Yeovil, Somerset, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
of a significant programme, during which you will ensure that the product and associated deliverables are as secure as reasonably practicable, and in accordance with customer's requirements and risk appetite. You will be supported in this role as part of a larger consulting team, engineers and product domain specialists. Your work at Leonardo UK will see you take … and detailed system and security designs as they pertain to the cyber domain. Decomposing cyber and security requirements down to the system control level. Conducting cyber and information security riskassessment activities including threat modelling, vulnerability analysis and analysis of mitigations, including technical understanding. Scoping and managing security verification and validation activities and remedial action plans. Coordinating with More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
Zurich 56 Company Ltd
skills (Data Analytics, IT fundamentals, and GenAI), and Agile methods, and serve as a role model for delivering change. What will you be doing? Input into the overall UK riskassessment and audit planning and, determining the right auditscope, key risks to be addressed and most suitable audit techniques and approaches alongside the Audit Director Keeping the business … Security and new technologies, such as Robotics and Artificial Intelligence. Experience in third-party, outsourcing and project management auditing. Strong understanding and applicability of audit and/or business risk management and control processes. Proven record of working with and influencing executive/senior stakeholders, verbally and through written reports. Demonstrated success in business, functional and people management. Excellent More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
Zurich 56 Company Ltd
on how to move our UK business forward. You will be asked to drive change and improve on a set of already well-established IT Controls and an IT Risk Management Framework to allow senior IT management, business functions and 3rd party service providers to demonstrate they are managing and safeguarding company assets, data, and operations. Your ideas will … Controls Manager and other governance colleagues to gather data and collate, aggregate and interpret information to provide the Boards of Directors, Business Executives and other interested parties with an assessment of the UK IT Risk and Controls landscape. You will also manage multiple demands for IT risk-based information within Zurich, ensuring all reporting commitments are met. … alongside local and regional Group IT functions, Service Providers (through internal and external suppliers), and business functions to ensure that Zurich is proactive in the management of IT Operational Risk and Controls. The role is varied, interesting, and there are genuine opportunities to get stuck in and make a difference Many of our employees work flexibly in a variety More ❯
of the security architecture of the client's IT systems. The Security Architect will draw upon Enterprise Security Architecture or Security Solutions Architecture to: - Identify business objectives, user needs, risk appetite and cyber security obligations - Identify vulnerabilities, perform threat modelling, undertake riskassessment, evaluate the effectiveness of security controls - Verify and evidence alignment to 'Secure by Design … solutions Develop secure conceptual, logical and high level designs by identifying appropriate security controls to be embedded in solutions that meet business requirements whilst evidencing alignment to the target risk appetite. Own the design and be able to articulate and justify design recommendations at security architecture assurance gates Draft design documentation, options papers, risk assessments, stakeholder presentations and … architecture of established patterns, principles and guidelines Research emerging technologies, new products and be able to position these in a coherent manner against the developing threat landscape and client risk appetite Ability to distil complex information and concepts into key discussion points that identifies a path to resolution rather than only the identification of challenges Contribute to the development More ❯
adheres to best practices and legislation in data protection, information security, quality management, environmental compliance and industry-specific security standards. The ideal candidate will have experience in compliance management, riskassessment, audits, security frameworks and policy implementation. They will need to work across teams such as IT, Operations, Finance, Delivery and Engineering to ensure robust governance, risk … and compliance Information security and Cyber Essentials Plus Oversee Cyber Essentials Plus compliance ensuring security controls are in place Work closely with the IT team to assess vulnerabilities, manage risk and implement cyber security policies Work with the Head of IT to manage incident response planning and ensure security incidents are managed in line with best practices Data protection … Assessments (DPIAs) Implement processes around Data Subject Access Requests (DSARs) and breach management Ensure compliance with any client and third-party data processing agreements (DPAs) and data retention rules Risk management and policy development Review, update, maintain and enforce policies and procedures related to: Information security Data protection Environmental sustainability Business continuity Incident response Supplier security assessment Maintain More ❯
