Desired Skills and Experience

  • Provides advice, guidance and assistance to managers and other users on technical issues focusing on Information Security risk and supports USAA development projects, departmental initiatives and other special projects. Assists in the determination of requirements and recommends system security configurations.
  • Supports the lines of business and staff agencies with Information Security issues and communicates changes and trends in the Information Security standards and regulations.
  • Responsible for the implementation and interpretation of Information Security policies, guidelines and standards including the Information Security awareness program.
  • Supports cross functional teams through the problem resolution process, ensures necessary technology security controls exist and troubleshoots noncomplex Information Security issues.
  • Performs physical site assessments of business partners, provides peer review of work product and deliverables and executes release of information analysis to third party business partners.
  • Executes the Information Security risk and control identification, evaluation, documentation, analysis and reporting processes including analytic tools.   Supports the process owner execution identification, development and testing Information Security controls for risk mitigation effectiveness.
  • Responds to both verbal and written Federal and State regulatory and business partner periodic exams for Information Security risk requirements.
  • Maintains strategic and operational risk reporting and analytics as well as address responses to audit questions, and findings.
  • Other duties as assigned.
  • Bachelor’s degree required.
  • 4 additional years of related experience beyond the minimum required may be substituted in lieu of a degree.
  • 4 or more years of relevant work experience;.
  • Proficient knowledge of relevant technical discipline.
  • Experience developing enterprise level policies/standards/Controls for securing PCI/PII Data
  • Experience supporting an Enterprise wide rollout of SDM tool suites such as Protegrity, Imperva etc
  • Strong knowledge of Data Management & Governance policies, standards, processes & technologies
  • Established automated processes and scanning technologies to continuously scan for sensitive data
  • Established automated processes and technologies to continuously monitor for malicious activity
  • Strong background in sensitive data controls to protect PCI, PHI, PII and IP data

Apply