and administration while supporting end-users and the organisation. Key Responsibilities are but not limited to: Researching and recommending future technology to enhance business operations Ensuring the company's cybersecurity meets industry compliance regulations and remains fully licensed Remaining up to date on the latest software developments to determine how they can positively impact the business Managing relationships with More ❯
tactical fighter aircraft ongoing major upgrades Several programs within the Phantom Works organization MQ-25 - Autonomous Carrier Landing Vehicles for the Navy Engineering Capability Centers - specialized engineering for Platform Cybersecurity, Product Security, Flight Simulation, Radar Development, and Advanced Mission Systems Precision Engagement Systems (PES) including Direct Attack weapons (JDAM, SDB, MOP, HAAWC and associated derivatives) and Cruise Missiles (SLAM ER More ❯
tactical fighter aircraft ongoing major upgrades Several programs within the Phantom Works organization MQ-25 - Autonomous Carrier Landing Vehicles for the Navy Engineering Capability Centers - specialized engineering for Platform Cybersecurity, Product Security, Flight Simulation, Radar Development, and Advanced Mission Systems Precision Engagement Systems (PES) including Direct Attack weapons (JDAM, SDB, MOP, HAAWC and associated derivatives) and Cruise Missiles (SLAM ER More ❯
tactical fighter aircraft ongoing major upgrades Several programs within the Phantom Works organization MQ-25 - Autonomous Carrier Landing Vehicles for the Navy Engineering Capability Centers - specialized engineering for Platform Cybersecurity, Product Security, Flight Simulation, Radar Development, and Advanced Mission Systems Precision Engagement Systems (PES) including Direct Attack weapons (JDAM, SDB, MOP, HAAWC and associated derivatives) and Cruise Missiles (SLAM ER More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Method Resourcing
reliability and scalability of their models in production environments. What You'll Do Spearhead the design and refinement of machine learning models focused on understanding behaviour patterns and identifying cybersecurity anomalies. Partner with product, engineering, and domain experts to translate strategic goals and customer needs into practical, scalable ML solutions. Drive model development end-to-end, from exploratory analysis, feature … Strong written and verbal communication skills, especially in cross-functional contexts. Bonus Experience (Nice to Have) Exposure to large language models (LLMs) or foundational model adaptation. Previous work in cybersecurity, anomaly detection, or behavioural analytics. Familiarity with orchestration frameworks (Airflow or similar). Experience with scalable ML systems, pipelines, or real-time data processing. Advanced degree or equivalent experience in More ❯
customer facing work. Commvault Certified Engineer is highly desirable. Experience with cross-platform integrations of Commvault with cloud services (Azure Backup, AWS S3, Google Cloud Storage). Experience in cybersecurity best practices related to data protection, ransomware mitigation, and compliance standards Exposure to ITIL best practices and service management frameworks. Experience leading backup and disaster recovery projects, including migrations and More ❯
customer facing work. Commvault Certified Engineer is highly desirable. Experience with cross-platform integrations of Commvault with cloud services (Azure Backup, AWS S3, Google Cloud Storage). Experience in cybersecurity best practices related to data protection, ransomware mitigation, and compliance standards Exposure to ITIL best practices and service management frameworks. Experience leading backup and disaster recovery projects, including migrations and More ❯
london (battersea), south east england, united kingdom
Databarracks
customer facing work. Commvault Certified Engineer is highly desirable. Experience with cross-platform integrations of Commvault with cloud services (Azure Backup, AWS S3, Google Cloud Storage). Experience in cybersecurity best practices related to data protection, ransomware mitigation, and compliance standards Exposure to ITIL best practices and service management frameworks. Experience leading backup and disaster recovery projects, including migrations and More ❯
Prolific is not just another player in the AI space-we are the architects of the human data infrastructure that's reshaping the landscape of AI development. In a world where foundational AI technologies are increasingly commoditized, it's the More ❯
Prolific is not just another player in the AI space-we are the architects of the human data infrastructure that's reshaping the landscape of AI development. In a world where foundational AI technologies are increasingly commoditized, it's the More ❯
tactical fighter aircraft ongoing major upgrades Several programs within the Phantom Works organization MQ-25 Autonomous Carrier Landing Vehicles for the Navy Engineering Capability Centers specialized engineering for Platform Cybersecurity, Product Security, Flight Simulation, Radar Development, and Advanced Mission Systems Precision Engagement Systems (PES) including Direct Attack weapons (JDAM, SDB, MOP, HAAWC and associated derivatives) and Cruise Missiles (SLAM ER More ❯
tactical fighter aircraft ongoing major upgrades Several programs within the Phantom Works organization MQ-25 Autonomous Carrier Landing Vehicles for the Navy Engineering Capability Centers specialized engineering for Platform Cybersecurity, Product Security, Flight Simulation, Radar Development, and Advanced Mission Systems Precision Engagement Systems (PES) including Direct Attack weapons (JDAM, SDB, MOP, HAAWC and associated derivatives) and Cruise Missiles (SLAM ER More ❯
tactical fighter aircraft ongoing major upgrades Several programs within the Phantom Works organization MQ-25 Autonomous Carrier Landing Vehicles for the Navy Engineering Capability Centers specialized engineering for Platform Cybersecurity, Product Security, Flight Simulation, Radar Development, and Advanced Mission Systems Precision Engagement Systems (PES) including Direct Attack weapons (JDAM, SDB, MOP, HAAWC and associated derivatives) and Cruise Missiles (SLAM ER More ❯