Principal Cyber Security Risk Manager £54,857+additional allowance up to £25,543 (£80,400) Multiple locations: Newcastle/Leeds/Oldham/Bristol/Swansea/Nottingham/Birmingham Hybrid working: 60% attendance per week Permanent Overview: Principal Cyber Security Risk Manager Sellick Partnership have partnered with the Driver and Vehicle Standards Agency to recruit a Principal Cyber … Security Risk Manager. To ensure agility as part of continuous the organisation, this role is integral to ensure that information and security risk associated with a service group are visible and responded to in a collaborative and visible manner. The role holder identifies, understands, and mitigates cyber-related risks. The role holder provides corporate risk processes, and … the Chief Data & Security Officer and Service Owners with advice to help them make well informed risk-based decisions. The role sits as part of a wider security team reporting to the Head of Cyber Security. Benefits: Principal Cyber Security Risk Manager Flexible working options encouraging work-life balance. Exceptional pension - employer contribution of an average of More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sellick Partnership
Principal Cyber Security Risk Manager 54,857+additional allowance up to 25,543 ( 80,400) Multiple locations: Newcastle/Leeds/Oldham/Bristol/Swansea/Nottingham/Birmingham Hybrid working: 60% attendance per week Permanent Overview: Principal Cyber Security Risk Manager Sellick Partnership have partnered with the Driver and Vehicle Standards Agency to recruit a Principal Cyber … Security Risk Manager. To ensure agility as part of continuous the organisation, this role is integral to ensure that information and security risk associated with a service group are visible and responded to in a collaborative and visible manner. The role holder identifies, understands, and mitigates cyber-related risks. The role holder provides corporate risk processes, and … the Chief Data & Security Officer and Service Owners with advice to help them make well informed risk-based decisions. The role sits as part of a wider security team reporting to the Head of Cyber Security. Benefits: Principal Cyber Security Risk Manager Flexible working options encouraging work-life balance. Exceptional pension - employer contribution of an average of More ❯
Stratford-upon-Avon, Warwickshire, UK Hybrid / WFH Options
Barclays
Corporate Secretariat to define the project plan, manage execution, and establish robust governance structures. You’ll build a stakeholder matrix and ensure that design and execution decisions are appropriately risk-assessed and approved through the relevant governance forums. Key Accountabilities: Develop a comprehensive project plan aligned with pre-defined objectives and deadlines. Manage all aspects of project execution, including … stakeholder communication and risk mitigation. Build and maintain a comprehensive stakeholder matrix. Establish effective governance structures for design and execution decisions. Liaise with Compliance, Legal, and Corporate Secretariat teams. Ensure appropriate riskassessment and approval processes are followed. Key Skills: Proven experience in requirements gathering and translation for technology projects. Experience managing senior stakeholders at VP/ More ❯
infrastructure. The ideal candidate will play a critical role in designing and implementing cybersecurity frameworks to align with the business objectives and mitigate potential threats. Main Responsibilities: Perform Security Risk and Threat analysis during the initial design and the Software Development Life Cycle planning, analysis, and design phases. Providing recommendations and requirements for mitigating any security weaknesses identified while … of the SAFe Agile method would be an asset Understanding of security testing in the software pipeline (SAST, DAST, SCA, RASP) Knowledge of STRIDE, DICE and other threat and risk frameworks Knowledge of AWS tools Proven experience managing multiple projects simultaneously Practical interpersonal skills; adaptable to all levels of the organization Ability to contribute in a collaborative environment Communication … the impact of risks Technical Systems Proficiency: Security Management Tools (email filtering, vulnerability scanning tools, security dashboards, etc.) Cloud security management tools like CNAPP, CSPM, CWPP, and CIEM. Security riskassessment methodology (EBIOS RM) Security Requirement Definition and Review Travel Required: 10-15% Domestic and International We thank all applicants for applying. Only selected applicants will be contacted. More ❯
197-205 HIGH STREET, PONDERS END, ENFIELD, England
FIRST RUNG LIMITED
information system. Understand and report error queries raised by the ESFA once returns have been submitted. Understand PDSAT reports and supporting the notification of senior management of any identified risk indicators. Keep track of incentive payments and contributions that are due. Send monthly report to finance so that employers can be paid and invoices in respect of contributions can … on file and renewed certificates are secured from employers within one month of expiry date. To ensure all live placements and apprenticeship employers have a valid health and safety Risk Assessment. Produce and circulate apprenticeship handovers to centre teams and assessors once all documentation has been complete. Provide administrative support to MI and Data officer and centre teams when More ❯
