related to cloud security breaches and misconfigurations. Implement SIEM and security monitoring tools for real-time threat detection. Cloud Security Assessments & Compliance Conduct cloud security assessments, penetration testing, and riskanalysis . Ensure compliance with ISO 27001, NIST, CIS Benchmarks, GDPR , and other security standards. Collaborate with DevOps teams to integrate security into CI/CD pipelines. Security More ❯
or efficiency, of the Cyber Security team, by identifying innovative, problem-solving solutions. Create and maintain appropriate standard operating procedures for the Cyber Security and information protection. Support on Analysis & Planning Activities Identify, respond, predict and analyse security breaches and threats to determine their root cause and report findings to relevant stakeholders on cyber-security threats, attacks, incidents, and … Information Security Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction within mandate Assessment of the organisation's technology risk exposure and measurement of the various parameters that make up technology risks. Support the Design for your area of responsibility Work closely with other stakeholders to design, architect, consult … the desired outcomes and success criteria which is to be the baseline for post project review and benefit realisation validation, as well as measuring positive effects. Contribute to project risk management consulting and technical reviews, drafting mitigation plans and delivering on any actionable items allocated Draft procedures and or policies with regards to cyber security submitting them to the More ❯
core Collections system and processes, and how those systems and processes interact. Perform System Integration and End to End testing. Develop skills required for the production of estimates and riskanalysis (where required). Attend/lead document walkthroughs and reviews of project documentation when required from a testing perspective. Consistently communicate risks and issues to the project More ❯
core Collections system and processes, and how those systems and processes interact. Perform System Integration and End to End testing. Develop skills required for the production of estimates and riskanalysis (where required). Attend/lead document walkthroughs and reviews of project documentation when required from a testing perspective. Consistently communicate risks and issues to the project More ❯
threat modeling, secure coding, design reviews, and architecture assessments. Lead the integration of DevSecOps practices into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual review, and testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. … Requirements: Proven experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies like STRIDE and risk analysis. Hands-on experience with SAST/DAST/IAST tools such as Snyk, SonarQube, Burp Suite, Veracode, etc. Strong understanding of cloud platforms and modern architectures. Relevant certifications More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
the role is to support the activities of the Information Security Department and to become an SME on the following areas of the department: ISO27001, GDPR, PCI/DSS, riskanalysis, and auditing. The analyst will work closely with the Head of Information Security to ensure that the plans and activities of the IS department are completed in … accordance with industry best practices. Key Responsibilities: Perform internal audits of the Information Security Management System. Be actively involved in maintaining/developing the IT Risk register. Support external audits of the Information Security Management System including applying any corrective actions. Support the delivery of Management Review of ISMS and gain agreement from the Board. Work with employees on … similar compliance role. Ability to learn or previous experience of ISO audits including ISO27001. Knowledge of IT Security Products and Services. Developing and maintaining processes and roadmaps for security, risk, and audit programmes. Commercial experience and acumen with the ability to engage C-Level Decision Makers. Negotiation skills to formalize a sales proposition and take it from initial discussion More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
Mean Nothing Without Context): Monitoring our SIEM platform like a hawk with insomnia Responding to EDR alerts and sifting through digital noise to find the signal Triage, incident response, riskanalysis - the full SOC works Digging into vulnerabilities and tracking them until they’re dead or fixed Being the person who knows when something just "looks off" Working … You’ve poked at firewalls, cloud environments, and know what an IDS should and shouldn't be doing You can explain why “it’s probably fine” is a terrible risk assessment Relevant certs? CompTIA Security+, Microsoft, ITIL, whatever makes sense - good to have, not everything The Not-So-Fine Print: You’ll need to travel now and again (we More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
The Medical Protection Society
security. A solid understanding of the cyber security risks linked to different technologies and how to manage them effectively. Working knowledge of security domains, auditing standards and frameworks, and riskanalysis frameworks including ISO 27001, Cyber Essentials, etc Good verbal communication skills, including the ability to present information and communicate clearly with both technical and non-technical team More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Medical Protection Society
security. A solid understanding of the cyber security risks linked to different technologies and how to manage them effectively. Working knowledge of security domains, auditing standards and frameworks, and riskanalysis frameworks including ISO 27001, Cyber Essentials, etc Good verbal communication skills, including the ability to present information and communicate clearly with both technical and non-technical team More ❯
pivotal role in shaping data-driven strategies by building robust models, dashboards, and analytical frameworks that inform executive-level decisions. You'll collaborate closely with senior stakeholders across finance, risk, and technology, translating complex data into actionable insights. Key Responsibilities Develop and maintain advanced data models to support strategic planning, riskanalysis, and financial forecasting. Design and … years of experience in consulting, banking, corporate strategy, or a similar analytical role. Proven ability to work with senior stakeholders and communicate complex ideas clearly. Experience in finance or risk analytics is a plus. Technical Skills: Advanced Excel (including VBA) Power BI and Power Query SQL for data extraction and manipulation Python (preferred but not required) Personal Attributes: Strategic More ❯
