Senior Manager, Business Unit Security Office at Manulife
Waterloo, ON, Canada -
Full Time


Start Date

Immediate

Expiry Date

11 Nov, 25

Salary

0.0

Posted On

12 Aug, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cloud, Cloud Security, Physical Security, Time Management, Computer Science, Iaas, Information Security, Security, Assessment, Cisa, Application Security, Paas, Information Technology, It, Vulnerability Management, Information Protection, Network Security, Access

Industry

Information Technology/IT

Description

Join our Canadian Segment Security Technology Team!
Reporting to our Director, Business Unity Security Officer; this role is part of our First Line of Defense. Our team performs risk-based information security assessments for new technologies and changes to existing IT-based solutions; we are accountable to identify threats for both the cloud-based and on premises-based infrastructure, platform, and services: Perform Canadian Business Unit project and technology information risk assessments including assessing risks and define controls as well as tracking the implementation of controls.
Design, document and/or implement BAU security controls applicable to the platform/services. Evaluate products for implementing security controls in the cloud or on-premises spaces.

REQUIRED QUALIFICATIONS:

  • Experience in cloud security, application security, and data protection.
  • Familiarity with DevOps pipelines and security testing methodologies.
  • 5+ years of experience in a combination of relevant technical disciplines in the field of Information Security: network security, application security, identity and access management, IT operations security, vulnerability management, information protection, physical security, cybersecurity.
  • 5+ years of IT/Information Risk management experience: vendor risk management, project risk management, IT audit or IT controls assessment.
  • Deep knowledge of cloud computing security and IaaS, PaaS, or SaaS environments.
  • Knowledge of security frameworks, regulatory requirements and standards.
  • Excellent business communication to lead presentation, facilitate discussion across all levels and audiences.
  • Influence behavior to reduce risks and foster a strong information security risk management culture.
  • Problem solving, analytical, and establish new way/processes to improve.
  • Collaborative with a coaching and development approach.
  • Strong time management and organizational skills to manage multiple tasks and changing priorities.

PREFERRED QUALIFICATIONS:

  • Background in Computer Science, Information Technology, Software Engineering, Business Administration, or relevant educational and professional experience preferred.
  • Knowledge and understanding of the financial industry are preferred.
  • Relevant professional designations (e.g., CISSP, CRISC, CISM, CISA, GSEC) preferred.
Responsibilities

Risk Assessment and Management: Conduct comprehensive risk assessments of technology systems, applications, and infrastructure to identify potential threats, vulnerabilities, and impacts on business operations. Understand and apply security policies and standards to identify gaps and ensure compliance.
Application Security and Release Sign-Off: Review and sign off on application security measures during the software development lifecycle. Ensure security requirements are integrated into the DevOps pipeline and security tests.
Consultation and Collaboration: Consult with business, engineering, and architect teams to integrate security practices into their workflows.
Incident Response and Management: Provide domain expertise in security incident investigations and response. Ensure each information risk assessment completed is peer-reviewed & communicated to larger distribution to various partners.
Team Development and Training: Deliver training to key team members around the IRM processes. Respond to audits, regulatory reviews, risk, and controls self-assessments.
Continuous Improvement: Stay up to date on the latest security trends, threats, and technologies. Evaluate existing processes to redefine processes.

Loading...