execution of third-party and operational vendor compliance assessments.
- Evaluated Third Party responses to IT questionnaires and test answers as appropriate.
- Track and report progress status, issues, and challenges on a regular basis for executive reporting.
IT Auditor
Confidential
Responsibilities:
- Identified and evaluated risks during teh review and analysis of System Development Life Cycle (SDLC), including design, testing/QA, and implementation of systems and upgrades.
- Prepared audit scopes, reported findings, and presented recommendations for improving data integrity and operations.
- Conducted reviews of data centers, extranets, telecommunications, and intranets to assess controls and ensure availability, accuracy, and security under all conditions.
- Ensured quality and accuracy in concise reporting and consistency across audits.
- Developed, documents and maintain consistent audit tracking model and framework.
- Conducted 3rd party risk assessments to enable teh business and ensure compliance wif laws and contractual requirements.
- Conducted vendor risk assessment using Standardized Information Gathering Questionnaire (SIG Core/SIG-Lite) to assess service providers during onsite or virtual assessments.
- Applied experience in audit, security and regulatory frameworks including ISO 27001, SOX, HIPAA, COSO/COBIT.
- Conducted related ongoing compliance monitoring activities to ensure effectiveness of implemented controls.
- Produced third Party Vendor Assessment reports that clearly articulate risks.
- Translated security risk and communicate effectively to business partners wifin teh organization.
- Monitored and track best practices and emerging compliance changes/impacts for continuous improvement opportunities.
- Prepared written responses to routine security and compliance inquiries by preparing, modifying documents including correspondence, reports, drafts, memos, and emails.
Third Party Risk Assessor
Confidential
Responsibilities:
- Performed Third Party Risk Management (TPRM) assessments on vendor engagements.
- Plan and conduct security assessments on third party's vendors focusing on company policies, and internal controls.
- Communicate vendor risk management program wifin teh business.
- Assess identified third party findings and assist in identifying appropriate controls to mitigate.
- Document risk issues in teh client’s designated risk register
- Review Inherent Risk Questionnaire
- Prepare and analyze regular risk updates for management.
- Track progress and report status of issues that have been escalated to Vendor Risk Management.
- Maintaining an ongoing business relationship wif third party vendors.
Information Security Risk Analyst
Confidential
Responsibilities:
- Completed risk assessments, security requirements analysis, and security testing for existing and new applications controls.
- Responsible for updating any identify device authorization profile for full network access.
- Led technology risk assessment process wif business units to facilitate business objectives.
- Monitored action plans for critical and high- risk control findings.
- Updated and designed new processes, methodologies, and tools to optimize operations around department activities.
- Provided risk remediation recommendations that teh business and technology may implement to mitigate and identified control gaps.
- Performed vulnerability scans, conduct risk assessments, and implementing or overseeing of teh implementation of vulnerability assessments.