pivotal role in shaping data-driven strategies by building robust models, dashboards, and analytical frameworks that inform executive-level decisions. You'll collaborate closely with senior stakeholders across finance, risk, and technology, translating complex data into actionable insights. Key Responsibilities Develop and maintain advanced data models to support strategic planning, riskanalysis, and financial forecasting. Design and … years of experience in consulting, banking, corporate strategy, or a similar analytical role. Proven ability to work with senior stakeholders and communicate complex ideas clearly. Experience in finance or risk analytics is a plus. Technical Skills: Advanced Excel (including VBA) Power BI and Power Query SQL for data extraction and manipulation Python (preferred but not required) Personal Attributes: Strategic More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Harvey Nash
Architect , you’ll embed secure-by-design principles across IT and OT systems, working alongside Solution Architects and a dedicated Cybersecurity team. You’ll guide technical decisions that ensure risk, compliance, and innovation are aligned from day one. ✅ What You’ll Do Define and deliver enterprise-wide security architecture across hybrid cloud, on-prem, and OT environments. Collaborate with … design through to delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threat modelling , riskanalysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with industry standards such as ISO27001, NIS Directive More ❯
through transition and into steady-state delivery Support solution development, in conjunction with Sales, addressing client-specific Strategic Sourcing and Procurement Operations strategy and structure, program costs, gap/riskanalysis and plan to closure Leadership of multiple sub-teams including sourcing, buying, operations, analytics, etc. Successful program implementation and ongoing management, including infrastructure, staffing/resources, documentation … and category management strategy along with execution and savings targets establishment, tracking, calculation, and forecasting Engagement with Project Executive for issues such as for breach, problem resolution, root cause analysis, resource & performance issues, growth demands, etc. Support practice growth through account expansion (i.e., introduction of additional scope areas, emerging technologies, innovations within base scope to unlock value) and new … s Degree Required technical and professional expertise Must have exceptional client-facing and consultative skills and experience Experience in category management and strategic sourcing, tactical buying, procurement operations, contract risk, supplier relationship management, as well as a strong knowledge of major Source-2-Pay applications Extensive sourcing experience is required in at least three (3) of the following indirect More ❯
of core system and processes, and how those systems and processes interact Perform System Integration and End to End testing Develop skills required for the production of estimates and riskanalysis (where required) Attend/lead document walkthroughs and reviews of project documentation when required from a testing perspective Consistently communicate risks and issues to the project team More ❯
Video Interviews held remotely A Private Equity firm are seeking a Machine Learning Engineer to join on an initial 6-month contract to assist in the firms portfolio optimisation, risk management, and predictive modelling. You will be working alongside them through one of our consultancy partners who have recently won the bid for the project. The end point client … is a must. Machine Learning Engineer Key Responsibilities: Use generative AI to build predictive models for market trends, asset valuation, and investment opportunities. Leverage AI algorithms for portfolio optimisation, riskanalysis, and asset allocation strategies. Automate data extraction and analysis from financial reports, news, and alternative data sources to support investment decisions. Use AI to simulate different More ❯
solutions. - You will be understanding and negotiating terms of contracts with developers, contractors and consultants representing AWS' interests. Daily tasks may be comprised of site validation, due diligence and riskanalysis, design management, contract/lease and cost negotiations, stakeholder and vendor management. - You will act as the primary escalation point for the evaluation of the feasibility of … solutions. You will be understanding and negotiating terms of contracts with developers, contractors and consultants representing AWS' interests. Daily tasks may be comprised of site validation, due diligence and riskanalysis, design management, contract/lease and cost negotiations, stakeholder and vendor management. You will act as the primary escalation point for the evaluation of the feasibility of More ❯
on delivering impactful clean energy solutions across the US. Responsibilities: Lead development of solar and BESS projects from greenfield through to NTP Coordinate site screening, feasibility studies, and interconnection analysis with a focus on MISO markets Manage permitting, environmental assessments, and stakeholder relationships Build and maintain accurate project schedules, budgets, and risk analyses Collaborate with internal technical, legal More ❯
chain. On top of that, we will promote the launch of new service operations while cooperating with each warehouse and transportation operation team, engineering team, and system development team. ■RiskAnalysis/Data Analysis In business, we analyze warehouse functions necessary for the future and propose changes in operations and service specifications. In addition, capacity analysis … and the introduction of engineering equipment. In project promotion, it is expected that they will go through a series of processes of defining issues, designing metrics and KPIs, data analysis, and execution to measure results, and work on solving issues. Also, when a problem occurs, it is necessary to work on problem analysis, accumulate data and facts, and More ❯