Here, your voice and ideas matter, your work makes an impact, and together, you will help us decide the future of American Express. The Technology & Operational Risk Advisor will help ensure safe and sound banking & business operations by creating embedded partnerships focused on reducing technology and operational risk and advancing Technology Risk and Information Security objectives as needed to protect and secure the Company's valuable information by ensuring the security and confidentiality of customer information, protecting against any anticipated threats or hazards to the security or integrity of such information, and protecting against unauthorized … such information that could result in substantial harm or inconvenience to any customer This role will have a significant positive impact on the overall Operational, Technology, and Information Security risk posture of American Express and its legal entities by leading risk-reduction through clear and candid communication, early More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
Job title OT Cyber Security Analyst Ref 40929 Division Digital Transformation Location Hybrid - Clearwater Court - RG1 8DB Contract type Permanent Full/Part-time Full-time Salary Up to £65,000 per annum depending on skills and experience Job grade B Closing date 16/05/2025 We are … seeking a highly skilled and experienced OT Senior Cyber Security Analyst to join our dynamic Security Operations team at Thames Water. As the UK's largest water company, we are committed to ensuring the highest level of security and compliance, protecting the critical infrastructure that delivers essential water services to … be responsible for maintaining SecOps solutions, controls, and processes across the organisation, while mentoring and leading the SOC team to ensure effective management of OT alerts and incidents. This position requires a deep understanding of SecOps concepts, technologies, and best practices, specifically across IT and OT environments. You will be More ❯
Position Overview: We are seeking a motivated and detail-oriented OT Business Analyst to support key cybersecurity and operationaltechnology initiatives. This role involves driving process improvements, implementing physical security enhancements, and advancing cyber training and awareness programs. The ideal candidate will have a proactive approach, excellent stakeholder … management skills, and a solid understanding of operationaltechnology and business processes. Key Responsibilities: Stakeholder Collaboration: Work closely with stakeholders to document and evaluate existing processes, identifying inefficiencies and areas for improvement. Process Analysis: Understand the reasoning behind current practices and recommend optimizations to enhance efficiency, security, and … familiarize yourself with ongoing projects to maintain momentum and meet tight deadlines. Qualifications: Experience: Proven experience as a Business Analyst, preferably within cyber security, operationaltechnology, or related fields. Proactive Approach: Demonstrated ability to independently identify opportunities for improvement and drive impactful change. Stakeholder Engagement: Strong interpersonal skills More ❯
Position Overview: We are seeking a motivated and detail-oriented OT Business Analyst to support key cybersecurity and operationaltechnology initiatives. This role involves driving process improvements, implementing physical security enhancements, and advancing cyber training and awareness programs. The ideal candidate will have a proactive approach, excellent stakeholder … management skills, and a solid understanding of operationaltechnology and business processes. Key Responsibilities: Stakeholder Collaboration: Work closely with stakeholders to document and evaluate existing processes, identifying inefficiencies and areas for improvement. Process Analysis: Understand the reasoning behind current practices and recommend optimizations to enhance efficiency, security, and … familiarize yourself with ongoing projects to maintain momentum and meet tight deadlines. Qualifications: Experience: Proven experience as a Business Analyst, preferably within cyber security, operationaltechnology, or related fields. Proactive Approach: Demonstrated ability to independently identify opportunities for improvement and drive impactful change. Stakeholder Engagement: Strong interpersonal skills More ❯
Job Description Position Overview: We are seeking a motivated and detail-oriented OT Business Analyst to support key cybersecurity and operationaltechnology initiatives. This role involves driving process improvements, implementing physical security enhancements, and advancing cyber training and awareness programs. The ideal candidate will have a proactive approach … excellent stakeholder management skills, and a solid understanding of operationaltechnology and business processes. Key Responsibilities: Stakeholder Collaboration: Work closely with stakeholders to document and evaluate existing processes, identifying inefficiencies and areas for improvement. Process Analysis: Understand the reasoning behind current practices and recommend optimizations to enhance efficiency More ❯
exciting opportunity for an experienced Programme Manager with a strong technical background in Cyber Security, Network Information Security, NISCAF, or OperationalTechnology (OT) to join a growing team. This role requires a strategic thinker with the ability to manage complex programmes across different stakeholder groups and communicate clearly … Lead the successful delivery of end-to-end programmes in the cyber security and information security space, with a focus on NISCAF compliance and OT security enhancements. Oversee programme planning, execution, monitoring, and closure across multiple workstreams and technical areas. Collaborate with senior stakeholders, technical teams, and third-party vendors … and continuous improvement across teams. Essential Skills and Experience: Proven experience managing large-scale technical or cyber security programmes. In-depth knowledge of NISCAF , OT security , and network information security frameworks . Strong understanding of risk and regulatory requirements related to cyber and operationaltechnology environments. Demonstrated ability More ❯
exciting opportunity for an experienced Programme Manager with a strong technical background in Cyber Security, Network Information Security, NISCAF, or OperationalTechnology (OT) to join a growing team. This role requires a strategic thinker with the ability to manage complex programmes across different stakeholder groups and communicate clearly … Lead the successful delivery of end-to-end programmes in the cyber security and information security space, with a focus on NISCAF compliance and OT security enhancements. Oversee programme planning, execution, monitoring, and closure across multiple workstreams and technical areas. Collaborate with senior stakeholders, technical teams, and third-party vendors … and continuous improvement across teams. Essential Skills and Experience: Proven experience managing large-scale technical or cyber security programmes. In-depth knowledge of NISCAF , OT security , and network information security frameworks . Strong understanding of risk and regulatory requirements related to cyber and operationaltechnology environments. Demonstrated ability More ❯
