drive initiatives to design and implement security solutions for Azure and M365 environments, ensuring adherence to industry best practices and regulatory standards. Supplier Security Assessment: Evaluate and ensure the security posture of Material IT Suppliers, ensuring compliance with security standards and contractual obligations. RiskAssessment: Conduct risk assessments, analyze vulnerability and penetration testing reports, and develop risk mitigation strategies. Access Management: Help develop and maintain a robust Role-Based Access Control Framework, ensuring efficient management of access rights. Key Skills & Experience: Ideally a Degree in Computer Science, Information Security, or related field (or equivalent experience … security frameworks (e.g., NIST, ISO27000 series). Expertise in network security protocols, Azure security solutions, firewalls, intrusion detection systems, VPNs, etc. Proficient in vulnerability assessment tools, incident response frameworks, and risk management methodologies. Ability to collaborate effectively with cross-functional teams. Analytical mindset to interpret security data and More ❯
databases and possess strong analytical skills. Key Responsibilities Conduct in-depth analysis of large datasets to identify patterns, trends, and anomalies indicative of higher risk money laundering, terrorist financing, or proliferation financing factors. Develop and implement data analytics methodologies to enhance the detection of suspicious transactions and behaviours. Utilise … statistical tools and techniques to assess risk levels and identify high-risk entities or transactions. Collaborate with subject matter experts to develop datasets. Assist in the monitoring compliance with AML/CFT/CFP obligations and reporting requirements. Generate reports and outputs to communicate key findings and insights … to relevant stakeholders. Contribute to the development and maintenance of data-driven riskassessment models. Ensure internal systems and procedures are adhered to. Take accountability for own work through effective time management, maintaining high standards and seeing tasks through to the end. Key Skills & Experience Hold, or be More ❯
the client's IT systems. The Security Architect will draw upon Enterprise Security Architecture or Security Solutions Architecture to: Identify business objectives, user needs, risk appetite and cyber security obligations Identify vulnerabilities, perform threat modelling, undertake riskassessment, evaluate the effectiveness of security controls Verify and evidence … and high level designs by identifying appropriate security controls to be embedded in solutions that meet business requirements whilst evidencing alignment to the target risk appetite. Own the design and be able to articulate and justify design recommendations at security architecture assurance gates Draft design documentation, options papers, risk … and guidelines Research emerging technologies, new products and be able to position these in a coherent manner against the developing threat landscape and client risk appetite Ability to distil complex information and concepts into key discussion points that identifies a path to resolution rather than only the identification of More ❯
Management, maintenance and administration of CloudClevr’s existing ISO-related management systems ensuring certifications to required standards are retained. To include: Assisting the Group Risk Manager with riskassessment and treatment. Participation in Risk Steering Group Meetings. In conjunction with the Senior Leadership Team, setting and More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
edge products and technology. Key Accountabilities : Identify security requirements and ensure the integration of security controls during the product development lifecycle. Develop and implement risk management strategies using relevant riskassessment frameworks & perform security threat modelling and risk assessments using various threat modelling tools Communicate risk … by Design. Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST 800-53 or OWASP. Experience of working with risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53) Why Join? You'll gain exposure More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Frontier Resourcing Ltd
edge products and technology. Key Accountabilities : Identify security requirements and ensure the integration of security controls during the product development lifecycle. Develop and implement risk management strategies using relevant riskassessment frameworks & perform security threat modelling and risk assessments using various threat modelling tools Communicate risk … by Design. Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST 800-53 or OWASP. Experience of working with risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53) Why Join? You'll gain exposure More ❯
of continuous improvement, service excellence and customer focus. The role has line management responsibilities for the 1st line Quality team and the 1st line Risk team. Operational control and risk management is the foundation to operational excellence. The role of Operational Controls Manager is to develop and ensure … controls and process disciplines are rigorously maintained and continually enhanced through metrics reporting, riskassessment testing, quality assurance and root cause analysis. S/he is accountable for developing internal control practices and framework. S/he will help ensure controls are appropriately designed and executed throughout the … organisation, ensure identification, escalation and mitigation of operational risk, and provide oversight and sponsorship of selected control initiatives. Key Responsibilities: Establishment and integration of an Operational Control framework, including the design and implementation of control structures, governance, and measures interpreting policy and standards requirements to proactively implement a best More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
Zurich 56 Company Ltd
and GenAI), and Agile methods, and serve as a role model for delivering change. What will you be doing? Input into the overall UK riskassessment and audit planning and, determining the right audit scope, key risks to be addressed and most suitable audit techniques and approaches alongside … as Robotics and Artificial Intelligence. Experience in third-party, outsourcing and project management auditing. Strong understanding and applicability of audit and/or business risk management and control processes. Proven record of working with and influencing executive/senior stakeholders, verbally and through written reports. Demonstrated success in business More ❯
depending on experience Are you passionate about data and excited to make a real impact in the world of cyber riskassessment? Join our innovative team located in Bristol, where we are redefining how cyber risk is understood and managed within the reinsurance industry. If you're … collaborative spirit. Why Join Us? Impact: Make a significant difference in enhancing our data ingestion capabilities, directly contributing to our ability to manage cyber risk effectively. Innovation: Work with cutting-edge technologies and methodologies in the exciting field of data science and engineering. Growth: Enjoy opportunities for professional development … removed). We can't wait to see how you can contribute to our dynamic team! Join us in shaping the future of cyber risk management-your next adventure starts here! Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible More ❯
