computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its … to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security More ❯
assessments of computing environments to identify points of vulnerability, non-compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for networking, computing, and enclave environments to include … implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the system development life cycle. Contribute to the security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations. Review certification and accreditation (C&A) documentation, provide feedback on completeness and compliance of its … content. Support security authorization activities in compliance with NSA/CSS Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF), the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes for security engineering. The Level 2 Information Systems Security Engineer shall possess the following capabilities: • Participate as the primary security More ❯
LEAD IT RISK & CONTROL WHAT IS THE OPPORTUNITY? "The Lead IT Risk Controls Analyst is a subject-area specialist with specialized training, methods and analytic techniques to create recommendations and directions for cyber risk mitigation in a complex technical environment. Focus areas of security assessment by the Lead ITRC Security Analyst includes third party security and overall … This requires routinely authoring detailed reports and gathering metrics ensure stakeholders receive accurate and complete information. The Lead ITRC tkeeps abreast of external cyber security trends, technologies and cyber risk management approaches, and often works with other teams on cyber risk-related initiatives to provide subject-matter recommendations and guidance to achieve a posture within the bank's … overall risk appetite. The Lead ITRC serves as an expert area of specialization. This role is a working lead that provides functional guidance and may coordinates or supervise the daily activities of individual contributors or working teams in areas of specialization.Provides input on resources planning, procedures," WHAT WILL YOU DO? "Define analysis objectives, collect data from internal and More ❯
Senior Risk Analyst 1277CW SEIC - Somerset Energy innovation centre PAYE Option Up to £386.74 or Umbrella £539.18 per day Decision-Making • The jobholder will be accountable for the Risk information they generate, associated with Project delivery and the management of Project progress and forecasting data. The jobholder will have authority to make decision relating to the maintenance of … Project data and Reporting, within their area of work, and will be expected to identify programme/area issues and suggest resolutions or changes. Principal Accountabilities • The Senior Risk Analyst will be the face of Risk management in their nominated Programme/Area in the Project, bringing confidence to stakeholders that they are performing the right steps to … identify, analyse, respond to and manage their Risk Outputs. • Providing assurance of the maintenance of all Risk and Opportunity data for the Programme/Area within the Risk software system e.g. ARM. • Assurance of the delivery of Risk and Opportunity reports to a defined reporting cycle, including commentary on key time-related drivers and performance issues More ❯
Senior Risk Analyst 1277CW SEIC - Somerset Energy innovation centre PAYE Option Up to £386.74 or Umbrella £539.18 per day Decision-Making • The jobholder will be accountable for the Risk information they generate, associated with Project delivery and the management of Project progress and forecasting data. The jobholder will have authority to make decision relating to the maintenance of … Project data and Reporting, within their area of work, and will be expected to identify programme/area issues and suggest resolutions or changes. Principal Accountabilities • The Senior Risk Analyst will be the face of Risk management in their nominated Programme/Area in the Project, bringing confidence to stakeholders that they are performing the right steps to … identify, analyse, respond to and manage their Risk Outputs. • Providing assurance of the maintenance of all Risk and Opportunity data for the Programme/Area within the Risk software system e.g. ARM. • Assurance of the delivery of Risk and Opportunity reports to a defined reporting cycle, including commentary on key time-related drivers and performance issues More ❯
inputs from all programs. Qualified candidates will interface with all elements of the program team to develop and support regular maintenance of the program IMS. Candidates will perform schedule analysis in support of assigned programs or projects. Ensures major projects and program schedules and plans are integrated across company functional groups including finance, engineering, material, manufacturing, and quality. Tracks … plans and schedules, performs riskanalysis, identifies, and resolves critical path and network logic conflicts. Utilizes Gantt, Critical path, Driving Path, Variance metrics, milestone charts, earned value management and other project management techniques to gauge progress and identify performance variances to facilitate focus and intervention on critical areas. Ensures compliance with internal program procedures and project control system … May lead or participate in scheduling status reviews. Skills/Experience: Essential Functions: Develop integrated master schedules using IMP, SOW and WBS. Creates and tracks plans and schedules, performs riskanalysis, identifies and resolves critical path and network logic conflicts. Working knowledge of Planning & Scheduling Excellence Guide (PASEG), Version 4.0, EVMS Standard (EIA 748-D), Integrated Product and More ❯
