SrMgr-Information Security- Vendor Risk Management

Bethesda, MD, United States

Marriott International

Book Directly & Save at any of our 8000+ Marriott Bonvoy Hotels. Choose from Luxury Hotels, Resorts, Extended Stay Hotels, Pet-Friendly Hotels & More.

View company page

JOB SUMMARY

 

The candidate will be responsible for completing and maintaining 3rd Party Hosting Service Provider reviews, including creating risk assessments, and security test and evaluations. The candidate will also be responsible for supporting the overall security program including security policy, procedures, and standards, assessing the risk of the internal and external IT systems, ensuring Marriott iT documents are compliant with Marriott security policies and procedures, and reviewing documents for accuracy and completeness.

 

Conduct periodic re-assessment with focus on those with highly sensitive data. Perform application security vulnerability scanning and provide remediation options. Candidate will also assist in managing relationship with Service Providers who are responsible for the actual delivery of services, managing outcomes and results, and collaborating with stakeholders across IT and business departments to develop strategies for securing company information and assets. Shares responsibility for planning, directing, and coordinating compliance activities pertaining to technology projects for a given business unit. Verifies that project goals are accomplished and in line with business objectives.

 

Excellent communication skills are required to effectively communicate (verbally and written) across all levels within the organization.

 

CANDIDATE PROFILE

 

Education and Experience

 

Required:

  • Bachelor’s degree in Information Systems or related field or equivalent experience/certification
  • 7+ years of information technology leadership experience including implementing, managing and governing security policies
  • 3+ years direct work experience in third-party Risk Management
  • One or more current information security certifications such as Certified in Risk and Information Systems Controls (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or Certified Information Systems Security Professional (CISSP)

 

Preferred:

  • A security certification such as GWAPT, GPEN, AWS Associate Architect, AWS Professional Architect, PCI experience.
  • Technical knowledge in one or more of the following areas is required: Application Security, Operating System security (UNIX, Windows, Mainframe, etc.) and network security (routers, switches, firewalls) 
  • Technical leadership experience in an outsourced environment
  • Excellent communication skills and problem-solving ability
  • Experience conducting and maintaining vendor risk assessments
  • Experience with reviewing and assessing security controls of Cloud service providers
  • Proficient with assessing a multi-tiered system architecture (Web Server, App Server & Database)
  • Knowledge of OWASP Top 10 and SANS 25.
  • Working knowledge of the infrastructure and application scanning tools (such as Retina, Nessus, IBM App Scan, HP Web Inspect, Fortified on Demand, Qualys, etc.)
  • Manual Web Application Testing experience.

 

CORE WORK ACTIVITIES

 

Security Risk & Compliance

  • Oversee, evaluate, and support the documentation, and validation processes necessary to assure that associates, information technology systems and business processes meet the organization’s information assurance, security, and privacy requirements.  Ensures appropriate treatment of risk, compliance, and assurance of internal policies and external regulations.
  • Perform security controls assessments of third-party providers – assess security architecture, adherence to the requirements, conduct application scanning and results validation
  • Document controls gap analysis and risk assessment of the third-party providers
  • Review controls exception requests and make risk-based approval decision
  • Lead, participate or perform various infrastructure compliance initiatives and projects
  • Perform Application Security Testing using (Nessus, IBM App Scan, HP Web Inspect, Fortified on Demand, Qualys, Burp, or Retina) 
  • Conduct and validate finding discovered during the scans
  • Monitor compliance to applicable security policies and standards and report related risk issues
  • Manage and administer processes and tools that enable the organization to identify, document, and track third party risks and compliance exceptions
  • Conduct assessments of threats and vulnerabilities, determine deviations from acceptable configurations or enterprise or local policy, assess the level of risk, and develop and/or recommend and operationalize appropriate mitigation countermeasures.
  • Provide sound advice and recommendations to leadership and staff on a variety of relevant topics within the pertinent subject domain. Advocate policy changes and make a case on behalf of the company via a wide range of written and oral work products.
  • Oversee the information assurance (IA) program of an information system in or outside the network environment; may include procurement duties.

