National Association of Mutual Insurance Companies
through a worldwide client-focused team. ÂDescription: An exciting opportunity has arisen for an Application Technology Auditor to join our growing team primarily focussed on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead, as an Auditor-in-Charge, and execute the audit delivery lifecycle as a team member on audit assignments in accordance with Internal … FTP, NDM, MQ, etc.), application controls (SoD, edit/check validation, calculations, etc.), and output controls (C&A). Demonstrates understanding of businesses, processes, including applications, through flowcharting, workpapers, analysis, issue identification and discussions with project leaders and auditees on projects of varying complexity. Has strong understanding of audit, businesses, financial controls, regulations, or technology and actively seeks to … and colleagues in Audit to understand the underlying processes and procedures necessary to evaluate the risks and controls. Performs research independently and has adequate knowledge of statistical sampling and riskanalysis to perform research with technical accuracy. Engages in Continuous Monitoring activities. Uses knowledge of financial institutions and all applicable regulatory requirements. Demonstrates skills through advanced analysisMore ❯
through a worldwide client-focused team. Description: An exciting opportunity has arisen for an Application Technology Auditor to join our growing team primarily focussed on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead, as an Auditor-in-Charge, and execute the audit delivery lifecycle as a team member on audit assignments in accordance with Internal … FTP, NDM, MQ, etc.), application controls (SoD, edit/check validation, calculations, etc.), and output controls (C&A). Demonstrates understanding of businesses, processes, including applications, through flowcharting, workpapers, analysis, issue identification and discussions with project leaders and auditees on projects of varying complexity. Has strong understanding of audit, businesses, financial controls, regulations, or technology and actively seeks to … and colleagues in Audit to understand the underlying processes and procedures necessary to evaluate the risks and controls. Performs research independently and has adequate knowledge of statistical sampling and riskanalysis to perform research with technical accuracy. Engages in Continuous Monitoring activities. Uses knowledge of financial institutions and all applicable regulatory requirements. Demonstrates skills through advanced analysisMore ❯
through a worldwide client-focused team. Description: An exciting opportunity has arisen for an Application Technology Auditor to join our growing team primarily focussed on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead, as an Auditor-in-Charge, and execute the audit delivery lifecycle as a team member on audit assignments in accordance with Internal … FTP, NDM, MQ, etc.), application controls (SoD, edit/check validation, calculations, etc.), and output controls (C&A). Demonstrates understanding of businesses, processes, including applications, through flowcharting, workpapers, analysis, issue identification and discussions with project leaders and auditees on projects of varying complexity. Has strong understanding of audit, businesses, financial controls, regulations, or technology and actively seeks to … and colleagues in Audit to understand the underlying processes and procedures necessary to evaluate the risks and controls. Performs research independently and has adequate knowledge of statistical sampling and riskanalysis to perform research with technical accuracy. Engages in Continuous Monitoring activities. Uses knowledge of financial institutions and all applicable regulatory requirements. Demonstrates skills through advanced analysisMore ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. More ❯
and treasury services for institutions, corporations, and high-net-worth individuals. Description: We are seeking an Application Technology Auditor to join our team, focusing on technology supporting Finance and Risk & Compliance processes. The successful candidate will serve as an Auditor-in-Charge, leading audit delivery in accordance with internal policies and standards. The role involves assessing application input, processing … and documentation of automated controls and processes, including interface testing (ODBC, FTP, NDM, MQ), application controls (Segregation of Duties, validation, calculations), and output controls. Understand business processes through flowcharting, analysis, and discussion with stakeholders. Apply knowledge of audits, financial controls, regulations, and technology to identify issues and risks. Engage in research, statistical sampling, and riskanalysis with … and training to less experienced team members, demonstrating leadership. Experience & Qualification: Degree in Accounting, Finance, MIS, Computer Science, Mathematics, or related fields. Relevant work experience, preferably in Audit or Risk focusing on Applications. Strong analytical, critical thinking, and problem-solving skills. BNY Mellon is an Equal Employment Opportunity/Affirmative Action Employer, committed to diversity and inclusion, supporting wellbeing More ❯
and treasury services for institutions, corporations, and high-net-worth individuals. Description: We are seeking an Application Technology Auditor to join our team, focusing on technology supporting Finance and Risk & Compliance processes. The successful candidate will serve as an Auditor-in-Charge, leading audit delivery in accordance with internal policies and standards. The role involves assessing application input, processing … and documentation of automated controls and processes, including interface testing (ODBC, FTP, NDM, MQ), application controls (Segregation of Duties, validation, calculations), and output controls. Understand business processes through flowcharting, analysis, and discussion with stakeholders. Apply knowledge of audits, financial controls, regulations, and technology to identify issues and risks. Engage in research, statistical sampling, and riskanalysis with … and training to less experienced team members, demonstrating leadership. Experience & Qualification: Degree in Accounting, Finance, MIS, Computer Science, Mathematics, or related fields. Relevant work experience, preferably in Audit or Risk focusing on Applications. Strong analytical, critical thinking, and problem-solving skills. BNY Mellon is an Equal Employment Opportunity/Affirmative Action Employer, committed to diversity and inclusion, supporting wellbeing More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