s client is seeking a Cybersecurity Analyst with an active Secret clearance to support critical cybersecurity operations in Portsmouth, VA. This position requires expertise in vulnerability management, incident response, riskanalysis, and compliance with DoD and DON cybersecurity standards. The analyst will be responsible for monitoring, analyzing, and mitigating cyber risks, supporting contingency planning, and maintaining day-to … IT or a related field (or equivalent DoD 8570.01M certification such as Security+ or higher), and have at least four years of cybersecurity experience in system/network vulnerability analysis, risk mitigation, and security test & evaluation. Strong knowledge of INFOSEC concepts, firewall policy, ports & protocols, and Navy-specific security requirements (e.g., OPNAVINST N9210.3) is essential. Responsibilities: • Perform cybersecurity … analysis in support of incident response, threat detection, and risk mitigation. • Conduct system and network vulnerability analysis and implement remediation strategies. • Manage Vulnerability Remediation Asset Management (VRAM), including uploading baseline configurations and processing vulnerability scans. • Support and maintain cybersecurity tools such as ACAS, HBSS, MDE, MDI, and Splunk. • Perform risk assessment and mitigation analysis to More ❯
Emersons Green, Bristol, Avon, England, United Kingdom
Gregory Martin International Limited
global, defence, energy, space, maritime, and intelligence & communications programmes. As a Cost Consultant you will be delivering technical consulting projects within the defence sector. You will be providing detailed analysis of data and costs to assist your client’s industry make better decisions. This may be working in customer teams to support procurement decisions with analytical thinking and outcomes … modelling of operational performance and sustainment, or historical analysis to support learning lessons from previous operations. Responsibilities for Senior Cost Engineer Consultant will include: Provide detailed analysis to support key decisions within the project teams. Identifying and bidding for and winning future work within your client’s industry. Building new relationships and maintaining the relationships with current customers. … Using and developing problem structuring methods and a variety of tools and techniques, including novel approaches where required. Working organically in customer teams to deliver rapid turn-around analysis or using one of the company’s offices as a team hub from which to plan and deliver tasks. Essential Requirements re role of Senior Cost Consultant/Cost Engineer More ❯
Your New Salary: £42,000 Office based 6 months FTC Start: ASAP Working hours: 9-5 Japanese speaking PMO RiskAnalysis - Responsibilities: Oversight & Monitoring. Challenge and validate data in plan view including status, progress, milestones, RAIDs and Financials, driving action with PM’s to correct and manage information. Risk & Issue Management: Support portfolio lead to resolve issues … monthly Portfolio Committees including pack production, meeting schedule, minutes and actions, attendees/distribution lists, maintenance of ToR General meeting organisation/admin/Meeting trackers Japanese speaking PMO RiskAnalysis - Requirements: Japanese Language skills Functional/Technical Competencies: Demonstrable practical experience with demand and financial planning required, previous experience with PMO/PLC processes and controls beneficial More ❯
computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. RESPONSIBILITIES Participate as a security … IA architectures, systems, or system components Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures Support security planning, assessment, riskanalysis, and risk management Identify overall security requirements for the proper handling of Government data Provide security planning, assessment, riskanalysis, and risk management More ❯
IA architectures, systems, or system components Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures Support security planning, assessment, riskanalysis, and risk management Identify overall security requirements for the proper handling of Government data Provide security planning, assessment, riskanalysis, and risk management More ❯
training as an IT specialist Experience in conceptual design of software and tuning options with practice of database modelling Experience with complex SQL queries as well as database performance analysis and optimization Confident handling of database management systems, preferably DB2 and the associated database languages and tools Knowledge of the structures in TWS/OPC for setting up automated … batch processes Prooved experience in IT project management, i.e. IT process riskanalysis, requirements analysis + business client communication Analytical and strategic thinking Systematic, methodical and solution-oriented approach Good English language skills, preferably also some French language skills, good German is an advantage Collaboration with international colleagues on challenging IT projects Analyze and expand existing software … training as an IT specialist Experience in conceptual design of software and tuning options with practice of database modelling Experience with complex SQL queries as well as database performance analysis and optimization Confident handling of database management systems, preferably DB2 and the associated database languages and tools Knowledge of the structures in TWS/OPC for setting up automated More ❯
Are you an experienced consultant with a background in riskanalysis, corporate intelligence or consulting, looking to transition into the world of cybersecurity? We are looking for individuals with strong analytical skills, an investigative mindset, and problem-solving capabilities to join our team and help our clients respond and recover to cyber threats. S-RM is a global … invest in our people's wellbeing and learning every day. The role As our practice continues to expand globally, we are looking for experienced consultants with a corporate intelligence, RiskAnalysis or Consulting background to join us in a pivotal career transition into cybersecurity. Your role responsibilities may include: Responding to a range of cyber-attacks by helping … of talents, experiences, and perspectives. What we're looking for Creative problem solvers with excellent analytical skills and a keen eye for detail. 3-6 years of experience in riskanalysis, corporate intelligence, or consulting. Strong and effective communicators who can articulate findings clearly in both written and spoken forms. Experience in a client-facing role, and an More ❯
