Permanent Risk Identification and Mitigation Jobs in the Thames Valley

3 of 3 Permanent Risk Identification and Mitigation Jobs in the Thames Valley

SVP, Engineering

Winnersh, Berkshire, UK
Trustonic
partnership with peers across Product and Operations. You will be responsible for delivering a highly reliable, scalable, and secure platform (TP3) while embedding the engineering discipline, governance, and metrics required to support Trustonic’s next stage of growth. This role requires both strategic oversight and operational excellence, ensuring that Trustonic’s technology remains scalable, performant, reliable … secure access, and code ownership. Manage engineering/infrastructure budgets and provide strategic oversight for FinOps practices, unit economics tracking, and the maintenance of a transparent risk register and remediation plans. Execution and delivery Lead disciplined engineering execution across distributed in-house and outsourced teams. Champion 24/7/365 platform operations with … SLAs, capacity planning, incident response and post-mortems Implement structured software release governance, migration frameworks, and robust QA practices. Drive predictable delivery (quarterly planning, dependency/risk management, quality gates). Establish and enforce best-in-class DevOps, trunk-based, CI/CD, and monitoring standards. Sponsor the adoption of secure SDLC, threat modelling, vulnerability management More ❯
Posted:

Director of Information Security

Oxfordshire, England, United Kingdom
Vertex Search
with strategic business engagement, ensuring that security is seamlessly integrated across all commercial activities. This role will oversee the organization’s security strategy, security operations, vulnerability management, incident response, risk identification and mitigation planning/implementation, identity management, network security, privacy, and compliance. The Director will work closely and report to the Group CISO. Responsibilities Strategic Leadership … security into projects & daily operations. Define and drive the overall security roadmap, ensuring it evolves with the business. Lead security benchmarking and strategic planning Continuous assessment of risk across the organization paired with the ability to implement risk treatment plans that do not hamper innovation. Technical & Operational Oversight Oversee network security architecture, monitoring, and the segmentation of … monitoring, workload protection, and identity governance. Oversee vulnerability management for hybrid cloud environments, integrating tools such as Wiz, Axonius, and ServiceNow. Oversee advanced DLP and insider risk management to protect critical IP. Partner with IT and Operations to ensure resilience in the event of cyber incidents or infrastructure outages. Coordinate penetration testing, red team exercises, and More ❯
Posted:

Director of Information Security

oxford district, south east england, united kingdom
Vertex Search
with strategic business engagement, ensuring that security is seamlessly integrated across all commercial activities. This role will oversee the organization’s security strategy, security operations, vulnerability management, incident response, risk identification and mitigation planning/implementation, identity management, network security, privacy, and compliance. The Director will work closely and report to the Group CISO. Responsibilities Strategic Leadership … security into projects & daily operations. Define and drive the overall security roadmap, ensuring it evolves with the business. Lead security benchmarking and strategic planning Continuous assessment of risk across the organization paired with the ability to implement risk treatment plans that do not hamper innovation. Technical & Operational Oversight Oversee network security architecture, monitoring, and the segmentation of … monitoring, workload protection, and identity governance. Oversee vulnerability management for hybrid cloud environments, integrating tools such as Wiz, Axonius, and ServiceNow. Oversee advanced DLP and insider risk management to protect critical IP. Partner with IT and Operations to ensure resilience in the event of cyber incidents or infrastructure outages. Coordinate penetration testing, red team exercises, and More ❯
Posted: