Sr. Manager, IT Risk Management
CarMax, Richmond, VA, United States
Do you want to play a key role in enhancing the Cybersecurity program for a Fortune 200 company and national brand that has also been listed on the Fortune 100 Best Places to Work for the past 20 years in a row. Do you enjoy working in a collaborative environment where your experience and ideas can shape the direction and development of critical cybersecurity information risk management capabilities?
Do you want to work with a team of talented professionals that have highly advanced technical knowledge and be the subject matter expert in information security risk management, third party risk management, and business continuity?
Then your job search begins and ends here….
I. BRIEF POSITION SUMMARY:
The Information Risk Manager is a critical leadership role that demands a comprehensive blend of technical expertise and strategic relationship management across information risk functions, including information security risk management, third party risk management, privacy operations, and business continuity. This individual is tasked with leading the development, implementation, and continuous refinement of an Information Risk Management framework, aligning with industry standards such as ISO 27001/2 and NIST 80030. Beyond technical responsibilities, this role is pivotal in fostering strong relationships with stakeholders, including business owners, regulatory bodies, third-party vendors, and internal teams, to ensure cohesive risk management strategies. The Information Risk Manager will oversee security policies, conduct risk assessments, manage security awareness training, and lead initiatives in business continuity, third-party security due diligence, and cyber regulatory readiness. This role serves as the information risk subject matter expert and strategic advisor in all facets of information risk management to all levels across the organization.
II. THE DAY TO DAY
- Lead the adoption and adaptation of a comprehensive information risk management framework, integrating privacy operations, security controls design & implementation, and continuous improvement mechanisms, while maintaining strong leadership and stakeholder relationships.
- Develop and manage security policies and procedures, ensuring compliance with legal, regulatory, and industry standards.
- Conduct thorough risk assessments, identifying potential threats and vulnerabilities, and implement robust security measures to protect organizational assets, with a focus on transparent communication and collaboration with stakeholders.
- Oversee the design and delivery of security awareness training and communications programs, enhancing the security culture within the organization and engaging with stakeholders to ensure widespread adoption and understanding.
- Manage business continuity risk & resiliency planning, ensuring the organization's ability to operate during and recover from adverse events, while working closely with stakeholders to align continuity plans with business needs.
- Conduct third-party security due diligence and vendor risk assessments to safeguard against third-party risks, collaborating with stakeholders to ensure third-party practices align with organizational security standards.
- Lead cyber regulatory readiness initiatives, preparing the organization for compliance with current and future security and privacy regulations, and engaging with regulatory stakeholders to ensure alignment and readiness.
- Engage in strategic board reporting, providing insights and updates on the organization's security posture and risk management efforts, and fostering strong relationships with leadership to support informed decision-making.
- Foster a culture of continuous improvement, regularly reviewing and enhancing security and risk management practices, with a focus on stakeholder feedback and collaboration to drive organizational resilience and security.
III. EDUCATION AND/OR EXPERIEINCE
- Bachelor’s degree in Technology, Computer Science, Business, or a related field.
- Master’s degree or relevant professional certification (e.g., CRISC, CIA, CIPP, CISM, GIAC, CISSP) is preferred. CRISC and CISA required.
- A minimum of 10 years of leadership experience in information risk management or a similar role, with a focus on leadership and stakeholder management.
- Proven expertise in information security, information risk management, and compliance frameworks (NIST, CIS, ISO27001/2, etc.).
- Demonstrated leadership in privacy operations, security awareness training, business continuity, and third-party risk management, with a track record of successful stakeholder engagement and collaboration.
- Strong understanding of cyber regulatory environments and experience in senior leadership reporting and communication, with the ability to build and maintain effective stakeholder relationships.
- Extensive experience in information risk assessment, policy development, and incident response management, with a focus on strategic stakeholder communication and collaboration.
- Excellent communication skills, with the ability to effectively lead teams, influence stakeholders, and drive organizational change through strong leadership and stakeholder relationships.
- Excellent analytical, problem-solving, and decision-making skills; high level of accuracy and attention to detail.
- Strong leadership and organizational skills; ability to manage multiple projects and teams in a fast-paced environment.
- Exceptional interpersonal and communication skills, both written and verbal, with the ability to explain complex compliance issues to stakeholders at all levels.
- Demonstrated leadership - ability to gain consensus across teams without direct reporting responsibility.
- Strong leadership skills, with the ability to manage and mentor a team of risk management professionals.
- Dedication and commitment to top-quality service and to exceeding customer expectations.
- Proven ability to influence without authority the information risk management direction of others.
- Ability to build relationships that help overcome obstacles and time constraints to successfully deliver remediation to completion.
IV. WORK ENVIRONMENT
This role operates in a dynamic, fast-paced office setting, reporting directly to the VP, Chief Information Security Officer. The environment demands high levels of focus, collaboration, adaptability, and strategic stakeholder engagement to manage multiple, simultaneous demands and ensure the organization's security risk and compliance posture.