designs used in DoD weapon systems) from proposal development through product phase-out, including but not limited to customer briefings, proposal writing, technical planning, system integration, verification and validation, risk and supportability, performing anaylses, and customer requirements management. The System Engineer will also ensure the logical and systematic conversion of customer or product requirements into total systems solutions that … acknowledge technical, schedule and cost constraints. Perform functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications. Assist with creation and maintenance of detailed design and drawings and assist with hardware builds and testing. Essential Functions: Translate end-user/customer needs into end-to-end … systems requirements Work collaboratively across the engineering organization to perform requirements analysis, requirements decomposition and assignment of requirements to appropriate functional areas of responsibility, and manages traceability of requirements back to customer specifications and system level derived requirements Leads design synthesis and generation of supporting design documentation which includes technical specifications, interface control documents, test plans and procedures, and More ❯
Senior Risk Analyst - SwapClear # LCH and SwapClear and Listed RatesLCH Ltd is an international multi-asset class central counterparty clearing house (CCP), part of the London Stock Exchange Group. LCH Ltd serves a broad range of exchanges and over-the-counter trading platforms providing critical risk management services. It has a unique membership model and its customers … with over 60 member bank groups and over 1000 clients serviced.# Role Profile Enter role description, team description and department description: This contract role is part of the SwapClear Risk Change team, which is responsible for delivering key risk-related change initiatives for the SwapClear service. The position involves supplying to risk projects and providing domain expertise … to support the end-to-end delivery of products and enhancements.As a member of a dedicated scrum team, the successful candidate will support the Product Owner in delivering risk-related items and will be involved throughout the full project lifecycle - from functional and test design to validation and hands-on testing of deliverables.A good understanding of the Interest Rate More ❯
requirements and operational constraints. Conduct or oversee security control assessments for management, operational, and technical controls, leveraging interviews, evidence review, technical validation, and security testing. Document assessment results and risk impacts in the Security Assessment Report (SAR), providing a clear summary of control effectiveness, risk posture, and any residual vulnerabilities. Support SAR preparation activities including: Vulnerability assessments and … validation Security categorization reviews System Security Plan (SSP) analysisRisk issue resolution and remediation status reporting Preparation of SAR briefings, findings presentations, and meeting support materials Provide independent contributions to the Authorization to Operate (ATO) process by delivering the SAR, risk determinations, and supporting documentation for inclusion in the final ATO package. Generate draft Plan of Action … and Milestones (POA&M) entries based on control deficiencies and observations documented during assessments, excluding any actions already remediated by the implementation team. Prepare a Residual Risk Statement with a recommendation for risk acceptance or mitigation, which feeds into the Authorizing Official's risk decision process and the Risk Acceptance Recommendation Report. Determine and document the More ❯
activities. Duties may include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Provides expert support, research and analysis … and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories … SSE IPT reviews Provides expert level consultation and technical services on all aspects of Information Security Review ISSE related designs and provides security compliance recommendations Develop and provide IA risk management recommendations to the customer Provide ISSE support for Mission and Training systems design and development Assist with development and maintenance of the Program Protection Plan Assist with site More ❯
Job Tittle: Business Analyst/Product Analyst - VP (Credit, Market Risk, Basel III) Location: London (2 to 3 days a week on-site) Contract Length: Until 30 April 2026 (possibility for extension) Rate: Highly competitive rate available for suitable candidates Working Pattern: Full Time Are you ready to take your career to the next level? Our client, a leading … organisation in the finance sector, is on the lookout for a dynamic Business Analyst/Product Analyst - VP to drive strategic enhancements to their risk platforms! If you have a passion for risk management and a strong grasp of regulatory frameworks, this is your chance to shine! Key Responsibilities: Translate Requirements: Convert business and regulatory needs into detailed … product specifications for advanced risk systems. Develop Analytics: Lead the creation of analytics and reporting capabilities for counterparty credit and market risk, including MPE, CVA, VaR, sensitivities, and stress testing is essential. Ensure Compliance: Align solutions with ECB regulatory frameworks (CRR, CRD, Basel III/IV, EMIR) and uphold internal risk policies. Collaborate: Work closely with stakeholders More ❯
activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Provides expert support, research and analysis … and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations. Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories … SSE IPT reviews. Provides expert level consultation and technical services on all aspects of Information Security Review ISSE related designs and provides security compliance recommendations. Develop and provide IA risk management recommendations to the customer. Provide ISSE support for Mission and Training systems design and development. Assist with development and maintenance of the Program Protection Plan. Assist with site More ❯
