related to cloud security breaches and misconfigurations. Implement SIEM and security monitoring tools for real-time threat detection. Cloud Security Assessments & Compliance Conduct cloud security assessments, penetration testing, and riskanalysis . Ensure compliance with ISO 27001, NIST, CIS Benchmarks, GDPR , and other security standards. Collaborate with DevOps teams to integrate security into CI/CD pipelines. Security More ❯
or efficiency, of the Cyber Security team, by identifying innovative, problem-solving solutions. Create and maintain appropriate standard operating procedures for the Cyber Security and information protection. Support on Analysis & Planning Activities Identify, respond, predict and analyse security breaches and threats to determine their root cause and report findings to relevant stakeholders on cyber-security threats, attacks, incidents, and … Information Security Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction within mandate Assessment of the organisation's technology risk exposure and measurement of the various parameters that make up technology risks. Support the Design for your area of responsibility Work closely with other stakeholders to design, architect, consult … the desired outcomes and success criteria which is to be the baseline for post project review and benefit realisation validation, as well as measuring positive effects. Contribute to project risk management consulting and technical reviews, drafting mitigation plans and delivering on any actionable items allocated Draft procedures and or policies with regards to cyber security submitting them to the More ❯
Improve SOC processes, including incident response, threat hunting, and vulnerability management. Demonstrate expert understanding of security concepts and apply them to a technical level, at the highest levels of risk and customer complexity. Influence and challenge clients to define clear outcomes and problem statements, from which to design appropriate solutions and opportunities. Effectively translate and accurately communicate security and … risk implications at the most senior client levels, across technical and non-technical stakeholders. Manage stakeholder expectations across high risk and complexity or under constrained timescales. Identify new technology opportunities and design the use of these to meet customer needs and pain points. Provide mentorship across delivery team members, operating as an escalation expert for both internal and … client facing issues. Designing, developing, and continuously improving vulnerability assessment, security testing, and riskanalysis methods. Designing, developing, and continuously improving the security posture, effectiveness and efficiency of the company's products and services Providing developers with remediation guidance and advice Designing, developing, and continuously improving security operations Recommending and providing technical leadership for the implementation of security More ❯
core Collections system and processes, and how those systems and processes interact. Perform System Integration and End to End testing. Develop skills required for the production of estimates and riskanalysis (where required). Attend/lead document walkthroughs and reviews of project documentation when required from a testing perspective. Consistently communicate risks and issues to the project More ❯
core Collections system and processes, and how those systems and processes interact. Perform System Integration and End to End testing. Develop skills required for the production of estimates and riskanalysis (where required). Attend/lead document walkthroughs and reviews of project documentation when required from a testing perspective. Consistently communicate risks and issues to the project More ❯
National Association of Mutual Insurance Companies
through a worldwide client-focused team. ÂDescription: An exciting opportunity has arisen for an Application Technology Auditor to join our growing team primarily focussed on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead, as an Auditor-in-Charge, and execute the audit delivery lifecycle as a team member on audit assignments in accordance with Internal … FTP, NDM, MQ, etc.), application controls (SoD, edit/check validation, calculations, etc.), and output controls (C&A). Demonstrates understanding of businesses, processes, including applications, through flowcharting, workpapers, analysis, issue identification and discussions with project leaders and auditees on projects of varying complexity. Has strong understanding of audit, businesses, financial controls, regulations, or technology and actively seeks to … and colleagues in Audit to understand the underlying processes and procedures necessary to evaluate the risks and controls. Performs research independently and has adequate knowledge of statistical sampling and riskanalysis to perform research with technical accuracy. Engages in Continuous Monitoring activities. Uses knowledge of financial institutions and all applicable regulatory requirements. Demonstrates skills through advanced analysisMore ❯
