such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯
such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯
such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯
such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯
such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯
such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯
such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯
such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯
such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯
such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯
such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯
such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯
Doncaster, South Yorkshire, England, United Kingdom
Austin Banks
experience: LAN/WAN, routing/switching, VPNs, firewalls, WiFi, guest networks, DNS/DHCP. Experience with telephony/VoIP systems, business mobile networks, connectivity services. Good understanding of cybersecurity best practices, backup & continuity solutions. Excellent analytical, troubleshooting and diagnostic skills. Strong customer service and communication skills Able to work under pressure and meet SLAs Self-motivated, with a willingness More ❯
context Proficiency in event-driven architecture and its application in digital solutions Proven ability to collaborate closely with delivery teams to ensure successful implementation of digital solutions Certifications in cybersecurity practices (e.g. Certified Information Systems Security Professional (CISSP) or equivalent) Software development and scripting experience to build proof-of-concepts ahead of passing designs to delivery teams Strong knowledge of More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Alexander Edward James Consulting Limited
Drive operational excellence through automation, monitoring, and proactive issue resolution. Security, Compliance & Governance Establish and maintain cloud governance frameworks, security standards, and compliance policies across all regions. Collaborate with cybersecurity teams to implement zero-trust architectures and advanced threat protection. Ensure adherence to global compliance standards including GDPR, ISO 27001, and NIST. Leadership & Collaboration Build and lead a high-performing More ❯
Leominster, Herefordshire, West Midlands, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
Us Different: Purpose: you can use your passion and abilities at Leidos to keep the people you care about safe. We are at the forefront of machine learning, AI, cybersecurity and solutions. Using your skills in the technology frontline by helping to build a safer world. You can inspire change. Collaboration: having flexibility to do your job is one More ❯
value through the innovative use of technology at a rapid pace. We roll up our sleeves to transform business, revolutionize approaches, satisfy customers, and change the game through Architecture, Cybersecurity, Digital Transformation, Enterprise Application and Risk functions. We balance vision with a pragmatic path to change transforming strategies into leading-edge tech platforms, at scale. Practice Area BCG Platinion launched … acquired MAYA Design, a Pittsburgh-based digital design and innovation lab, to grow our capabilities around technology and design. We support our clients' total digital transformation through technology, design, cybersecurity, and risk management & financial engineering capabilities. And together with BCG, BCG Platinion's interdisciplinary team of technical experts enable customized technical solutions and accelerate delivery value through new business platforms More ❯
projects Maintain appropriate process procedures, compliance and service level monitoring, performance reporting and vendor management. Implementing best practices around data security, privacy, and compliance for the teams compliance with cybersecurity and data protection and supporting along with BI lead Strong stakeholder management will be required for maintaining relationships with our business users to clarify and influence requirements. Including liaising More ❯
digital specialists across 30 countries in North America, EMEA, and APAC. Our teams bring extensive cross-sector knowledge in critical technology areas such as mobility, software services, robotics, simulations, cybersecurity, AI, and data analytics, enabling clients to tackle complex challenges in today’s rapidly evolving markets. Scope: Akkodis is launching a new technical delivery team to drive a UK national More ❯
digital specialists across 30 countries in North America, EMEA, and APAC. Our teams bring extensive cross-sector knowledge in critical technology areas such as mobility, software services, robotics, simulations, cybersecurity, AI, and data analytics, enabling clients to tackle complex challenges in today’s rapidly evolving markets. Scope: Akkodis is launching a new technical delivery team to drive a UK national More ❯
watford, hertfordshire, east anglia, united kingdom
Akkodis
digital specialists across 30 countries in North America, EMEA, and APAC. Our teams bring extensive cross-sector knowledge in critical technology areas such as mobility, software services, robotics, simulations, cybersecurity, AI, and data analytics, enabling clients to tackle complex challenges in today’s rapidly evolving markets. Scope: Akkodis is launching a new technical delivery team to drive a UK national More ❯
developers and contributing to technical design discussions Company Summary Join the VSolvit Team! Founded in 2006, VSolvit (pronounced 'We Solve It') is a technology services provider that specializes in cybersecurity, cloud computing, geographic information systems (GIS), business intelligence (BI) systems, data warehousing, engineering services, and custom database and application development. VSolvit is an award winning WOSB, CA CDB, MBE, WBE More ❯
who plans monthly competitions and events. A brilliant breakout room with free breakfast and a pool table. Join a Trusted Partner for Transformative Managed Technology. Experts in Managed IT, CyberSecurity and Communications solutions, our client is on a mission to help small and medium-sized enterprises leverage business technology to achieve their goals. Partnership-focused with a deep and More ❯
who plans monthly competitions and events. A brilliant breakout room with free breakfast and a pool table. Join a Trusted Partner for Transformative Managed Technology. Experts in Managed IT, CyberSecurity and Communications solutions, Tailor Made Technologies (TMT) is on a mission to help small and medium-sized enterprises leverage business technology to achieve their goals. Partnership-focused with a More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Aberdeen
savings could be generated and putting in appropriate controls to help manage departmental budgets and produce reports for show back/charge back models Work with EUS Engineers and CyberSecurity to improve posture of Azure VM’s, aligning to hardening and control standards Creating and managing reporting in relation to AVD performance and usage metrics to improve end user More ❯