business contacts, and QA teams. Facilitate clear and effective communication, coordinate dependencies, provide timely updates, address concerns or issues promptly, and promote collaboration and teamwork. Team Leadership and Management: Lead and manage a global team of technical consultants, including onshore and offshore employees and contractors, by cultivating a positive, collaborative, and resultsoriented work environment that encourages productivity and … support. Stakeholder Management: Engage with technical stakeholders to gather feedback, understand their requirements, and manage expectations. In partnership with the Project Manager, keep them informed about project progress, risks, and any changes in scope by providing or contributing to weekly status reports, using client-specific or standardized templates. Risk Management: Identify and mitigate technical risks, challenges … and potential roadblocks, proactively communicating them to the Project Manager. Collaborate with the technical project team to gather detailed information and explore solution options for addressing these risks. Change Management: Identify potential change orders and proactively communicate them to the Project Manager. Provide detailed technical scope definitions, estimates, and resource planning for the proposed changes. Pre More ❯
hybrid and flexible working arrangements – please speak to your recruiter about the options for this particular role Salary: Competitive What you’ll be doing: Be responsible for the management of work within cost and budget Report on team progress and performance with an awareness of financial forecasting and estimating Oversee the Security Assurance Case Capture and agree on … Publications, Cyber Incident Plans and Operating Instructions (list is not exhaustive) Your skills and experiences: Hold a relevant degree (or equivalent experience) in a relevant STEM subject or Information Security related Hold a CISSP (or able to achieve) Have relevant engineering lifecycle and Project Management knowledge and experience A thorough understanding of information security … principles and its potential impact on Product Systems Experience of Consultancy on the application of Product Security/Information Security concepts to applicable technologies within the environment (or similar) Experience of mentoring and/or providing support to others Benefits: You’ll receive benefits including a competitive pension scheme, enhanced annual leave allowance and a Company contributed Share More ❯
hybrid and flexible working arrangements – please speak to your recruiter about the options for this particular role Salary: Competitive What you’ll be doing: Be responsible for the management of work within cost and budget Report on team progress and performance with an awareness of financial forecasting and estimating Oversee the Security Assurance Case Capture and agree on … Publications, Cyber Incident Plans and Operating Instructions (list is not exhaustive) Your skills and experiences: Hold a relevant degree (or equivalent experience) in a relevant STEM subject or Information Security related Hold a CISSP (or able to achieve) Have relevant engineering lifecycle and Project Management knowledge and experience A thorough understanding of information security … principles and its potential impact on Product Systems Experience of Consultancy on the application of Product Security/Information Security concepts to applicable technologies within the environment (or similar) Experience of mentoring and/or providing support to others Benefits: You’ll receive benefits including a competitive pension scheme, enhanced annual leave allowance and a Company contributed Share More ❯
day client interface. You will also be comfortable enhancing customer relationships with new opportunities and assisting with bids and presales where necessary. You will have experience of working across system lifecycles and be capable of supporting clients through business-focused requirement specification and definition. You will have a broad experience of technical security, producing technical risk assessments and solution … stakeholders. With your experience you will be comfortable operating in a ‘customer friend’ type role, supporting the client to develop and deliver secure systems, understanding risks and managing complex system security whilst communicating effectively with technical and non-technical stakeholders. Your experience will include: Providing advice and guidance to existing SOC team on areas of improvement and include experience … interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst Certified InformationSystem Security Professional (CISSP), Certified Information Security Manager (CISM), or another industry recognised cyber security certification. Full Membership of the Chartered Institute of Information Security (CIISec More ❯
reflect approximately 85% of the responsibilities and are not exhaustive. Other activities within reasonable scope of the role are expected. ROLE OVERVIEW Provide scientific and technical leadership and management to a team of Computational Scientists. Lead the execution of client and internal research and development projects in the field of computational pharmaceutics. Act as the primary point of … technical challenges in a solution-oriented manner. Support cross-functional teams using domain-specific computational skills. Develop SOPs, tools, processes, and methodologies (including technical, software development, and project management aspects) for use in revenue-generating and internal projects. Provide guidance to business development on the design of client work programmes. CORE RESPONSIBILITIES Model best practices, aligning with organisational … SOPs) within specified timeframes. Maintain up-to-date training records and submit for regular review. Submit timesheets, expense claims, and performance documentation in accordance with policies. Ensure confidential information is handled appropriately. Adhere to company IT and security policies when using equipment such as laptops and phones. EDUCATION, EXPERIENCE & RELEVANT SKILLS EDUCATION & QUALIFICATIONS A first degree in a More ❯