cloud architecture, assurance, and secure systems design. Key Accountabilities: • Proven experience in security architecture and cyber capability development • Strong background in secure systems design, risk mitigation, and assurance activity • Experience working across large, multi-disciplinary teams within regulated environments • Excellent stakeholder communication and ability to engage at all levels … control design • Review solution designs to ensure security compliance and effectiveness • Lead on identifying and mitigating security vulnerabilities across projects • Support IT Health Checks, risk assessments, and internal assurance processes • Advise managers on control implementation and performance improvements • Contribute to the ongoing maturity of organisational cyber capability Essential Requirements … or equivalent qualifications • Strong understanding of security frameworks and architectural methodologies • Excellent interpersonal and cross-team collaboration skills Interested? Please apply below Information Security | Risk Management | Cyber Security | Security Architecture | DV Cleared | CESG Certified IA Professional | IA Consultant | InfoSec Specialist | Public Sector | Security Governance | Security Assurance | RiskAssessmentMore ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
testing of controls, and supporting evidence to meet SOC 2 Trust Service Criteria. Understand technology controls that impact on-premises and cloud technology, operational risk to the Deloitte Technology organization as well as related laws, regulations, and industry standards, specifically related to internal and cloud technology solutions. Assess technology … track remediation activities to meet target dates for closure, and track/report progress. Work with the appropriate Information Security, Office of General Counsel, Risk Management, and leadership to determine scope of SOC 2 audits. Develop and recommend appropriate information security policies, standards, procedures, checklists, and guidelines using generally … professional experience and/or qualifications. Proven directly related experience in the following: managing information technology audits, assessments, remediation management, creating, leading, and managing riskassessment programs. Experience with SSAE 18 SOC 2 and various other industry standard frameworks such as: NIST, HITRUST, CSA, CCM. Experience leading IT More ❯
with engineers and analysts to implement scalable pricing solutions and continuously monitor performance. Key Responsibilities Develop and refine ML-driven pricing models to enhance riskassessment and profitability. Apply advanced statistical and machine learning techniques to optimize pricing accuracy. Automate and streamline pricing model deployment for continuous improvement. … What We’re Looking For Strong expertise in Python and SQL for data analysis and model development. Experience with pricing models, actuarial techniques, or risk modeling. Deep understanding of machine learning algorithms, predictive modeling, and statistical analysis. Hands-on experience in automating and deploying machine learning models. Proven ability More ❯
security event analysis activities. Security Reporting and Advisories: Contribute to or lead the delivery of cyber security reports and advisories to key stakeholders. Residual RiskAssessment: Deliver post-incident analysis, technical lessons learned, and reporting to assess residual risk. Advanced SIEM Tuning: Refine and tune SIEM tools to More ❯
security event analysis activities. Security Reporting and Advisories: Contribute to or lead the delivery of cyber security reports and advisories to key stakeholders. Residual RiskAssessment: Deliver post-incident analysis, technical lessons learned, and reporting to assess residual risk. Advanced SIEM Tuning: Refine and tune SIEM tools to More ❯
reading, south east england, United Kingdom Hybrid / WFH Options
Harrington Starr
business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open to working ona remote contract with occasional trips to the Belfast … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. …/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability assessment and a penetration test in the context of assessment scope, objectives, and deliverables. Working knowledge of information security frameworks such as ISO27001, NIST More ❯