8 of 8 Contract Remediation Plan Jobs in London

Risk Data Business Analyst

Hiring Organisation
Adecco
Location
London, United Kingdom
Employment Type
Contract
business requirements are clearly defined and communicated as part of initiative prioritisation and planning Support the investigation of Data Quality Issues, development of remediation plans and recommendations to fix at source Requirements: Solid knowledge and expertise in the use of data governance, data quality, metadata, profiling, analysis ...

Senior Data Governance Analyst

Hiring Organisation
Adecco
Location
London, United Kingdom
Employment Type
Contract
business requirements are clearly defined and communicated as part of initiative prioritisation and planning Support the investigation of Data Quality Issues, development of remediation plans and recommendations to fix at source Ability to establish consistent contact with all teams to provide updates, stay on track and report risks ...

Interim Cybersecurity Auditor

Hiring Organisation
Grant Thornton
Location
City of London, London, England, United Kingdom
Employment Type
Contractor
Contract Rate
Salary negotiable
Telecommunications (Security) Act 2021 Identify risks and provide actionable recommendations. Produce clear audit reports and present findings to client stakeholders. Support clients in remediation planning and regulatory alignment. Stay current with UK cybersecurity legislation and industry standards. Proven experience in cybersecurity auditing, ideally in a consultancy or client ...

Application Security & Controls Specialist (DORA Programme)

Hiring Organisation
Salt
Location
London, United Kingdom
Employment Type
Contract, Work From Home
Contract Rate
€600 - €800 per day
expectations related to software supply chain, cryptography, and application security. Identify gaps between current capabilities and new DORA requirements and provide clear, actionable remediation recommendations. Contribute to the rollout, adoption, and continuous improvement of newly introduced security controls. Security Advisory Perform targeted security assessments on applications, processes … secure implementation across different environments (on-prem, mainframe, cloud). Collaborate closely with architects, engineers, developers, risk teams, and control owners to support remediation plans and technical decisions. Experience 5-10 years of hands-on experience in designing or implementing information security controls, frameworks, or processes. Proven experience ...

Vulnerability Analyst

Hiring Organisation
Robert Half
Location
London, South East, England, United Kingdom
Employment Type
Contractor
Contract Rate
Salary negotiable
Vulnerability Analyst on an initial 12-month contract. This role sits within a growing security function focused on strengthening vulnerability management practices, improving remediation workflows, and enhancing the organisation's overall security posture. The successful candidate will play a key role in assessing, analysing, and coordinating the remediation … Responsibilities: Conduct threat and vulnerability assessments to identify potential security risks across systems and infrastructure. Perform vulnerability scanning and validate identified weaknesses and remediation activities. Analyse, triage, and prioritise vulnerabilities based on risk, business impact, and exploitability. Develop and support remediation plans to mitigate identified vulnerabilities. ...

SecOps Engineer

Hiring Organisation
Syntax Consultancy Ltd
Location
London, United Kingdom
Employment Type
Contract
Contract Rate
£500/day 500/day (Outside IR35)
across Cloud services + maintaining a strong security culture. Investigating security incidents and breaches, performing vulnerability scans for releases, vulnerability risk assessments + remediation planning. Conducting threat modelling to identify risks and inform secure design decisions. Providing assurance over patching operations, release notes + change management activities. Assessing … feeds + providing recommendations to mitigate risks. Conducting security incident investigations, accurate reporting + taking follow-up actions. Creating ITHC (IT Health Check) Remediation Action Plans, tracking progress, ITHC change management + delivery Kanban board tickets. Supporting certificate management ceremonies + cryptographic control processes. Managing digital access requests ...

SecOps Engineer (SC + NPPV3 Cleared)

Hiring Organisation
Syntax Consultancy Ltd
Location
London, United Kingdom
Employment Type
Contract
Contract Rate
£500/day 500/day (Outside IR35)
across Cloud services + maintaining a strong security culture. Investigating security incidents and breaches, performing vulnerability scans for releases, vulnerability risk assessments + remediation planning. Conducting threat modelling to identify risks and inform secure design decisions. Providing assurance over patching operations, release notes + change management activities. Assessing … feeds + providing recommendations to mitigate risks. Conducting security incident investigations, accurate reporting + taking follow-up actions. Creating ITHC (IT Health Check) Remediation Action Plans, tracking progress, ITHC change management + delivery Kanban board tickets. Supporting certificate management ceremonies + cryptographic control processes. Managing digital access requests ...

LAP Security Architect

Hiring Organisation
Sanderson Recruitment
Location
London, United Kingdom
Employment Type
Contract
Contract Rate
£500 - £750 per day
NIST, ISO 27001). ITHC Leadership: CREST/CHECK-accredited experience conducting or supporting pre- and post-deployment security assessments, vulnerability management, and remediation planning. Technical Experience Wintel/Linux: Securing legacy applications via patching, hardening, and privilege management (e.g., Active Directory, SELinux). Cloud (AWS/Azure … Sets: Defining controls for data encryption, access management, and audit logging aligned with NCSC guidelines. ITHC Reports: Delivering CHECK-compliant reports with actionable remediation plans. Align audit outcomes with organisational risk appetite, ensuring legacy system upgrades mitigate critical threats (e.g., unauthorised access, data leakage) Audit risk registers ...