through a worldwide client-focused team. Description: An exciting opportunity has arisen for an Application Technology Auditor to join our growing team primarily focussed on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead, as an Auditor-in-Charge, and execute the audit delivery lifecycle as a team member on audit assignments in accordance with Internal … FTP, NDM, MQ, etc.), application controls (SoD, edit/check validation, calculations, etc.), and output controls (C&A). Demonstrates understanding of businesses, processes, including applications, through flowcharting, workpapers, analysis, issue identification and discussions with project leaders and auditees on projects of varying complexity. Has strong understanding of audit, businesses, financial controls, regulations, or technology and actively seeks to … and colleagues in Audit to understand the underlying processes and procedures necessary to evaluate the risks and controls. Performs research independently and has adequate knowledge of statistical sampling and riskanalysis to perform research with technical accuracy. Engages in Continuous Monitoring activities. Uses knowledge of financial institutions and all applicable regulatory requirements. Demonstrates skills through advanced analysisMore ❯
through a worldwide client-focused team. Description: An exciting opportunity has arisen for an Application Technology Auditor to join our growing team primarily focussed on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead, as an Auditor-in-Charge, and execute the audit delivery lifecycle as a team member on audit assignments in accordance with Internal … FTP, NDM, MQ, etc.), application controls (SoD, edit/check validation, calculations, etc.), and output controls (C&A). Demonstrates understanding of businesses, processes, including applications, through flowcharting, workpapers, analysis, issue identification and discussions with project leaders and auditees on projects of varying complexity. Has strong understanding of audit, businesses, financial controls, regulations, or technology and actively seeks to … and colleagues in Audit to understand the underlying processes and procedures necessary to evaluate the risks and controls. Performs research independently and has adequate knowledge of statistical sampling and riskanalysis to perform research with technical accuracy. Engages in Continuous Monitoring activities. Uses knowledge of financial institutions and all applicable regulatory requirements. Demonstrates skills through advanced analysisMore ❯
threat modeling, secure coding, design reviews, and architecture assessments. Lead the integration of DevSecOps practices into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual review, and testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. … Requirements: Proven experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies like STRIDE and risk analysis. Hands-on experience with SAST/DAST/IAST tools such as Snyk, SonarQube, Burp Suite, Veracode, etc. Strong understanding of cloud platforms and modern architectures. Relevant certifications More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities via static/dynamic analysis, manual review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime … Proven experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies such as STRIDE and risk analysis. Experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant certifications such More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
the role is to support the activities of the Information Security Department and to become an SME on the following areas of the department: ISO27001, GDPR, PCI/DSS, riskanalysis, and auditing. The analyst will work closely with the Head of Information Security to ensure that the plans and activities of the IS department are completed in … accordance with industry best practices. Key Responsibilities: Perform internal audits of the Information Security Management System. Be actively involved in maintaining/developing the IT Risk register. Support external audits of the Information Security Management System including applying any corrective actions. Support the delivery of Management Review of ISMS and gain agreement from the Board. Work with employees on … similar compliance role. Ability to learn or previous experience of ISO audits including ISO27001. Knowledge of IT Security Products and Services. Developing and maintaining processes and roadmaps for security, risk, and audit programmes. Commercial experience and acumen with the ability to engage C-Level Decision Makers. Negotiation skills to formalize a sales proposition and take it from initial discussion More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
Mean Nothing Without Context): Monitoring our SIEM platform like a hawk with insomnia Responding to EDR alerts and sifting through digital noise to find the signal Triage, incident response, riskanalysis - the full SOC works Digging into vulnerabilities and tracking them until they’re dead or fixed Being the person who knows when something just "looks off" Working … You’ve poked at firewalls, cloud environments, and know what an IDS should and shouldn't be doing You can explain why “it’s probably fine” is a terrible risk assessment Relevant certs? CompTIA Security+, Microsoft, ITIL, whatever makes sense - good to have, not everything The Not-So-Fine Print: You’ll need to travel now and again (we More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Agoda