to actual penetration attempts by malicious parties. The Security Operations Analyst must be comfortable working as part of a rotating shift pattern. What will you be doing? Perform forensic analysis and gather evidence, correlation monitoring using multiple SIEM technologies. Conduct security assessments regularly to identify vulnerabilities and perform riskanalysis, analysing breaches to reach the root cause. … security strength of third-party vendors and collaborate with them. Monitor security infrastructure, identifying and reporting real-time attacks and vulnerabilities on the client network. Identify incidents and conduct analysis to determine severity and required responses, ensuring incidents are correctly reported and documented. Provide a Technical Escalation Point during security incidents, establishing the extent of an attack and advising More ❯
business acumen and leadership. They shape and define solution architectures for our clients which are used to lead the delivery, define project plans, manage the detailed design, inform technical riskanalysis and support estimation. They work with a client from the earliest stages of a project (potentially in a presales capacity) through to delivery and ‘go live’. More ❯
Stockport, Lancashire, United Kingdom Hybrid / WFH Options
zyncgroup.io
requirements. In this role you will be responsible for: Developing and formulatingsecurity concepts Establishment, development and implementation of information security management systems (ISMS) Coordinatingthe deployment of protective measures Conducting risk analyses This role is remote from anywhere in Germany with travel to client site. Essential: Several years experience workingwithISMS - including developing from scratch Experience with two or more of More ❯
Reporting to the Chief Architect and Project Managers the candidate will be responsible for Technical Architectural choices and decisions. Applicants must be able to analyse, audit, and carry out risk analysis. In the design phase the applicant would be responsible for the infrastructure and technical designs. Experience & Skillset A minimum of 3 years as a Technical Architect Experience using More ❯
for institutions, corporations, and high-net-worth individuals. Description: An exciting opportunity has arisen for an Application Technology Auditor to join our team, focusing on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead audit engagements as an Auditor-in-Charge, executing the audit lifecycle in accordance with internal policies, methodologies, and standards. The role involves … controls and processes, including interface testing (ODBC, FTP, NDM, MQ), application controls (Segregation of Duties, validation, calculations), and output controls (C&A). Understand business processes through flowcharting, workpapers, analysis, and discussions with stakeholders. Apply knowledge of audits, financial controls, regulations, and technology to identify risks and educate the audit team. Query stakeholders to understand processes and controls. Perform … research and utilize statistical sampling and riskanalysis skills. Engage in continuous monitoring activities, applying knowledge of financial institutions and regulations. Analyze business processes and issues, and communicate findings effectively. Build relationships with team members and clients, explaining audit processes and findings clearly. Identify and escalate potential issues promptly. Explain complex technical issues to non-technical audiences and More ❯
pivotal role in shaping data-driven strategies by building robust models, dashboards, and analytical frameworks that inform executive-level decisions. You'll collaborate closely with senior stakeholders across finance, risk, and technology, translating complex data into actionable insights. Job Responsibilities/Objectives Develop and maintain advanced data models to support strategic planning, riskanalysis, and financial forecasting. … the following: Experience in consulting, banking, corporate strategy, or a similar analytical role. Proven ability to work with senior stakeholders and communicate complex ideas clearly. Experience in finance or risk analytics is a plus. Advanced Excel (including VBA) Power BI and Power Query SQL for data extraction and manipulation Python (preferred but not required) If you are interested in More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
UK Home Office
Lead plays a critical role in the success of the Cyber Security Operations Centre (CSOC) by overseeing all threat intelligence activities. This includes defining intelligence requirements, managing collection and analysis, and ensuring timely dissemination of insights. The role supports protective monitoring, contributes to incident response, and leads the development of team members through line management and professional development. As … today responsibilities will be to: Lead the delivery of cyber threat intelligence processes, ensuring outputs align with organisational policies and effectively communicate findings. Analyse complex threat intelligence to assess risk, prioritise vulnerabilities, and inform strategic mitigation efforts. Define tools and policies to assess the threat landscape and advise on risk reduction strategies. Maintain and enhance the Threat Intelligence … vulnerability management team with expert guidance. You’ll bring a strong interest in threat intelligence and demonstrate experience in: Operating within a Security Operations Centre (SOC), including threat and risk analysis. Leading technical responses to cyber incidents and collaborating across vulnerability management, threat hunting, and monitoring teams. Using platforms such as SIEM, EDR, and threat intelligence tools to support More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Smart DCC
The Cyber Security Engineer will be focused on developing and maintaining the technology and capabilities we have deployed. What will you be doing? Establishing relationships with key stakeholders in Risk, Technology and Operations, as well as establishing yourself as a SME for Cyber Security within the organisation. Working very closely and building strong relationships with our Service Providers. Run … to others on analysing data trends for use in security use cases to guide the development of the Security toolset. Conduct security assessments regularly to identify vulnerabilities and perform risk analysis. Create artificial intelligence algorithms that identify potential patterns or indicators of compromise in security logs, to be used in the defence of the environment. What are we looking More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Maxwell Bond
WebDriver. All their work is cloud-first utilizing Azure. You're experienced working in an agile team with activities such as creating test scenarios, UI testing, test cases, applying riskanalysis, and coordinating test efforts within the team Importantly you'll be a highly adaptable team player! Able to problem-solve on multiple projects whilst gaining great experience. More ❯
with business teams, internal controls, and IT access management. Assist end-users and business collaborators with access-related questions, ensuring a positive customer experience. Support role assignments, approvals, and riskanalysis in SAP GRC Access Control. Perform routine checks and monitoring of SAP access controls and segregation of duties. Document SOPs and knowledge articles for recurring issues and More ❯