cloud architecture, assurance, and secure systems design. Key Accountabilities: • Proven experience in security architecture and cyber capability development • Strong background in secure systems design, risk mitigation, and assurance activity • Experience working across large, multi-disciplinary teams within regulated environments • Excellent stakeholder communication and ability to engage at all levels … control design • Review solution designs to ensure security compliance and effectiveness • Lead on identifying and mitigating security vulnerabilities across projects • Support IT Health Checks, risk assessments, and internal assurance processes • Advise managers on control implementation and performance improvements • Contribute to the ongoing maturity of organisational cyber capability Essential Requirements … or equivalent qualifications • Strong understanding of security frameworks and architectural methodologies • Excellent interpersonal and cross-team collaboration skills Interested? Please apply below Information Security | Risk Management | Cyber Security | Security Architecture | DV Cleared | CESG Certified IA Professional | IA Consultant | InfoSec Specialist | Public Sector | Security Governance | Security Assurance | RiskAssessmentMore ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
testing of controls, and supporting evidence to meet SOC 2 Trust Service Criteria. Understand technology controls that impact on-premises and cloud technology, operational risk to the Deloitte Technology organization as well as related laws, regulations, and industry standards, specifically related to internal and cloud technology solutions. Assess technology … track remediation activities to meet target dates for closure, and track/report progress. Work with the appropriate Information Security, Office of General Counsel, Risk Management, and leadership to determine scope of SOC 2 audits. Develop and recommend appropriate information security policies, standards, procedures, checklists, and guidelines using generally … professional experience and/or qualifications. Proven directly related experience in the following: managing information technology audits, assessments, remediation management, creating, leading, and managing riskassessment programs. Experience with SSAE 18 SOC 2 and various other industry standard frameworks such as: NIST, HITRUST, CSA, CCM. Experience leading IT More ❯
way! Key Responsibilities: Assess and underwrite bridging loans in line with internal policies and regulatory requirements. Make lending decisions in accordance with the Credit Risk Policy. Ensure compliance with AML, financial crime prevention, and data protection policies and regulations. Collaborate with all stakeholders to efficiently progress cases from decision … Term mortgages. Experience in Business Development, Product or Sales within Property Lending markets. Familiarity with digital lending platforms , automated underwriting tools, and AI-driven riskassessment models. Why Morpheus? Be at the forefront of driving a technology-driven lending platform , revolutionising the bridging finance industry, providing an exceptional More ❯
reading, south east england, United Kingdom Hybrid / WFH Options
Hunter Bond
minimizing latency, and ensuring high availability of trading systems, with a strong emphasis on efficient Python coding practices. Develop tools for real-time monitoring, riskassessment, and analytics, ensuring the systems can handle large volumes of market data and provide timely insights to the trading desk. Key Requirements More ❯
with engineers and analysts to implement scalable pricing solutions and continuously monitor performance. Key Responsibilities Develop and refine ML-driven pricing models to enhance riskassessment and profitability. Apply advanced statistical and machine learning techniques to optimize pricing accuracy. Automate and streamline pricing model deployment for continuous improvement. … What We’re Looking For Strong expertise in Python and SQL for data analysis and model development. Experience with pricing models, actuarial techniques, or risk modeling. Deep understanding of machine learning algorithms, predictive modeling, and statistical analysis. Hands-on experience in automating and deploying machine learning models. Proven ability More ❯
security event analysis activities. Security Reporting and Advisories: Contribute to or lead the delivery of cyber security reports and advisories to key stakeholders. Residual RiskAssessment: Deliver post-incident analysis, technical lessons learned, and reporting to assess residual risk. Advanced SIEM Tuning: Refine and tune SIEM tools to More ❯
trends, and regulatory changes, proactively advising clients on necessary adjustments to their security strategies. Produce detailed and accurate reports on penetration testing findings, including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerability management … and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit, Burp Suite, Nessus, and Wireshark. Strong understanding of network protocols, firewall configurations, and secure network design. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) to automate tasks More ❯
reading, south east england, United Kingdom Hybrid / WFH Options
Harrington Starr
business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open to working ona remote contract with occasional trips to the Belfast … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. …/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability assessment and a penetration test in the context of assessment scope, objectives, and deliverables. Working knowledge of information security frameworks such as ISO27001, NIST More ❯