new projects or systems. Collaborate with IT and engineering teams to identify, address, and continuously improve security control effectiveness. Oversee the management of external security assessments and ensure remediation plans are executed effectively. Maintain relevant security certifications such as Cyber Essentials/Plus and support the business in aligning with broader security frameworks (e.g., NIST CSF, CIS Controls More ❯
track key vendor SLAs, ensuring compliance with contractual obligations. Monitor vendor performance against SLAs and KPIs, proactively identifying risks and issues. Ensure vendors provide root cause analysis and remediation plans for SLA breaches or service incidents. Work with internal teams to escalate vendor-related issues and drive improvements. Governance & Relationship Management Develop and maintain a comprehensive vendor governance More ❯
with broader assurance frameworks (e.g. NIST CSF, Cyber Essentials). Shape and implement the company's information security strategy , including policy, tooling, and training. Conduct risk assessments, oversee remediation plans, and guide secure-by-design approaches across projects. Provide technical leadership in areas including threat intelligence, compliance reporting, and incident response . Support regulatory and internal audits, contributing More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Reed Technology
with broader assurance frameworks (e.g. NIST CSF, Cyber Essentials). Shape and implement the company's information security strategy , including policy, tooling, and training. Conduct risk assessments, oversee remediation plans, and guide secure-by-design approaches across projects. Provide technical leadership in areas including threat intelligence, compliance reporting, and incident response . Support regulatory and internal audits, contributing More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
with broader assurance frameworks (e.g. NIST CSF, Cyber Essentials). Shape and implement the company's information security strategy , including policy, tooling, and training. Conduct risk assessments, oversee remediation plans, and guide secure-by-design approaches across projects. Provide technical leadership in areas including threat intelligence, compliance reporting, and incident response . Support regulatory and internal audits, contributing More ❯
leading the charge on modern, cloud-first security strategy. Responsibilties: Designing and implementing robust security policies, controls, and infrastructure protection strategies. Leading vulnerability management efforts, penetration testing, and remediation plans. Monitoring and investigating security events, managing incident response processes end-to-end. Ensuring compliance with security standards such as ISO 27001 and supporting audits and certifications. Collaborating across More ❯
security incident response with SOC, Threat Intelligence, and Red/Blue teams. Engage with technical and business teams on cyber risk reduction strategies. Contribute to vulnerability management and remediation plans. Required Skills & Experience Proven experience managing DFIR or cyber incident response teams. Deep technical knowledge of IR and forensic analysis (eg Wireshark, packet capture, host-based artifacts). More ❯
and enhance Group Policy Objects (GPOs) and configuration baselines. Ensure compliance with cybersecurity policies , regulatory requirements, and internal standards. Participate in audit and risk assessments , providing documentation and remediation plans as needed. Mentor junior engineers and contribute to knowledge sharing across the team. Required Skills & Experience: Extensive desktop engineering experience, preferably in Investment Banking . Expert-level knowledge More ❯
experience working on IT security-related issues. Management or supervisory experience. Experience in managing and motivating technical teams Ability to understand vulnerability scans and penetration tests and develop remediation plans. Experience developing and implementing cyber security policies, processes, and procedures. Experience managing phishing simulation & training and awareness campaigns. Experience with vulnerability scanning, incident response, and third-party risk … experience working on IT security-related issues. oManagement or supervisory experience. oExperience in managing and motivating technical teams oAbility to understand vulnerability scans and penetration tests and develop remediation plans. oExperience developing and implementing cyber security policies, processes, and procedures. oExperience managing phishing simulation & training and awareness campaigns. oExperience with vulnerability scanning, incident response, and third-party risk More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Barden
Risk, Controls) to ensure appropriate input, ownership, and challenge across the transformation lifecycle. Prepare assurance updates and risk-based reporting for senior leadership, outlining control performance, risks, and remediation plans. Collaborate with internal and external auditors as needed, providing evidence and insight into programme assurance activity. ABOUT THE PERSON: Experienced in project assurance, IT controls assurance, or programme More ❯
Risk, Controls) to ensure appropriate input, ownership, and challenge across the transformation lifecycle. Prepare assurance updates and risk-based reporting for senior leadership, outlining control performance, risks, and remediation plans. Collaborate with internal and external auditors as needed, providing evidence and insight into programme assurance activity. ABOUT THE PERSON: Experienced in project assurance, IT controls assurance, or programme More ❯
and application owners to address identified vulnerabilities and implement necessary patches or configuration changes. - Develop and maintain a comprehensive vulnerability management program, including vulnerability tracking, risk assessment, and remediation planning. Stakeholder Collaboration: - Act as a stakeholder for the response team, providing expert guidance on security-related alerts, incidents, and potential improvements. - Collaborate with cross-functional teams, including network More ❯
City of London, London, United Kingdom Hybrid / WFH Options
JSS Search
in data governance, regulatory reporting, and data quality management. Proficiency in metadata management and regulatory data documentation. Demonstrated ability to design data controls, perform data profiling, and support remediation planning. Experience building data visualisations and dashboards with Tableau Proficiency in Alteryx, SQL, and similar data preparation/analytics tools. Understanding of BCBS 239 data lineage principles and data More ❯
