Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Aztec
We can consider hybrid or fully remote work in the UK. We're looking for a self-motivated and driven individual with a passion for technology risk management who is looking for an exciting role as a technology risk subject matter expert within the second line of defence (2LoD) Chief Risk Office. You will provide expertise, advice … and independent challenge around the Technology risk and control environment and play a crucial role in developing the technology risk strategy to protect Aztec from technology-related threats while enabling business growth and innovation. This role offers the successful candidate extensive opportunities for development and the opportunity to apply their knowledge of technology risk at a senior … level within a financial services environment. Key responsibilities: Development and delivery of Aztec's technology risk strategy in line with the ERMF and the Chief Risk Office roadmap, regulatory requirements and industry best practice, such as COBIT5/ITIL. Ensure that key strategic risks and controls associated with cloud infrastructure, AI, data management, and wider digital transformation are More ❯
Fareham, England, United Kingdom Hybrid / WFH Options
Leidos
to a solution architect and Chief Engineer for developing and delivering the relevant elements of the solution, whilst understanding the whole. You will have a complete understanding of cyber risk and treatment approaches. Based on a strong ability to communicate risk and its proportionate management, you will know how this issue is addressed both in traditional ‘on-premise … cloud environments. You will be required to develop high- and low-level security architecture designs for systems intended for secure/sensitive environments, with appropriate security based on detailed risk analysis. What does Leidos need from me? Due to the sensitive nature of the work, sole British National and DV clearance are a must, along with significant experience in … producing security bid artefacts (such as security responses to PQQ/ITN questions, creation of Project Security Management Plan, System Security Architecture Design, Through Life Security Management Plan, Cyber Risk Assessments) Experience of network and boundary protection technologies (firewalls, mail gateways, load balancers, anti-virus), including cross domain technologies. Experience of authentication and authorisation technologies (SAML, LDAP, PKI, etc More ❯
Operational Analysis Consultant/Operations Analyst – MOD, Defence Salary: £40,000 to £65,000 plus many benefits Location: Portsmouth, Hampshire/Bristol/Corsham, Wiltshire/Hybrid role As an Operational Analysis Consultant, you will be providing the evidence to help the UK MOD and industry make better decisions. Our client is looking for consultants with a range … skills, able to work independently or in small teams. They offer competitive salaries and packages, and the opportunity for rapid advancement for the right candidate. Essential requirements for Operational Analysis Consultant: Operational Analysis to support business decision making, policy development, and/or research, including both ‘soft’ and ‘hard’ techniques (problem structuring and modelling). Development and use … Defence industry. Strong background in MS Office, especially Excel, PowerPoint, Word. Experience in one or more of the following technical disciplines: Process and conceptual mapping (e.g. influence diagrams), Benefits analysis, Business Case Approvals Wargaming, Simulation (System Dynamics or Discrete Event Simulation), Designing and facilitating workshops (including MJPs), Historical Analysis, Knowledge of data manipulation and analysis languages (VBA More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime … experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
Cambridge Credentials
utilities as well as some of the largest energy and water companies in Europe. They provide provide in-depth strategic and technical advice on strategy and business planning and analysis, regulatory finance, corporate finance and corporate financial management, regulatory policy as well as in other areas to help their clients create value for both shareholders and customers. The position … bespoke delivery models — this includes funding models, financing strategy and structures, Government or third party support packages, and State aid/UK subsidy control approval strategy and applications. Market analysis and benchmarking of sector and key players including supply chain and technology. Business case preparation for various stakeholder approvals and grant applications. All aspects of financial advice on major … corporate finance. In depth knowledge and experience of working on major projects. Understanding of key value drivers in projects including policy, regulation, financing, investments, markets etc. Experience in financial analysis using core techniques and methodologies in project finance and corporate finance. Ability to identify and analyse key value drivers for projects. Skilled in financial modelling and complex financial analysis. More ❯
and testing activities, both on-site and in the field Engaging directly with stakeholders to understand complex needs and translate them into technical system designs Contributing to system validation, riskanalysis, and engineering documentation throughout the project lifecycle Supporting internal R&D and shaping future product and platform designs What They're Looking For: A background in systems More ❯
Romsey, England, United Kingdom Hybrid / WFH Options
iO Associates - UK/EU
and testing activities, both on-site and in the field Engaging directly with stakeholders to understand complex needs and translate them into technical system designs Contributing to system validation, riskanalysis, and engineering documentation throughout the project lifecycle Supporting internal R&D and shaping future product and platform designs What They're Looking For: A background in systems More ❯