professional credentials (e.g., CPCostE, CCEA, Chartered Engineer). Background in defence, either through previous industry roles or military service. Strong grounding in statistics and its application to cost modelling, risk analysis, and parametric forecasting. Familiarity with business case development, trade-off analysis, and cost-benefit evaluations for stage gate or approval processes. Hands-on experience with various estimation techniques … data, and pricing strategy in estimate development. Track record of building cost models that meet rigorous independent scrutiny and validation standards. Competence in uncertainty modelling and cost/schedule riskassessment methodologies. Involvement in competitive bidding activities (e.g., PQQs, ITTs, ITNs). Willingness to travel to various client locations throughout the UK. More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
Proactive.IT Appointments Limited
proactive and organised IT Change Analyst on a permanent basis. This is a remote role with occasional travel to site. The ideal candidate will bring experience in Release Management , RiskAssessment , and Change Coordination , along with excellent communication and stakeholder management skills. This is a great opportunity to join a collaborative and forward-thinking IT team where soft … initiatives across IT and business functions Release Management - Plan, execute, and coordinate software/infrastructure releases Stakeholder Engagement - Maintain clear and consistent communication with technical teams and business stakeholders Risk Management - Identify potential risks and develop mitigation strategies to ensure successful delivery Collaboration - Work closely with cross-functional teams across IT and the wider organisation Experience & Skills Required: Proven More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
Proactive.IT Appointments Limited
proactive and organised IT Change Analyst on a permanent basis. This is a remote role with occasional travel to site. The ideal candidate will bring experience in Release Management , RiskAssessment , and Change Coordination , along with excellent communication and stakeholder management skills. This is a great opportunity to join a collaborative and forward-thinking IT team where soft … initiatives across IT and business functions Release Management - Plan, execute, and coordinate software/infrastructure releases Stakeholder Engagement - Maintain clear and consistent communication with technical teams and business stakeholders Risk Management - Identify potential risks and develop mitigation strategies to ensure successful delivery Collaboration - Work closely with cross-functional teams across IT and the wider organisation Experience & Skills Required: Proven More ❯
suppliers and customers). • Act as the main point of contact with local authorities, maintain relationships with police, administrative, and supervisory bodies. • Develop, update, and execute security and fire risk assessments, action plans, and business continuity plans. • Oversee and ensure compliance with fire safety regulations, including maintenance and inspection of fire detection, alarm, and suppression systems. • Lead fire safety … and fire safety operations, preferably in commercial or industrial environments. • Knowledge of security systems such as access control and CCTV; fire safety certifications (e.g., NEBOSH or Level 3 Fire RiskAssessment) are a plus. • Strong leadership, communication, and interpersonal skills to work cross-functionally and engage with various business levels. • Ability to analyze risks, problem-solve, prioritize, and More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Strata Construction Consulting
whom you will be expected to provide guidance and support as appropriate What you need to succeed Knowledge of, and experience in highway design, drainage strategy and design, flood riskassessment and management, utility design and planning as well as a good working knowledge of the Development Industry The ability to produce infrastructure masterplans, site appraisals, technical reports More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
DXC Technology Inc
oversight - Incident, Service Request, Problem, Change, Release Management Service Level Management Escalation Management Drive internal and third-party service review meetings covering performance, service improvements, quality and processes Technology riskassessment and management Technology Service Integration - both internally within Velonetic and with our delivery partners High Priority Incident Management & Leadership Ensures the 'Voice of the Customer' is heard More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
Met Office
a team to ensure the team operate effectively. Develop the team utilising the career framework to identify learning needs and career pathways. Vulnerability Management: Manage and coordinate vulnerability scanning, risk assessments, and penetration testing to identify security weaknesses across systems, infrastructure, and digital services.Lead efforts to enhance vulnerability management protocols, ensuring alignment with national (Secure by Design) and international … maintaining the organisational security posture. Reporting and Metrics: Define metrics and targets.Prepare and present regular reports on vulnerability management, and trends to management, translating technical metrics into business focused risk insights. We operate an on-call roster in Technology to provide 24/7/365 support to respond to operational service requirements.This post may be part of an … processes for identifying, classifying, and prioritising vulnerabilities using industry standard frameworks such as CVSS, NIST, and MITRE ATT&CK, with a track record of tailoring scoring models to organisational risk appetite.Proven ability to lead end-to-end vulnerability management initiatives in complex IT environments that reduce mean time to remediation, elevate security maturity and align vulnerability management closely with More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Defence
