Adherence to Risk-Based Internal Audit Plan:
- Follow a structured approach to auditing based on identified risks and priorities within the organization.
- Thorough Application Audits and Security Evaluation:
- Evaluate applications and systems to ensure they meet security protocols and industry standards, identifying any vulnerabilities or areas of non-compliance.
Audit Documentation:
- Prepare comprehensive audit documentation including risk assessments, working papers, audit program checklists, evidence gathering, and reports.
- Ensure clear communication of findings and enforce support processes to address audit issues promptly.
Data Center and Disaster Recovery Audits:
- Audit data centers and disaster recovery sites to verify operational effectiveness and compliance with established protocols.
Comprehensive System Audits:
- Assess the integrity and functionality of organizational systems through detailed audits, aiming to identify weaknesses and recommend improvements.
Review of Regulatory Submissions:
- Ensure timely and accurate documentation of regulatory submissions related to cybersecurity and other relevant standards.
IT Vendor Audits:
- Evaluate the security practices and compliance of IT vendors, ensuring they meet organizational standards and regulatory requirements.
Assistance in IT Governance Audits:
- Support audits related to IT governance frameworks, ensuring alignment with organizational objectives and regulatory expectations.
Review of SOPs and RCMs:
- Review Standard Operating Procedures (SOPs) and Risk Control Matrices (RCMs) to ensure they are up-to-date and effective in mitigating risks.
- Staying Abreast of Industry Trends and Regulatory Changes:
- Keep informed about emerging trends, threats, and regulatory changes in the industry to enhance security practices and compliance efforts
Didn’t find the job appropriate? Report this Job