Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
five shared values lead every decision wemake and action we take, guiding us to deliver impact how and where it mattersmost . Connect to your opportunity The Technical Cyber RiskAssessment Manager will be responsible for the following: Develop an understanding of Deloitte's global line of business and its priorities, becoming an advocate for addressing cyber risk. … Demonstrate familiarity with the Three Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security … reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
five shared values lead every decision wemake and action we take, guiding us to deliver impact how and where it mattersmost . Connect to your opportunity The Technical Cyber RiskAssessment Manager will be responsible for the following: Develop an understanding of Deloitte's global line of business and its priorities, becoming an advocate for addressing cyber risk. … Demonstrate familiarity with the Three Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security … reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Sycurio
driving the attainment and maintenance of the ISO27001, PCI-DSS, and SOC2 compliance. They are the subject matter expert on all things regarding security and compliance, owning the information risk management processes. They are the thought leader on all matters within the security and compliance domain such that the company remains secure against the ever-changing security threat and … external auditors to achieve positive outcomes. Expert in information security with strong communication and stakeholder management skills. Experience in managing security incidents and leading incident response. Experience with security assessment tools and vulnerability management. Strong vendor management and third-party riskassessment experience. Skills: Strong understanding of cloud security principles and best practices, particularly in AWS. Solid More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
an experienced professional to work with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the defined policies … are maintained To succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including riskassessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of network infrastructure, including routers More ❯
advocate internal and external policy to shape the development of new laws and regulations consistent with company objectives. Develop and implement a compliance monitoring system. Coordinate a company-wide riskassessment process to identify potential risks and control solutions. Monitor actions to identify emerging risks and close gaps. Create internal partnerships with key stakeholders to influence and align … expertise, processes and networks together to solve the post-trade challenges of global financial markets. OSTTRA operates cross-asset post-trade processing networks, providing a proven suite of Credit Risk, Trade Workflow and Optimisation services. Together these solutions streamline post-trade workflows, enabling firms to connect to counterparties and utilities, manage credit risk, reduce operational risk and More ❯
TN1, Royal Tunbridge Wells, Kent, United Kingdom Hybrid / WFH Options
Town & Country Housing Group
Excellent problem-solving, analytical, and decision-making abilities. *Ability to manage multiple projects in a fast-paced environment. *Detail-oriented with strong organizational and time management skills. *Proficiency in riskassessment and conflict resolution. *Adaptability to new technologies and evolving business requirements. *Strong negotiation and influencing skills. Required Behaviours *Ability to support the strategic vision and goals of More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
Wireless Logic Group
PE-backed group Treasury Management Systems (TMS): Demonstrable ability to personally manage operational treasury responsibilities Financial Modeling: Advanced skills in financial modeling, including cash flow forecasting, investment analysis, and risk assessment. Data Analysis & Visualization: Ability to analyze large datasets, identify trends, and create insightful reports using tools like Excel, and potentially PowerBI, or Tableau. Advanced Excel skills essential Foreign … Exchange (FX) Management: Knowledge of FX trading platforms and risk management tools. Debt Management: Experience with debt management systems and tools. Highly Self-Sufficient - thrives in a standalone role with full ownership Strong Communicator: Communicates clearly and confidently with senior stakeholders Banking Platforms: Experience with online banking platforms and electronic funds transfer systems. What Will Make You Shine at More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