a collaborative, high-impact environment - this is your chance to make a real difference. Key Responsibilities Define and embed security requirements throughout the product development lifecycle. Conduct threat modelling, risk assessments, and drive mitigation strategies. Advise on solution architecture, minimising security risks and ensuring compliance. Collaborate with cross-functional teams to implement security best practices. Support incident response and … MOD-specific guidelines (e.g. JSP, Def Stan 05-138/139). Familiarity with HMG security and assurance frameworks is a strong plus. Comfortable using threat modelling tools and riskassessment methodologies. Key Competencies: Excellent communicator - confident, clear, and influential. Proactive problem-solver with critical thinking skills. Organised, resilient, and delivery-focused. Strong team player and stakeholder engager. More ❯
Old Down, Gloucestershire, United Kingdom Hybrid / WFH Options
Matchtech
a collaborative, high-impact environment - this is your chance to make a real difference. Key Responsibilities Define and embed security requirements throughout the product development lifecycle. Conduct threat modelling, risk assessments, and drive mitigation strategies. Advise on solution architecture, minimising security risks and ensuring compliance. Collaborate with cross-functional teams to implement security best practices. Support incident response and … MOD-specific guidelines (e.g. JSP, Def Stan 05-138/139). Familiarity with HMG security and assurance frameworks is a strong plus. Comfortable using threat modelling tools and riskassessment methodologies. Key Competencies: Excellent communicator - confident, clear, and influential. Proactive problem-solver with critical thinking skills. Organised, resilient, and delivery-focused. Strong team player and stakeholder engager. More ❯
collaboration with colleagues Health and Safety: Ensure the health, safety and well-being of all team members is protected by personal example Foster a culture of safe working and risk awareness within the team Escalate any safety related matters that cannot be resolved within the team Engage with the riskassessment of line processes and team tasks More ❯
main parts: Systems/Equipment/MEH), meeting and actions plan follow up. o The maturity of the design for the gate review of the project. o The riskassessment with the disciplines on remaining OP and the full implementation of all design change required for the commissioning (as per freeze). o The consistency of the document More ❯
data. Natural problem-solver with structured approach to problem solving in a technical environment. The ability to validate, prepare and read engineering documents. Knowledge of Health and Safety requirements, RiskAssessment, COSHH. Computer literate, including Microsoft Office competency to produce plans, presentations, graphs, process and Single Point Lesson (SPL) documents. A full UK driving license with less than More ❯
King Edward VI College, Lower High Street, Stourbridge, West Midlands, England
Kind Edward VI College
tasks and targets. Safety and Compliance: Adhering to health and safety protocols and guidelines when working with technical equipment and supporting staff and students. Assisting in the implementation of riskassessment procedures and promoting a safe working environment for all involved. This job description is intended to outline the general responsibilities and qualifications of the apprentice role. It More ❯
Researchers undertaking vulnerability & technical research are expected to: Know which pen-testing and reverse engineering tools and methodologies are appropriate to a given problem Have experience of advanced vulnerability assessment techniques such as fuzzing and code injection Researchers undertaking experimental development are expected to: Develop, assess and prioritize prototype and simulated capabilities Mandatory Skills and Experience Required A wide … Vulnerability analysis Exploit development Exploratory Research: OSINT and interacting with SMEs Developing new research skills as appropriate General: Technical Leadership Team management Knowledge Exploratory Research: Network architecture and security Riskassessment Systems engineering Architectural frameworks Technical Analysis: Processor architecture Operating systems and firmware Standard and domain-specific protocols and data formats Experimental Development: Software development life cycle Assured … processes are as inclusive as possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments. Please be aware that many roles at BAE Systems are subject to both security and export control restrictions. These More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Harris Geospatial Solutions
of a degree, minimum of 8 years of prior related experience). Strong knowledge of safety management; be considered as a specialist within discipline. Experience of Hazard Management and RiskAssessment including the principles of ALARP and Tolerability. Knowledge/understanding of project management. Knowledge of marine systems engineering would be beneficial but not essential. Important to know More ❯