We're individuals from different cultures and backgrounds. Those differences make us stronger as a team and a force for good in our communities. Here, you'll work with dynamic individuals, build your skills, and unleash new ways of working and thinking. Are you ready to join an organization that will help unlock your potential?
The Data Protection Lead is required to grow Equitable's Cyber Operations Data protection program with a focus on developing policies and procedures, strategy, data classification, data privacy/risk assessments, and implementation of programs and data protection as a service. The Data Protection Lead should be able to understand, communicate, and implement end-to-end data security capabilities such as:
Secure Data Transport Strategy - Embedding security into the overall approach and vision for data protection in an organization as it relates to safely transporting data.
Operational Data Protection - Provide immutable capabilities layered on top of data at rest or in motion to secure the contents from unauthorized access.
Data Control - Implementation of technical capabilities such as rights management to enforce the movement or transmission of data.
Data Security in the Cloud - Implementation of technical capabilities to protect and secure data in the cloud.
Database Security - Implementation of technical capabilities to protect and secure structured and unstructured database assets.
Cultivate and maintain relationships with key client stakeholders
Manage large Data Security delivery programs consisting of multiple projects, workstreams, phases, or releases.
Lead Data Security and Protection strategy, roadmap, and vision definition
Draft new and amend existing internal data protection policies, guidelines, and procedures, in consultation with key stakeholders
Flexibility to travel as necessary
Skills required to ensure your success include:
Agile Methodologies: Knowledge of concept and principles of agile methodology; ability to apply appropriate agile approaches in the processes of software development and delivery.
Confidentiality: Knowledge of practices and policies governing disclosure of information about the organization, its business activities, and employees; ability to apply this knowledge appropriately to diverse situations.
Information Security Management: Knowledge of the processes, tools and techniques of information security management; ability to deploy and monitor information security systems, while detecting, controlling and preventing violations of IT security.
IT Governance: Knowledge of the accountability framework and processes used to encourage proper behavior in IT activities and operations; ability to implement IT systems and controls to meet business needs and requirements.
Diversity, Equity and Inclusion: Demonstrates a commitment to Diversity, Equity and Inclusion by treating everyone with respect and dignity, ensuring all voices are heard and advocating for change.
Minimum of 3 years of security architecture experience designing and implementing data security solutions involving data encryption.
Minimum of 3 years of experience assessing or building programs in data protection: data encryption (FPE), tokenization, masking, and key management
Minimum of 2 years of experience in data encryption solutions within cloud environments (e.g. AWS, Azure, GCP)
Minimum of 5 years of hands-on experience with Data Security vendors, product capabilities, and solutions focus on Data Encryption and not limited to Data Loss Prevention, Data Rights Management, Data Classification, and Data Privacy in an operational capacity.
Deep understanding of data encryption and data loss prevention
Operational experience with Data protection technologies.
Experience designing, building, and implementing Operational process.
Experience with Secure data transport technologies and protocols.
Deep understanding of privacy/data privacy standards and regulations local, domestic and global (State Level Data Protection, ISO, GAPP, NIST 800-53, HIPAA, HiTrust, Privacy by Design, GDPR, EU Data Protection Directives, APEC Privacy Framework)
Security professional certification such as CISSP, CISM, CISA, CIPP or ISO 27001
Experience with technical documentation creation.
Eagerness to contribute in a team-oriented environment
Ability to work creatively and analytically in a problem-solving environment
Good communication (written and oral) and interpersonal skills
Good organizational, multi-tasking, and time-management skills
Demonstrated leadership, teamwork, and collaboration in a professional setting; either military or civilian
At Equitable, we're a team of over ten thousand strong; committed to helping our clients secure their financial well-being so that they can pursue long and fulfilling lives.
We turn challenges into opportunities by thinking, working, and leading differently - where everyone is a leader. We encourage every employee to leverage their unique talents to become a force for good at Equitable and in their local communities.
We are continuously investing in our people by offering growth, internal mobility, comprehensive compensation and benefits to support overall well-being, flexibility, and a culture of collaboration and teamwork.
We are looking for talented, dedicated, purposeful people who want to make an impact. Join Equitable and pursue a career with purpose.
Equitable is committed to providing equal employment opportunities to our employees, applicants and candidates based on individual qualifications, without regard to race, color, religion, gender, gender identity and expression, age, national origin, mental or physical disabilities, sexual orientation, veteran status, genetic information or any other class protected by federal, state and local laws.
NOTE: Equitable participates in the E-Verify program.
If reasonable accommodation is needed to participate in the job application or interview process or to perform the essential job functions of this position, please contact Human Resources at (212) 314-2211 or email us at TalentAcquisition@equitable.com .