 

Maintaining Goals

  • Submits reports in a timely manner, ensuring delivery deadlines are met.
  • Promotes the documenting of project progress accurately.
  • Provides input and assistance to other teams regarding projects.

 

Managing Work, Projects, and Policies 

  • Manages and implements work and projects as assigned.
  • Generates and provides accurate and timely results in the form of reports, presentations, etc.
  • Analyzes information and evaluates results to choose the best solution and solve problems.
  • Provides timely, accurate, and detailed status reports as requested.

 

Demonstrating and Applying Discipline Knowledge 

  • Provides technical expertise and support to persons inside and outside of the department.
  • Demonstrates knowledge of job-relevant issues, products, systems, and processes.
  • Demonstrates knowledge of function-specific procedures.
  • Keeps up-to-date technically and applies new knowledge to job.
  • Uses computers and computer systems (including hardware and software) to enter data and/ or process information.

 

Delivering on the Needs of Key Stakeholders

  • Understands and meets the needs of key stakeholders.
  • Develops specific goals and plans to prioritize, organize, and accomplish work.
  • Determines priorities, schedules, plans and necessary resources to ensure completion of any projects on schedule.
  • Collaborates with internal partners and stakeholders to support business/initiative strategies
  • Communicates concepts in a clear and persuasive manner that is easy to understand.
  • Generates and provides accurate and timely results in the form of reports, presentations, etc.
  • Demonstrates an understanding of business priorities

 

Additional Responsibilities 

  • Provides information to supervisors and co-workers by telephone, in written form, e-mail, or in person in a timely manner.
  • Demonstrates self-confidence, energy and enthusiasm.
  • Informs and/or updates leaders on relevant information in a timely manner.
  • Manages time effectively and conducts activities in an organized manner.
  • Presents ideas, expectations and information in a concise, organized manner.
  • Uses problem solving methodology for decision making and follow up.
  • Performs other reasonable duties as assigned by manager.

 

 

California Applicants Only: The salary range for this position is $96,038.00 to $209,169.00 annually.

Colorado Applicants Only: The salary range for this position is $96,038.00 to $190,154.00 annually.

Hawaii Applicants Only: The salary range for this position is $116,205.00 to $209,169.00 annually.

New York Applicants Only: The salary range for this position is $96,038.00 to $209,169.00 annually.

Washington Applicants Only: The salary range for this position is $96,038.00 to $209,169.00 annually. In addition to the annual salary, the position will be eligible to receive an annual bonus. Employees will accrue 0.04616 PTO balance for every hour worked and eligible to receive minimum of 7 holidays annually.

All locations offer coverage for medical, dental, vision, health care flexible spending account, dependent care flexible spending account, life insurance, disability insurance, accident insurance, adoption expense reimbursements, paid parental leave, educational assistance, 401(k) plan, stock purchase plan, discounts at Marriott properties, commuter benefits, employee assistance plan, and childcare discounts.  Benefits are subject to terms and conditions, which may include rules regarding eligibility, enrollment, waiting period, contribution, benefit limits, election changes, benefit exclusions, and others.

Marriott HQ is committed to a hybrid work environment that enables associates to Be connected.  Headquarters-based positions are considered hybrid, for candidates within a commuting distance to Bethesda, MD;  candidates outside of commuting distance to Bethesda, MD will be considered for Remote positions.

The application deadline for this position is 28 days after the date of this posting, 4/22/2024.
 

 

Marriott International is an equal opportunity employer. We believe in hiring a diverse workforce and sustaining an inclusive, people-first culture. We are committed to non-discrimination on any protected basis, such as disability and veteran status, or any other basis covered under applicable law.

Apply now Apply later
  • Share this job via
  • or

Tags: Application security AWS CISA CISM CISSP Cloud Compliance CRISC Firewalls GPEN GWAPT Mainframe Nessus Network security OWASP Privacy Qualys Risk assessment Risk management SANS UNIX Vulnerabilities Web application testing Windows

Perks/benefits: Career development Equity Flex hours Flexible spending account Flex vacation Health care Insurance Medical leave Parental leave Salary bonus

Region: North America
Country: United States
Job stats:  8  0  0
Category: Compliance Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.