Hong Kong, Hong Kong SAR, Hong Kong

IT Risk Analyst (Top Investment Bank))

 Job Description:

The candidate is responsible for assisting in identifying, assessing, and managing potential risks related to information technology for a top tier Investment Bank. The candidate will work closely with senior analysts and managers to develop and implement risk management strategies, policies, and procedures.

Job Description:

1. Risk Assessment: Assist in identifying potential IT risks by conducting risk assessments, vulnerability assessments, and gap analyses.

2. Risk Analysis: Analyze and evaluate the identified risks to determine their potential impact on the organization's IT systems, data, and operations.

3. Risk Mitigation: Assist in developing and implementing risk mitigation strategies and controls to reduce the likelihood and impact of identified risks. This may involve recommending security measures, implementing security policies, and conducting security awareness training.

4. Compliance: Assist in ensuring compliance with relevant industry standards, regulations, and legal requirements related to IT security and risk management (e.g., ISO 27001, GDPR, HIPAA).

5. Incident Response: Support the incident response team in investigating and responding to IT security incidents, including analyzing security logs, conducting forensic investigations, and recommending remedial actions.

6. Documentation: Maintain accurate and up-to-date documentation of risk assessment findings, risk management plans, policies, and procedures.

Requirements:

1. Education: A bachelor's degree in computer science, information technology, cybersecurity, or a related field is typically required. Some organizations may accept relevant work experience or certifications in lieu of a degree.

2. Knowledge: Strong understanding of IT risk management concepts, methodologies, and best practices. Familiarity with industry standards such as NIST Cybersecurity Framework, COBIT, or ITIL is desirable.

3. Technical Skills: Proficiency in conducting risk assessments, vulnerability assessments, and analyzing security controls. Knowledge of networking, operating systems, databases, and cloud computing is beneficial.