Archer Sr. ConsultantLocation: Rosslyn, VA
Posted On: 11/07/2019
Requirement Code: 36206
Design and develop typical GRC solutions like risk management (enterprise and IT risk), compliance management, issue and corrective action plan management, exception management, policy life-cycle management, third party risk management, audit management, threat and vulnerability management, enterprise asset management, security operations management for clients across industries.
Assist in gathering and documenting business requirements and identifying gaps within existing systems and processes.
Define the architecture and design elements for implementation of GRC solution (including design data/object models, technical workflows diagrams, access control models etc.).
Lead build/configuration of GRC solutions on RSA Archer as per defined business requirements and design.
Lead SDLC efforts for successful build, test, and rollout of GRC solution into production use.
Assist in developing GRC governance and operating model for the set up and sustainment of the GRC program.
Implement the RSA SGRC Archer GRC tool including customized A&A, SecOps, Policy, ConMon & Threat modules at a government agency.
Agile Software Development MethodologyFunctional TestingServiceNow GRC - Policy & Compliance
5-8 years of experience in defining and implementing GRC solutions using RSA Archer.
in developing data/ object models design, technical workflows diagrams, access control models etc.
Hands-on experience with all SDLC activities related to GRC program implementation such as requirements gathering, analysis, design, configuration, testing, and
Understanding and knowledge of industry standards and industry frameworks (e.g., COBIT, COSO,ISO 27001, PCI, NIST).
Excellent documentation and communication skills
Ability to contribute towards eminence activities, Proof of Concepts, and assist in sales
(proposal responses, demos etc.).
Preferred:Certified as an RSA Archer Administrator.
Ability to cross skill and work with teams across geographies.
of integration with tools like SIEM, UCMDB, Vulnerability Scan tools, Configuration Check tools, LDAP etc.