following: Shape the development of technology control management including scoping, development of and testing ServiceNow tools for ITRM processes in DT to allow for an effective, efficient and adaptable risk governance capability and contribute to its continuous improvement. Direct control development across DT, driving a consistent approach utilising the IRM capabilities within ServiceNow. Deliver the DT control library architecture … and control data management. Secure commitment from member firms and stakeholders in the global firm to participate in the Technology Standards and Maturity Assessment with the objective to assess the member firm's overall IT capability/maturity and to help them establish their own priorities. Keep abreast of new and emerging technologies being deployed and ensure riskassessment processes are appropriately applied and advise on decisions with technology risk impacts as new activities and other change management/transformational initiatives. Leverage available technical resources/tools to research; expand technology risk knowledge to enhance work product, to remain up to date on member firms and line of businesses hot topics while sharing the More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
following: Shape the development of technology control management including scoping, development of and testing ServiceNow tools for ITRM processes in DT to allow for an effective, efficient and adaptable risk governance capability and contribute to its continuous improvement. Direct control development across DT, driving a consistent approach utilising the IRM capabilities within ServiceNow. Deliver the DT control library architecture … and control data management. Secure commitment from member firms and stakeholders in the global firm to participate in the Technology Standards and Maturity Assessment with the objective to assess the member firm's overall IT capability/maturity and to help them establish their own priorities. Keep abreast of new and emerging technologies being deployed and ensure riskassessment processes are appropriately applied and advise on decisions with technology risk impacts as new activities and other change management/transformational initiatives. Leverage available technical resources/tools to research; expand technology risk knowledge to enhance work product, to remain up to date on member firms and line of businesses hot topics while sharing the More ❯
the role Manage commercial activities for complex multi-domain bids. In a support role to sales, create structure and negotiate commercial and financial structure of bids with minimal residual risk, to address customer needs as well as Orange Business financial and business objective, in conjunction with policy requirements. Key accountabilities Advisor with significant experience and ability to support structuring … presentations to internal and external executives. In support of Sales, and in coordination with Legal, Finance and Solutions teams, create, structure and negotiate (internally and externally) commercial, financial and risk structure of bids from qualification through to customer proposal submission, negotiation and contract signature. In support of commercial structure inclusive of: Customer & Opportunity discovery & assessment including due diligence … flow-up; Heads of Agreements/MOU/LOI ; Technology refresh; Termination & termination liability; Penalties and liabilities; Governance model; Migration planning; Change management Key result/decision areas (outcomes) Risk is understood and mitigated through design and negotiation of business terms and conditions, and linked to the business case. Clearly presented overview of pricing and commercial terms to customers More ❯
rota Key skills for the Senior Information Security Analyst: Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerability management, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid understanding of riskassessment frameworks and methodologies Strong communication More ❯
rota Key skills for the Senior Information Security Analyst: Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerability management, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid understanding of riskassessment frameworks and methodologies Strong communication More ❯
Redhill, Surrey, United Kingdom Hybrid / WFH Options
FPSG
effective security solutions Provide advisory and consultancy services to ensure achievement of business goals Provide oversight to secure solutions that are scalable and portable across the business Support security riskassessment and problem mitigation Deliver technical consultancy on 3rd party and vendor involvement Build up expertise in a range of subject matter areas Champion future proofing and threat … functions such as Security Architect, Security Project Lead, Security Technical expert, DevSecOps A technical breadth to include enterprise, distributed systems and cloud technologies. Strong practical understanding of Information Security risk management processes and best practice Advanced communication and interpersonal skills, including the ability to negotiate and resolve conflict, and to engage effectively with a mixed technical, non-technical and … Strong demonstrable stakeholder management skills, (internal and external) Desirable to hold security certification such as CISSP, CISM Desirable to hold PenTest certification such as CEH, GIAC Desirable to understand risk driven architecture such as Sherwood/SABSA/SANS Highly desirable to have exposure to DevSecOps functions. Please note: This role requires you to be onsite 3 days a More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
National Grid plc