Our DOD/Aerospace client is looking to fill a Sr. Principal Systems Engineer position that just opened in Scottsdale, AZ. In this role you'll participate in requirements analysis and management, functional analysis, performance analysis, system design, trade studies, systems integration and test (verification) in the development and evaluation of networks and information systems. To be … with possibility of going direct/permanent Pay: $95/hour - $113/hour DOE Telecommute: Hybrid Overview: As a Senior Principal Systems Engineer, you'll participate in requirements analysis and management, functional analysis, performance analysis, system design, trade studies, systems integration and test (verification) in the development and evaluation of networks and information systems Responsibilities: -Performs … requirements analysis, requirements definition, requirements management, functional analysis, performance analysis, system design, detail trade studies, systems integration and test (verification), validation and interface definition studies of subsystem or system elements under supervision of the lead systems engineer -Performs technical planning, cost and risk analyses, and supportability and effectiveness analyses for subsystems and system elements -Performs customer More ❯
contract supporting an intelligence community customer. The mission of this program is to drive actionable management of risks, issues, and opportunities by applying credible cost/schedule/performance analysis to achieve mission success. This program leverages a diverse workforce (engineering/science, mathematics, computer science, business, etc.) to provide cradle-to-grave support across the entire agency's … enterprise. We support cutting-edge technology for Space, Ground, and Launch Systems to ensure mission success. As a Cost Analyst, you will perform cost, schedule, and risk analyses to support budget build/execution, source selections, technology tradeoffs, etc. Additionally, collect, normalize, and analyze historical cost/schedule/technical/programmatic data to develop innovative models/methods. … Work Location: Chantilly, VA Aerospace Building (On-site requirement) Clearance Level: TS-SCI/CI Poly Education: Bachelor's degree in engineering, physics, operations research, cost analysis, mathematics, finance, economics, business administration, or similar quantitative field. Position Overview: • Cost Estimating using parametric approaches, with preference for space system experience (including software estimating). • Tool development using COTS (i.e., MS More ❯
needed. • Identify and recommend solutions to close holes/gaps in data. • Develop/apply quality standards and create checklists for data/normalization and data cleansing. • Perform data analysis to support current and emerging analytic topics (e.g. commercial markets, proliferated architectures) • Cost Estimating using parametric approaches, with preference for space system experience (including software estimating) • Tool development using … e.g., NSSL) • Ground System Cost Estimating (e.g., mission management/command and control software, processing, ground terminals, communication networks, data centers) • Services Cost Estimating • Data Collection and Normalization • Data Analysis to include statistical methods • Tool Development • Method Development (i.e., multivariate regression analysis, riskanalysis (e.g., Monte Carlo simulation tools), cost improvement curve analysis) • Source Selection … evaluation support • Cost estimating of Agile Development efforts Education Requirements: At least a Bachelors Degree in Engineering, Physics, Operations Research, Cost Analysis, Mathematics, Finance, Economics, Business Administration, or similar quantitative field More ❯
Job description : Preferred Qualifications Bachelor s or Master s degree in Finance, Accounting, Information Systems, or related field 8+ years of experience in SAP Treasury and Risk Management (TRM) Strong understanding of financial instruments, cash flow forecasting, and liquidity planning Experience with SAP S/4HANA and Fiori apps for Treasury Familiarity with integration tools (e.g., SWIFT, BCM, payment … C_S4FTR_1809 or C_S4FTR_2023) SAP Certifications in one or more of SAP FI/CO, Funds Management, and Grants Management Key Technical Skills SAP Treasury and Risk Management configuration and process design Cash and liquidity management Bank account and payment management Financial riskanalysis and hedge accounting Integration with external banking systems SAP Fiori … Treasury KPI reporting Project management and change management Strong documentation and training capabilities Key Responsibilities Configure and support SAP Treasury modules, including Cash Management, In-House Cash, Transaction Manager, Risk Analyzer, Liquidity Planner, Debt and Investment Management, Bank Communication Management (BCM), and Electronic Bank Statement (EBS) Design and implement solutions for financial transactions, market riskanalysis, and More ❯
computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include … and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its … to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security More ❯
secure reliable and uninterrupted availability of the Sponsor's developed and deployed systems and networks. Provide core security engineering principles are implemented into assigned programs information systems architecture. Perform analysis and evaluation to design, implement, test and field secure systems, networks, and architectures. Work closely with the architects, engineers, and developers in the identification and implementation of appropriate information … and implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the program life cycle. Contribute to the security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations. Review assessment and accreditation (A&A) documentation, provide feedback on completeness and compliance of its … to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security More ❯