as part of the IRIS Engineering and Customer implementation function specifically on our HR & payroll portfolio. This is a hands-on technical role working within a team to execute data tasks and support large scale customer data migration activities. You will need to be highly motivated, have strong communication and problem-solving skills. A team player that can … rise to the challenge of working in a fast-paced environment and prepared to learn and apply new technical skills. You will also be able to troubleshoot mass data migration tasks to identify errors, recommend and execute remedial actions. What will you be doing? Utilise, manipulate, manage, update, validate, and troubleshoot customer HR and payroll data as part … of single data or bulk update requests for customers. In addition to designing and enhancing best practice, you will work with key stakeholders to ensure security, business continuity and customers are always the prime focus. Generation of bespoke customer reports using SSRS and Excel. Review existing scripts and reports to improve performance and ensure they are optimized for large More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Integrate security into DevSecOps and MLOps pipelines , including CI/CD and infrastructure-as-code environments. Drive adoption of Zero Trust principles, encryption standards, IAM policies, and network/data/application security controls. Collaborate with data scientists, ML engineers, and IT security teams to embed security throughout AI/ML system design and deployment. Your Profile 15+ … including PSD2, GDPR, DORA, and EBA regulatory requirements. Experience designing and securing AI/ML and MLOps environments , including awareness of risks such as adversarial attacks, model poisoning, and dataprivacy issues. Deep knowledge of: Identity & Access Management (IAM) Network and Application Security Data Protection & Encryption Kubernetes, Containers, and DevSecOps/MLOps practices SIEM, logging, and More ❯
patching, audits, and CAF compliance activities. Conduct user access reviews and manage CNI processes & procedures . Report and respond swiftly to security breaches. Collaborate with vendors to ensure secure data handling . Monitor compliance with state and federal dataprivacy/security regulations. Develop and implement security policies and procedures . Conduct internal audits and risk More ❯