Sr IT Controls Analyst Accounting at Geebo

Sr IT Controls Analyst

Company Name:
Alliant Energy
In this role, you will be responsible for technology compliance and control standards across the technology portfolio. Provides planning, requirements definition, analysis, technology and business process design, development, implementation, operation, and enhancement of technology systems related to IT compliance and controls. Evaluates risks in design and document controls, coordinates with internal and external audit teams and participates in the evaluation of security standards, procedures, and controls.
Stays current with and notifies stakeholders of changes in regulatory or compliance guidelines (SOX, NERC/CIP, PII, etc.).
Works closely with business and information technology (IT) leadership to develop and implement controls that support business objectives.
Identifies gaps in control design and control operating effectiveness of IT general controls and makes recommendations for changes.
Interacts with business groups to understand how IT systems are used to assess whether IT systems should be included within the scope of required regulations and controls.
Tracks and resolves IT compliance questions from business process owners.
Strengthens the Alliant Energy control environment through education, collaboration, governance and oversight.
Proactively leads application and infrastructure teams through self-audit exercises and drills to ensure controls are operating as designed and addresses deficiencies.
Liaisons with compliance and audit functions within the organization. Collaborates with internal Audit, IT Security Risk and business control functions to implement transparent, measurable, and sustainable control improvements and action plans.
Assists with Business Continuity and Emergency Planning initiatives, including periodic updates and testing of the plan.
May participate in 24x7 on call rotation
Performs all other duties as assigned.
Education or experience equivalent to a four year degree from an accredited college or university, with emphasis in information technology or related area preferred. Certification in information security or audit (CISA, CISM, CISSP) preferred.
A minimum of five to eight years technical and/or professional experience, with at least 4 years of experience in information security, IT audit, IT compliance, or related field.
Ability to successfully obtain and maintain one or more of the following credentials: CISSP- (ASSAP/ISSEP/ISSMP) / CAP / Security
/ Network
/ CISA / CISM / and others.
Working knowledge of IT audits, IT controls, security and related industry regulatory issues.
Proficient with multiple technologies and architectural design principles.
Demonstrated effective leadership skills.
Demonstrated effective interpersonal, verbal, and written communication skills.
Demonstrated ability to use computer software programs (e.g., e-mail, word processing, spreadsheet, and project management).
Ability to work in a diverse work environment.
We are committed to providing an inclusive work environment for all and are proud to be an Equal Opportunity Employer M/F/Disability/Protected Veteran.
Disclaimer: The above information on this description has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications required of employees assigned to this job.
To apply for this challenging opportunity, please complete our online application at .
Removal Date: 05/30/2014
Location: Madison, WI
Position Type: Regular
Schedule Type: Full-Time
Requisition ID: 938BREstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.