About the job
Assurity Trusted Solutions (ATS), a subsidiary of the Government Technology Agency (GovTech), has been a reputable partner in the cybersecurity domain for over a decade. We provide an extensive range of services including infrastructure management, operational services, governance, assurance, and managed processes. In an ever-evolving digital landscape where trust and collaboration are paramount, ATS is committed to fostering secure environments through partnerships with GovTech, government agencies, and commercial stakeholders, effectively mitigating cyber risks and enhancing security frameworks.
Key Responsibilities:
GRC Leadership & Second Line of Defence
- Lead the governance of risk and compliance (GRC) within our team, shaping our approach to managing risks across various products and platforms.
- Function as the second line of defence for ICT risk and controls, providing an independent review of risk management, control design, and their effectiveness.
- Collaborate closely with the Product team to incorporate practical security measures and compliance protocols into daily operations.
Security Plan Governance and Automation
- Oversee the governance and standards for Security Plan submissions across CIOO and product teams, ensuring templates, minimum evidence expectations, and quality benchmarks are maintained.
- Evaluate Security Plans and supporting documentation, assess control coverage and implementation maturity, and recommend approvals to stakeholders.
- Implement automation as an ongoing audit mechanism:
- Work with product and platform teams to establish automated checks for Security Plan evidence.
- Utilize automated checks to identify gaps, anomalies, and missing evidence, driving remediation efforts with product teams.
- Monitor and report on KPIs related to Security Plans, including control coverage, consistency, cycle times, and defect rates across CIOO and product teams.
ICT Audit and Evidence Management
- Develop, implement, and manage workflows for ICT audit, risk management, and findings reporting.
- Organize and maintain documentation and knowledge repositories as the definitive source for:
- ICT audit plans, scopes, and procedures
- Control descriptions and standard evidence templates
- Centralized repositories of audit evidence and Security Plan materials
- Plan and conduct thematic and product-level ICT audits under the CISO’s guidance, independently verifying:
- Completion of required tasks
- Reliability and sufficiency of evidence provided by product teams