Start: ASAP Responsibilities: Managing the ongoing development and maintenance of the OT systems on site Conducting OT asset inventory discovery management Carrying out asset risk assessments Driving plant initiatives and project specification, riskassessment and policy adherence activity in an effective way Implementing protocol to ensure accurate … OT device recognition and management Leading cyber risk awareness and security policy training Promoting the protection of data integrity and security at all times Completing third party vendor risk assessments and critical patch implementation Diagnosing root causes of system failures and defining corrective actions Coordinating OT process and More ❯
Start: ASAP Responsibilities: Managing the ongoing development and maintenance of the OT systems on site Conducting OT asset inventory discovery management Carrying out asset risk assessments Driving plant initiatives and project specification, riskassessment and policy adherence activity in an effective way Implementing protocol to ensure accurate … OT device recognition and management Leading cyber risk awareness and security policy training Promoting the protection of data integrity and security at all times Completing third party vendor risk assessments and critical patch implementation Diagnosing root causes of system failures and defining corrective actions Coordinating OT process and More ❯
compliance to applicable standards (desirable). i.e. EN 61511; Safety and design review methods, e.g., PHA, HAZOP, LOPA, FMEA; Semiconductor industry standards – SEMI S2; Riskassessment – Semi S10. Skills Good levels of integrity with a results-driven mindset, able to hold self and others accountable (essential) Able to More ❯
Royal Wootton Bassett, Wiltshire, United Kingdom Hybrid / WFH Options
ProForce Personnel
generate detailed reports to identify data trends and areas requiring attention to address operational and product-related issues. Support short loop planning for early assessment of yield issues, aim to identify issue early to minimise waste and inefficiencies. Work closely with design and test engineers to pinpoint root cause … systems and measurement databases are available, reliable and error resistant. Provide support to address gaps and maintain system effectiveness as needed. Track schedule, cost, riskassessment, and yield of the improvement activities within all fab partners, to include materials, utilities, and labour. Develop/improve in-line measurement More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
EDF Energy
projects and technical change, ensuring that security is embedded from the outset, and you'll develop artefacts such a security designs, threat models and risk assessments to support solution delivery. The Security Architect will produce clear and concise documentation, maintaining alignment to internal governance processes and you'll take … bring a pragmatic mindset to problem-solving, balancing ideal security outcomes with business priorities. We're looking for someone with hands-on experience in riskassessment, threat modelling, security control selection, and integrating Secure by Design principles into technical delivery. You'll also have experience working within Agile More ❯
Clevedon, Somerset, United Kingdom Hybrid / WFH Options
BMR Solutions
product safety and compliance to standards like EN 61511, safety/design review methods (PHA, HAZOP, LOPA, FMEA), semiconductor industry standards (SEMI S2), and riskassessment (Semi S10). (Desirable) High integrity with a results-driven mindset, able to hold self and others accountable. (Essential) Knowledge of best More ❯
related sector. Proven track record in cost and budgetary control, ensuring projects remain financially viable. Expertise in contract administration (preferably NEC4), tender reviews, and risk assessment. Experience managing supply chain relationships, securing profitable agreements, and developing strategic partnerships. Why Join BladeRoom Group? At BladeRoom, you won’t just work More ❯
are expected to: Know which pen-testing and reverse engineering tools and methodologies are appropriate to a given problem Have experience of advanced vulnerability assessment techniques such as fuzzing and code injection Researchers undertaking experimental development are expected to: Develop, assess and prioritize prototype and simulated capabilities Mandatory Skills … Research: OSINT and interacting with SMEs Developing new research skills as appropriate General: Technical Leadership Team management Knowledge Exploratory Research: Network architecture and security Riskassessment Systems engineering Architectural frameworks Technical Analysis: Processor architecture Operating systems and firmware Standard and domain-specific protocols and data formats Experimental Development … possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments. Life at BAE Systems Digital Intelligence Diversity and inclusion are integral to the success More ❯
prove value through validation and build buy in. The role has three key objectives: To oversee the project, ensuring alignment with organisational objectives, managing risk and ensuring delivery. To act as an intelligent customer for the consultancy work, validating approaches and ensuring quality of delivery. Embed capability developed into … . Ability to manage external suppliers, ensuring they deliver agreed milestones and outputs as specified in the DGOM business case. Experience of budget management, riskassessment, and issue resolution to keep the project on track (to support project team). ?4. Stakeholder Engagement & Communication Experience of stakeholder engagement More ❯
Good knowledge and understanding of site operations. COSHH, IOSH, forklift, confined space, environmental permitting & awareness, emissions monitoring, Accident & investigation, permit to work, hazard identification & riskassessment, asbestos awareness, legionella awareness, Fire awareness, working at height, hand arm vibration, electrical safety, fire marshall, MEWP, tower scaffold, slinging & lifting. Health More ❯
197-205 HIGH STREET, PONDERS END, ENFIELD, England
FIRST RUNG LIMITED
error queries raised by the ESFA once returns have been submitted. Understand PDSAT reports and supporting the notification of senior management of any identified risk indicators. Keep track of incentive payments and contributions that are due. Send monthly report to finance so that employers can be paid and invoices … are secured from employers within one month of expiry date. To ensure all live placements and apprenticeship employers have a valid health and safety Risk Assessment. Produce and circulate apprenticeship handovers to centre teams and assessors once all documentation has been complete. Provide administrative support to MI and Data More ❯