blend of office and home working. Key Accountabilities Security Architecture Design: Develop and maintain the company's security architecture, ensuring it aligns with industry best practices and regulatory requirements. RiskAssessment: Conduct thorough risk assessments to identify potential vulnerabilities and implement appropriate mitigation strategies. Compliance: Ensure that all security protocols comply with relevant laws, standards, and regulations … cyber security Strong Cloud knowledge and demonstrable experience - (Azure) Relevant cyber security qualification(s), for example Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC) - CISSP preferred. Must possess expertise in one or more of the following key areas: Networking: Understand fundamental networking principles, potential attack vectors, and applicable More ❯
Sindlesham, Berkshire, United Kingdom Hybrid / WFH Options
National Grid plc
blend of office and home working. Key Accountabilities Security Architecture Design: Develop and maintain the company's security architecture, ensuring it aligns with industry best practices and regulatory requirements. RiskAssessment: Conduct thorough risk assessments to identify potential vulnerabilities and implement appropriate mitigation strategies. Compliance: Ensure that all security protocols comply with relevant laws, standards, and regulations … cyber security Strong Cloud knowledge and demonstrable experience - (Azure) Relevant cyber security qualification(s), for example Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC) - CISSP preferred. Must possess expertise in one or more of the following key areas: Networking: Understand fundamental networking principles, potential attack vectors, and applicable More ❯
Role Overview: We are seeking two highly skilled Security Risk Assessors to join our Information Security team. The ideal candidates will be responsible for maintaining and executing a robust security riskassessment program, ensuring alignment with internal policies and external regulations. This role plays a vital part in identifying, evaluating, and mitigating risks to critical assets and … third-party services. Key Responsibilities: Maintain and enhance the Security RiskAssessment Framework, procedures, and workflows. Manage and update security questionnaires to ensure alignment with applicable policies, standards, and regulatory requirements. Conduct risk assessments for internal assets and third-party vendors. Evaluate inherent and residual risk across various systems and services. Produce technical written reports detailing … assessment results, control gaps, non-compliance issues, and recommend remediation strategies. Communicate findings and control deficiencies clearly with asset and control owners. Perform periodic risk assessments in accordance with internal policies and procedures. Required Skills & Experience: Proven experience conducting security risk assessments in enterprise environments. Strong understanding of security compliance frameworks (e.g., NIST, ISO 27001). Demonstrated More ❯
seen an extensive overhaul of security and information management to meet the challenges of corporate and statistics transformation in technology, methods and practice, the Digital Economy Act and organisational risk appetite. The capability is evolving and expanding to address changes in threat and business direction.? Security and Information Management Directorate (SaIM) operates five key services across ONS: security risk … advice and management; knowledge and information management (KIM); physical security and business continuity; security compliance and audit; security operations including our Security Operations Centre.? Job description The Cyber Security Risk Manager - Lead role forms part of the Advisory Security team within the Security and Information Management Division at the Office for National Statistics (ONS). The role reports to … the Cyber Security Risk Manager - Principal. The primary focus of the role is to provide the Organisation with security advice and best practice to develop ‘Secure by Design' protections for organisational assets and embed the ONS Security Framework - principles; policies; processes; threat model; security risk management into the ONS. This includes security advice, guidance and risk management More ❯
Head of Risk Underwriting Location: London Reports to: Chief Risk Officer My client is an exciting new start-up in the Payments space who are building the future of Payments. They are looking for a Head of Risk Underwriting to join the team and play a mission-critical role in shaping the risk framework from the … ground up. This is a fantastic role if you want to: Shape the risk foundation of a fintech from day one Work alongside a team of experienced operators and builders Have the opportunity to grow as the company scales Key Responsibilities Build the Underwriting Function : Design and implement end-to-end underwriting processes tailored to a digital-first payments … business. Policy Development : Establish risk acceptance policies, credit exposure limits, and transaction monitoring thresholds across customer segments. Customer RiskAssessment : Oversee onboarding risk reviews, KYB assessments, and underwriting decisions for new merchants or partners. Risk Frameworks : Develop and maintain risk scoring models and automated decisioning tools in collaboration with data and product teams. Portfolio More ❯