tactical fighter aircraft ongoing major upgrades Several programs within the Phantom Works organization MQ-25 Autonomous Carrier Landing Vehicles for the Navy Engineering Capability Centers specialized engineering for Platform Cybersecurity, Product Security, Flight Simulation, Radar Development, and Advanced Mission Systems Precision Engagement Systems (PES) including Direct Attack weapons (JDAM, SDB, MOP, HAAWC and associated derivatives) and Cruise Missiles (SLAM ER More ❯
tactical fighter aircraft ongoing major upgrades Several programs within the Phantom Works organization MQ-25 Autonomous Carrier Landing Vehicles for the Navy Engineering Capability Centers specialized engineering for Platform Cybersecurity, Product Security, Flight Simulation, Radar Development, and Advanced Mission Systems Precision Engagement Systems (PES) including Direct Attack weapons (JDAM, SDB, MOP, HAAWC and associated derivatives) and Cruise Missiles (SLAM ER More ❯
tactical fighter aircraft ongoing major upgrades Several programs within the Phantom Works organization MQ-25 Autonomous Carrier Landing Vehicles for the Navy Engineering Capability Centers specialized engineering for Platform Cybersecurity, Product Security, Flight Simulation, Radar Development, and Advanced Mission Systems Precision Engagement Systems (PES) including Direct Attack weapons (JDAM, SDB, MOP, HAAWC and associated derivatives) and Cruise Missiles (SLAM ER More ❯
tactical fighter aircraft ongoing major upgrades Several programs within the Phantom Works organization MQ-25 Autonomous Carrier Landing Vehicles for the Navy Engineering Capability Centers specialized engineering for Platform Cybersecurity, Product Security, Flight Simulation, Radar Development, and Advanced Mission Systems Precision Engagement Systems (PES) including Direct Attack weapons (JDAM, SDB, MOP, HAAWC and associated derivatives) and Cruise Missiles (SLAM ER More ❯
digital specialists across 30 countries in North America, EMEA, and APAC. Our teams bring extensive cross-sector knowledge in critical technology areas such as mobility, software services, robotics, simulations, cybersecurity, AI, and data analytics, enabling clients to tackle complex challenges in today’s rapidly evolving markets. Scope Akkodis is establishing a pioneering IT & Digital Centre of Excellence (CoE), designed to More ❯
a commitment to continuous learning Ability to work independently and as part of a team Desired Skills & Experience Bachelor's degree in a related field Technical background (software, IT, cybersecurity, legal) OR sales experience with technical aptitude. Demonstrated experience and knowledge of the client's product portfolio and service s, with a proven track record of working with mid-to … licensing agreements. Ability to review and interpret complex licensing contracts and terms, identifying key clauses and potential risks related to compliance. Experience in software asset management (SAM), IT compliance, cybersecurity, or customer success management. Relevant certifications (e.g. CSAM) are a plus Deliverables - responsibilities but not limited to; Own and manage a defined territory and portfolio of Corporate customers and oversee More ❯
support, workplace technology, and the coordination of infrastructure-related activities. This role combines technical expertise with oversight responsibilities in a centrally managed IT environment, where core services - such as cybersecurity, networking, and systems architecture - are governed by Group IT. The position operates within a high-demand trading floor environment, where technology plays a mission-critical role. It requires strong operational … and systems architecture. Ensure compliance with global policies on patching, endpoint protection, and data management. Coordination with Central IT and External Providers Interface with Group IT teams responsible for cybersecurity, networking, and infrastructure. Coordinate on-site interventions with external system engineers and technology vendors (e.g., mobile providers, AV specialists). Act as the local lead for IT-related activities during … operations. Proficiency in Windows OS, Microsoft 365, endpoint management tools, and networking fundamentals. Experience with remote support tools, asset management systems and mobile device management (MDM). Familiarity with cybersecurity best practices and endpoint compliance. Ability to manage external service providers and collaborate in a matrixed IT environment. Proactive, service-oriented mindset with strong communication and prioritization skills. How to More ❯
environments. Demonstrated ability to manage IT budgets and third-party suppliers. Strong interpersonal and service delivery skills. Advanced technical knowledge of enterprise systems and productivity tools. Demonstrated experience managing cybersecurity operations, with a strong understanding of ISO27001 compliance frameworks and best practices. If you're a seasoned IT Operations Manager with a passion for leadership, infrastructure excellence, and customer-focused More ❯
and implement corrective actions on current platform(s). - Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) - Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. - Develop and maintain security incident response plans and procedures. - Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. - Deploy More ❯
and maintenance (Microsoft SQL/Access). Familiarity with MS Dynamics, MS Active Directory, Office 365, and cloud platforms. Understanding of LIMS set up and communication protocols. Experience in Cybersecurity essentials desirable but not essential. Apply: It is essential all applicants hold entitlement to work in the UK. Please quote job reference (Apply online only) in all correspondence. If More ❯
Experience in image processing System design for software products Understanding of sensor calibration and sensor models Machine Learning Kubernetes, Docker and/or Ansible Microservice architecture Database management Geodata Cybersecurity Vulkan Working with constraint memory and resources Recent experience with Python Computer Vision and Remote Sensing knowledge Understanding of Geographic Information Systems (GIS) Familiar with aerial navigation systems Usage More ❯
the Role The IT Risk Director will play a pivotal role in managing and enhancing the Group's IT Risk Framework. This includes oversight of technology-related risks spanning cybersecurity, infrastructure, systems integrity, and emerging technologies such as AI. Reporting directly to senior risk executives, the role offers unmatched visibility and influence across a rapidly growing insurance platform with More ❯