impact. Harnessing our innovative technologies and strong partnerships, we aim to make travel easy and rewarding for everyone. Get to Know our Team: The Security Department oversees security, governance, risk management, and compliance, and security operations for all Agoda. We are vigilant in ensuring there is no breach or vulnerability threatening our company or endangering our employees to keep … findings from multiple tools and work with hundreds of teams to get them remediated within the right SLA Conduct security assessments through code reviews, vulnerability assessments, penetration testing and riskanalysis Research on the negative effects of a vulnerability, from minimizing the impact to altering security controls for future prevention Identify potential threats so that the organization can More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
The Medical Protection Society
security. A solid understanding of the cyber security risks linked to different technologies and how to manage them effectively. Working knowledge of security domains, auditing standards and frameworks, and riskanalysis frameworks including ISO 27001, Cyber Essentials, etc Good verbal communication skills, including the ability to present information and communicate clearly with both technical and non-technical team More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Medical Protection Society
security. A solid understanding of the cyber security risks linked to different technologies and how to manage them effectively. Working knowledge of security domains, auditing standards and frameworks, and riskanalysis frameworks including ISO 27001, Cyber Essentials, etc Good verbal communication skills, including the ability to present information and communicate clearly with both technical and non-technical team More ❯
and treasury services for institutions, corporations, and high-net-worth individuals. Description: We are seeking an Application Technology Auditor to join our team, focusing on technology supporting Finance and Risk & Compliance processes. The successful candidate will serve as an Auditor-in-Charge, leading audit delivery in accordance with internal policies and standards. The role involves assessing application input, processing … and documentation of automated controls and processes, including interface testing (ODBC, FTP, NDM, MQ), application controls (Segregation of Duties, validation, calculations), and output controls. Understand business processes through flowcharting, analysis, and discussion with stakeholders. Apply knowledge of audits, financial controls, regulations, and technology to identify issues and risks. Engage in research, statistical sampling, and riskanalysis with … and training to less experienced team members, demonstrating leadership. Experience & Qualification: Degree in Accounting, Finance, MIS, Computer Science, Mathematics, or related fields. Relevant work experience, preferably in Audit or Risk focusing on Applications. Strong analytical, critical thinking, and problem-solving skills. BNY Mellon is an Equal Employment Opportunity/Affirmative Action Employer, committed to diversity and inclusion, supporting wellbeing More ❯
and treasury services for institutions, corporations, and high-net-worth individuals. Description: We are seeking an Application Technology Auditor to join our team, focusing on technology supporting Finance and Risk & Compliance processes. The successful candidate will serve as an Auditor-in-Charge, leading audit delivery in accordance with internal policies and standards. The role involves assessing application input, processing … and documentation of automated controls and processes, including interface testing (ODBC, FTP, NDM, MQ), application controls (Segregation of Duties, validation, calculations), and output controls. Understand business processes through flowcharting, analysis, and discussion with stakeholders. Apply knowledge of audits, financial controls, regulations, and technology to identify issues and risks. Engage in research, statistical sampling, and riskanalysis with … and training to less experienced team members, demonstrating leadership. Experience & Qualification: Degree in Accounting, Finance, MIS, Computer Science, Mathematics, or related fields. Relevant work experience, preferably in Audit or Risk focusing on Applications. Strong analytical, critical thinking, and problem-solving skills. BNY Mellon is an Equal Employment Opportunity/Affirmative Action Employer, committed to diversity and inclusion, supporting wellbeing More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
pivotal role in shaping data-driven strategies by building robust models, dashboards, and analytical frameworks that inform executive-level decisions. You'll collaborate closely with senior stakeholders across finance, risk, and technology, translating complex data into actionable insights. Key Responsibilities Develop and maintain advanced data models to support strategic planning, riskanalysis, and financial forecasting. Design and … years of experience in consulting, banking, corporate strategy, or a similar analytical role. Proven ability to work with senior stakeholders and communicate complex ideas clearly. Experience in finance or risk analytics is a plus. Technical Skills: Advanced Excel (including VBA) Power BI and Power Query SQL for data extraction and manipulation Python (preferred but not required) Personal Attributes: Strategic More ❯