Saturn House, Knowsley Business Park, Liverpool, England
MERSEY CARE NHS FOUNDATION TRUST
and the wider Trust. You will learn how to maintain knowledge of information and cyber security. To research information and cyber security to evaluate risk and provide advice and guidance. Liaising with suppliers and senior Cyber Security Officers to create security assessments, report findings and make recommendations. Learn about … the Cyber Assessment Framework (CAF). You will learn the principles of security assessments as well as the different methodologies and approaches to analysing risk, scoring risk and providing assurance to key stakeholders. How to develop security policy and process will also be taught. The role will also … Those focused on the technical side will work on areas such as security design and architecture, security testing, investigations & response. Those focused on the riskanalysis side will work on areas such as operations, risk, governance and compliance. The primary role of a Cyber Security Analyst Apprentice More ❯
Salford, Manchester, United Kingdom Hybrid / WFH Options
Inspire People
engagement for all projects ensuring that the department's security design standards are adhered to. This challenging role incorporates aspects of security architecture, cyber risk management and cyber security policy. As a Principal Security Architect, you will also provide an 'out-reach' to advise on security requirements and solutions … for exploiting emerging technologies and support the development of architectures, patterns and approaches to support their safe use in accordance with the department's risk appetites. At all times your goal is to help ensure delivery of systems that meet the desired business outcomes with security decisions and controls … being proportionate to the risk appetite. You will build effective partnerships with diverse teams across multiple locations and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (National Cyber Security More ❯
delivery of facility requirements needed to deliver technology readiness projects including the facilities to support the end product verification and validation activities Undertaking technical riskanalysis and developing risk mitigation plans in support of equipment delivery into the SSNA platform Supporting the development and resilience planning for …/electrical machine design) e.g. MSc(Eng)/MPhil(Eng)/PhD/EngD Knowledge of permanent magnet rotating machines Knowledge of Power System Analysis of AC and DC systems and modelling of Generation and control: Generators, AVRs, Govenors/Speed controllers Knowledge of the interface requirements of power More ❯
team. Description: An exciting opportunity has arisen for an Application Technology Auditor to join our growing team primarily focussed on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead, as an Auditor-in-Charge, and execute the audit delivery lifecycle as a team member on audit … controls (SoD, edit/check validation, calculations, etc.), and output controls (C&A). Demonstrates understanding of businesses, processes, including applications, through flowcharting, workpapers, analysis, issue identification and discussions with project leaders and auditees on projects of varying complexity. Has strong understanding of audit, businesses, financial controls, regulations, or … understand the underlying processes and procedures necessary to evaluate the risks and controls. Performs research independently and has adequate knowledge of statistical sampling and riskanalysis to perform research with technical accuracy. Engages in Continuous Monitoring activities. Uses knowledge of financial institutions and all applicable regulatory requirements. Demonstrates More ❯
Hands-on experience with security monitoring and incident response technologies such as SIEM, IDS and EDR. Experience with vulnerability assessment including practical assessments for risk analysis. A strong working knowledge of at least one major operating system (Windows, Linux, or MacOS). An understanding of how identity, network, and More ❯
Warrington, Cheshire, United Kingdom Hybrid / WFH Options
Amentum
Promptly responding to all security incidents and providing thorough post-event analyses. And to a lesser extent: Conducting security assessments through vulnerability testing and risk analysis. Generate reports for both technical and non-technical staff and stakeholders. Undertake review of security controls and their configurations, recommending and implementing enhancements More ❯
Teams: Work closely with product owners, operations teams, and security engineers to document and uphold security artefacts in alignment with policies and best practises. RiskAnalysis and Mitigation: Assess risks associated with processes, software, and hardware artefacts, implementing robust security measures. Staying Ahead of Trends: Keep abreast of … audiences. Direction & Decision Making: Provide guidance to security product owners, defining the direction for security technology solutions. Key Technologies You'll Work With: Governance, Risk, and Compliance (GRC) Endpoint Protection (e.g., Sentinel One, Microsoft Defender) Identity Access Management (e.g., Ping, SailPoint) Network Security Solutions (e.g., Akamai, F5) Cloud Security More ❯
best practices relating to IT/Operational Technology and adapting and tailoring where required to ensure a secure and compliant estate commensurate to the risk Advising and supporting engineers in the secure operation, ensuring that the business IT/Operational Technology estate is both protected and enabled to deliver … maintenance and updates are applied appropriately to ensure that the capability is safe and secure throughout the IT/Operational Technology lifecycle Undertaking ongoing riskanalysis and assurance accreditation roles specific to the domain Manage the application of appropriate security controls in line with best practices and security More ❯
/maintain the quality of products and processes. Prepare and provide product assurance documentation as required by customer programs. Perform relevant audits and product riskanalysis as when required. Manage and maintain all documents, both physical and electronic, in a systematic and organized manner as per the business More ❯
for automatic deployment of patches and updates. Produce and maintain technical documentation and knowledge articles. Participate in Change Approval processes, providing written documentation including riskanalysis, technical implement steps and roll back plans. To be successful in this role you will need: Windows Server 2003 to 2022 Veeam More ❯
covering aspects of both SHE (Safety, Health and Environment) and Product Safety Your skills and experiences: Essential: Experience in complex programme integration Programme schedule riskanalysis experience Proven skills in managing complexity across a customer/partner environment Desirable: Typhoon or Defence programme experience Experience of working with More ❯