in data governance, regulatory reporting, and data quality management. Proficiency in metadata management and regulatory data documentation. Demonstrated ability to design data controls, perform data profiling, and support remediation planning. Experience building data visualisations and dashboards with Tableau Proficiency in Alteryx, SQL, and similar data preparation/analytics tools. Understanding of BCBS 239 data lineage principles and data More ❯
assessments for new and existing systems and projects Leading external risk reviews for supply chain and third parties Maintaining and reviewing the cyber risk register, ensuring controls and remediation plans are in place and effective. Tracking and escalating cyber risk activities, ensuring timely action from stakeholders. Collaborating with business units to enhance control processes in line with the More ❯
helping to develop, test, and roll out reports to end users. Provide ongoing support for the production and delivery of these reports. Take ownership of incidents and define remediation plans, with the support of the wider team, to ensure production issues are resolved in line with WRBU's triage process. Data Validation : Assist in developing, implementing, and embedding More ❯
helping to develop, test, and roll out reports to end users. Provide ongoing support for the production and delivery of these reports. Take ownership of incidents and define remediation plans, with the support of the wider team, to ensure production issues are resolved in line with WRBU's triage process. Data Validation : Assist in developing, implementing, and embedding More ❯
microservices, and infrastructure components. Manage internal and external penetration testing engagements for Funding Circle applications, services, and cloud infrastructure. Oversee and enhance vulnerability management processes, focusing on strategic remediation, root cause analysis, and preventative measures. Contribute to drive implementation of security automation across cloud infrastructure configuration, vulnerability management, and compliance monitoring. Design, implement, and support the adoption of … security and securing container orchestration platforms (Kubernetes/EKS). Proven ability contributing significantly to vulnerability management programs, including advanced triaging, root cause analysis, risk assessment, and strategic remediation planning. Strong communication and influencing skills, with the ability to articulate complex security concepts clearly to technical audiences. Strong knowledge of relevant security frameworks and standards (e.g., NIST CSF … CIS Benchmarks, OWASP ASVS). Exposure and knowledge of the MITRE ATT&CK framework. Experience effectively coordinating external penetration testing engagements and managing remediation efforts. Nice to have Relevant advanced security certifications (e.g., AWS Certified Security - Specialty, CISSP, CCSP, OSCP/OSWE). Experience with specific security platforms/tools (e.g., Wiz, Snyk, Checkmarx, Veracode). Proficiency in More ❯
Tracking:Regularly assess and track the performance of regionaldelivery partners, ensuring that partners are meeting Temenos' deliverystandards. This includes project quality, timelines, customersatisfaction, and adherence to internal processes. RemediationPlanning: Raise performance issueswith the delivery partners and identify potential trends to be addressedby actions to be improved up to and including formally documentedremediation plans. Governance Compliance:Monitor and More ❯
based on risk and potential impact and utilise threat intelligence analysis to determine the risk posed by identified vulnerabilities. Collaborate with the IT MSP to develop and implement remediation plans, drive remediation efforts and identify improvements in the vulnerability management program. Monitor and track the status of identified vulnerabilities and ensure timely resolution. Security Monitoring and More ❯
based on risk and potential impact and utilise threat intelligence analysis to determine the risk posed by identified vulnerabilities. Collaborate with the IT MSP to develop and implement remediation plans, drive remediation efforts and identify improvements in the vulnerability management program. Monitor and track the status of identified vulnerabilities and ensure timely resolution. Security Monitoring and More ❯
and ongoing risk assessments of third-party vendors, ensuring compliance with industry standards and best practices. Develop and maintain ongoing monitoring mechanisms for third-party risks, ensuring timely remediation of identified issues. Conducting in-depth supplier IT risk assessments by reviewing supplier answers to the cyber supplier questionnaire, documenting controls and identifying gaps and inconsistencies. Developing a new … to train other models. Conducting specific risk assessments on suppliers utilizing OT, IoT, and ML technologies to ensure compliance with data protection and regulatory requirements. Developing and implementing remediation plans for identified security gaps working directly with vendors to enforce corrective actions Maintaining detailed records of vendor assessments, risk profiles and mitigation plans to ensure transparency and regulatory More ❯
Act as primary point of contact for parent company security audits Develop and maintain security compliance documentation Coordinate and respond to penetration testing activities Implement security recommendations and remediation plans Ensure infrastructure meets corporate security standards Participate in security incident response planning Business Continuity: Lead disaster recovery planning for scientific computing infrastructure Coordinate and execute DR testing Maintain … are met Financial Planning & Technical Debt: Develop long-term capital planning for infrastructure Manage infrastructure budget and forecasting for AskBio European locations Identify and track technical debt Create remediation plans for technical debt Provide cost-benefit analysis for infrastructure investments Manage infrastructure lifecycle planning Develop business cases for infrastructure improvements Key Competencies: Technical: Infrastructure architecture and design Performance More ❯
the following: CompTIA Security+; CompTIA Network+; ISC2 (CISSP); SANS-GIAC certification (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT); CISCO (CCNA); EC-Council (CEH, LPT). Experience communicating remediation recommendations and strategies to technical staff, executive leadership, legal counsel, and internal and external clients. Experience in incident response remediation or disaster recovery. Excellent written and verbal … technical support for security tools and assist with security tool implementation and integration into the customer environment. You will also provide guidance on the development of containment and remediation plans for cyber security incidents. In addition, you will be the technical advocate for information security requirements and provide information of the security domain. You will execute on both More ❯