exciting opportunity for an experienced Programme Manager with a strong technical background in Cyber Security, Network Information Security, NISCAF, or OperationalTechnology (OT) to join a growing team. This role requires a strategic thinker with the ability to manage complex programmes across different stakeholder groups and communicate clearly … Lead the successful delivery of end-to-end programmes in the cyber security and information security space, with a focus on NISCAF compliance and OT security enhancements. Oversee programme planning, execution, monitoring, and closure across multiple workstreams and technical areas. Collaborate with senior stakeholders, technical teams, and third-party vendors … and continuous improvement across teams. Essential Skills and Experience: Proven experience managing large-scale technical or cyber security programmes. In-depth knowledge of NISCAF , OT security , and network information security frameworks . Strong understanding of risk and regulatory requirements related to cyber and operationaltechnology environments. Demonstrated ability More ❯
We are seeking an experienced OT Solution Designer to support our client in the design and delivery of solutions across their OperationalTechnology landscape. This role will be instrumental in driving solution architecture for OT systems, with a key focus on enhancing OT Enterprise Response & Recovery (ERR) capabilities. … A core part of the role will involve supporting the introduction of OT Applications Backup using Commvault, ensuring solutions meet both operational requirements and enterprise resilience standards. Key Responsibilities: Work closely with our client’s OT and IT teams to design and deliver solutions across complex OT environments. Provide … solution design expertise to support the development of OT Enterprise Response & Recovery (ERR) frameworks and processes. Lead the design and implementation of OT Applications Backup solutions leveraging Commvault technology. Ensure solutions align with the client's cybersecurity, compliance, and operational resilience standards. Collaborate with key stakeholders across infrastructure, security More ❯
We are seeking an experienced OT Solution Designer to support our client in the design and delivery of solutions across their OperationalTechnology landscape. This role will be instrumental in driving solution architecture for OT systems, with a key focus on enhancing OT Enterprise Response & Recovery (ERR) capabilities. … A core part of the role will involve supporting the introduction of OT Applications Backup using Commvault, ensuring solutions meet both operational requirements and enterprise resilience standards. Key Responsibilities: Work closely with our client’s OT and IT teams to design and deliver solutions across complex OT environments. Provide … solution design expertise to support the development of OT Enterprise Response & Recovery (ERR) frameworks and processes. Lead the design and implementation of OT Applications Backup solutions leveraging Commvault technology. Ensure solutions align with the client's cybersecurity, compliance, and operational resilience standards. Collaborate with key stakeholders across infrastructure, security More ❯
Portsmouth, Hampshire, United Kingdom Hybrid / WFH Options
Tria
We're working with a leading organisation in critical infrastructure that is looking for a Vulnerability Analyst (OT) to join their team. This is a fantastic opportunity to contribute to the security of OperationalTechnology (OT) environments, helping to safeguard essential services. The Role: Our client is looking … for someone to: Conduct vulnerability assessments across OT environments to identify security risks. Work closely with internal teams to develop and implement risk mitigation strategies. Monitor and assess emerging threats impacting critical infrastructure. Provide expert guidance on best practices for OT security and compliance. Travel once per quarter to the … South of England for team collaboration. What We're Looking For: Some hands-on experience in OT security or vulnerability management - this could be from working with ICS/SCADA environments, network security, or cyber risk management in OT. A strong understanding of OT vulnerabilities and security frameworks. The ability More ❯
We’re working with a leading organisation in critical infrastructure that is looking for a Vulnerability Analyst (OT) to join their team. This is a fantastic opportunity to contribute to the security of OperationalTechnology (OT) environments , helping to safeguard essential services. The Role: Our client is looking … for someone to: Conduct vulnerability assessments across OT environments to identify security risks. Work closely with internal teams to develop and implement risk mitigation strategies. Monitor and assess emerging threats impacting critical infrastructure . Provide expert guidance on best practices for OT security and compliance. Travel once per quarter to … the South of England for team collaboration. What We’re Looking For: Some hands-on experience in OT security or vulnerability management – this could be from working with ICS/SCADA environments, network security, or cyber risk management in OT. A strong understanding of OT vulnerabilities and security frameworks. The More ❯
Manager. They are looking to become the best performer in its's sector and building a team to achieve this through the provision of technology solutions, as well optimising of current solutions to improve how the company operates. This role works closely with the Cyber Security Architecture Manager, Cyber … Security tools and platforms to enable effective prevention and detection of cyber threats. Drive security orchestration, automation, and response (SOAR) solutions for systems and operational playbooks to enable efficient discovery of security events and response actions. Produce relevant and accurate cyber security metrics dashboards and reports for both technical … an outsourced Managed Security Services (MSS) in an environment with both internal and external IT service providers. Experience with monitoring OperationalTechnology (OT) systems, including Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Experience working within a regulated environment, preferably Energy sector Critical National Infrastructure More ❯
Manager. They are looking to become the best performer in its's sector and building a team to achieve this through the provision of technology solutions, as well optimising of current solutions to improve how the company operates. This role works closely with the Cyber Security Architecture Manager, Cyber … Security tools and platforms to enable effective prevention and detection of cyber threats. Drive security orchestration, automation, and response (SOAR) solutions for systems and operational playbooks to enable efficient discovery of security events and response actions. Produce relevant and accurate cyber security metrics dashboards and reports for both technical … an outsourced Managed Security Services (MSS) in an environment with both internal and external IT service providers. Experience with monitoring OperationalTechnology (OT) systems, including Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Experience working within a regulated environment, preferably Energy sector Critical National Infrastructure More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯
portsmouth, hampshire, south east england, United Kingdom
Americold Logistics, LLC
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OTMore ❯