Responsibilities As part of our services, we are supporting our customer with a SaaS/Security as a Service project, crucial to the successful delivery and on-going continuous risk management of our customer's digital capability in accordance with MoD Secure by Design (SbD) process. The Security Assurance Support Coordinator role contributes towards the development and delivery of … given project or programme. You will work alongside experienced Delivery Team Security Leads and will be responsible for key security assurance activities/deliverables e.g., the product of security risk assessments and management plans. This role will provide a solid grounding for developing and gaining information assurance experience. You must have a basic understanding of Information Assurance (IA). … It would be beneficial to have a good working knowledge of Communication and Information Systems (CIS), project, programme, and risk management. The role may be required to advise, monitor, and report on security matters relating to the project/programme in accordance with MOD SbD and Risk Management policy. The post holder must be able to quickly adapt More ❯
Corporate Secretariat to define the project plan, manage execution, and establish robust governance structures. You’ll build a stakeholder matrix and ensure that design and execution decisions are appropriately risk-assessed and approved through the relevant governance forums. Key Accountabilities: Develop a comprehensive project plan aligned with pre-defined objectives and deadlines. Manage all aspects of project execution, including … stakeholder communication and risk mitigation. Build and maintain a comprehensive stakeholder matrix. Establish effective governance structures for design and execution decisions. Liaise with Compliance, Legal, and Corporate Secretariat teams. Ensure appropriate riskassessment and approval processes are followed. Key Skills: Proven experience in requirements gathering and translation for technology projects. Experience managing senior stakeholders at VP/ More ❯
The role is responsible for supporting the governance of information security, ensuring identification, management, and mitigation of information and cyber security risks across VA's operations, with emphasis on riskassessment, third-party supply chain security, control and compliance effectiveness, and operationalising the GRC strategy by embedding security and compliance considerations into business change initiatives, digital programmes, and … those looking to step into senior GRC or advisory roles. Day to day As our Information Security GRC Analyst, you'll be the trusted advisor guiding our teams through risk, regulation, and resilience. From embedding security into digital transformation to assessing third-party risks and ensuring compliance with ISO 27001, NIST CSF, PCI-DSS, and more - you'll be … ll work across projects, suppliers, and stakeholders, translating technical controls into business impact, and helping us stay one step ahead of emerging threats. About you Hands-on experience with risk assessments, supplier reviews, project advisory and control evaluations Working knowledge of frameworks like ISO/IEC 27001:2022, NIST CSF, PCI-DSS, and UK GDPR Strong communication skills - able More ❯
Develop DDS Develop project modules. (Modules as identified in the design - PLC code modules, SCADA scripts, Mimics, communication drivers, etc.) Develop site work documentation with team input as necessary (Riskassessment, method statement, site test documentation) Undertake full integrated system testing, CFAT, SAT and installation Undertake observations, variation and reworks Undertake site installation & commissioning Experience & Qualifications The following More ❯
Develop DDS Develop project modules. (Modules as identified in the design - PLC code modules, SCADA scripts, Mimics, communication drivers, etc.) Develop site work documentation with team input as necessary (Riskassessment, method statement, site test documentation) Undertake full integrated system testing, CFAT, SAT and installation Undertake observations, variation and reworks Undertake site installation & commissioning Experience & Qualifications The following More ❯
Response & Troubleshooting – Ability to investigate security alerts, analyze logs, and resolve issues efficiently. Regulatory Compliance Knowledge – Understanding of GDPR, ISO 27001, and other industry standards related to data protection. RiskAssessment & Mitigation – Experience identifying data security risks and implementing necessary preventive measures. Technical Documentation & Reporting – Strong ability to document security incidents, policy changes, and system configurations. Collaboration & Communication More ❯
KPIs for CASS Compliance. Ensure CASS breaches are appropriately recorded, reported and escalated to senior management and root cause analysis is conducted to prevent future recurrence. Advise on CASS risk and assist in Risk and Control Self-Assessments (RCSAs) and Internal Capital Adequacy and RiskAssessment (ICARA) preparation. Draft and review due diligence on key counterparties … bank and custodian account opening ensuring it is kept up to date. Assessment of organisational and regulatory changes and validating the adequacy of CASS Governance Framework. Assist in ensuring appropriate CASS training for staff. Essential Skills and Competencies of the CASS Oversight Lead Subject matter expert in the FCA’s CASS rulebook for MiFID, specifically CASS 7, and an More ❯