design decisions leveraging expertise in SuccessFactors and HR processes. * Manage a team of functional leads to deliver compelling end-to-end solutions for clients. * Support Business Change initiatives including impactassessments and future operating models. * Utilize Agile methodologies and tools such as Jira and Focused Build to manage deliverables. * Confidently manage stakeholders, representing the organization to clients, analysts More ❯
ensure IT investments deliver outcomes that matter. What you'll be doing Acting as the primary liaison between business units and IT, ensuring technology supports organisational priorities Leading business impactassessments and readiness planning for digital change Driving adoption of agile, product-based ways of working Overseeing governance and performance of outsourced IT services Advocating for data-led More ❯
ensure IT investments deliver outcomes that matter. What you'll be doing Acting as the primary liaison between business units and IT, ensuring technology supports organisational priorities Leading business impactassessments and readiness planning for digital change Driving adoption of agile, product-based ways of working Overseeing governance and performance of outsourced IT services Advocating for data-led More ❯
Lincoln, England, United Kingdom Hybrid / WFH Options
Hays
ensure IT investments deliver outcomes that matter. What you'll be doing Acting as the primary liaison between business units and IT, ensuring technology supports organisational priorities Leading business impactassessments and readiness planning for digital change Driving adoption of agile, product-based ways of working Overseeing governance and performance of outsourced IT services Advocating for data-led More ❯
keyMoD and RN stakeholders, including: High and low-level security requirements. Risk Management & Accreditation Document Set (RMADS). Legal and regulatory artefacts applicable to the MoD e.g., Data Privacy ImpactAssessments (DPIA). Risk Balance and Security Cases. The provision of security support enables the rapid development and delivery of Navy Digital software and hardware in an agile More ❯
logic and automation. Provide ongoing configuration support based on evolving business needs. Business Analysis & Collaboration Collaborate with business owners to gather, document, and validate requirements for configuration changes. Conduct impactassessments and ensure all proposed changes align with operational and compliance objectives. Liaise with internal teams and third-party providers to coordinate configuration activities. Recommend configuration improvements or More ❯
handling for disabling clients and associated data. Collaborate with technology, data, and business stakeholders to ensure downstream systems handle client disablement correctly. Produce detailed process maps, data lineage, and impact assessments. Work with developers, testers, and architects to define and validate technical solutions and interface changes. Support data quality and reconciliation efforts post-migration to confirm system integrity. Ensure More ❯
changes to business systems, ensuring alignment with organizational objectives. System Architecture & Design: Define and oversee system architecture, ensuring solutions are scalable, secure, and aligned with business needs. Requirements Gathering & Impact Assessment: Work with stakeholders to identify, document, and analyse system change requirements, evaluating potential impacts across business processes. Development & Implementation: Oversee the design, development, and deployment of system enhancements More ❯
changes to business systems, ensuring alignment with organizational objectives. System Architecture & Design: Define and oversee system architecture, ensuring solutions are scalable, secure, and aligned with business needs. Requirements Gathering & Impact Assessment: Work with stakeholders to identify, document, and analyse system change requirements, evaluating potential impacts across business processes. Development & Implementation: Oversee the design, development, and deployment of system enhancements More ❯
changes to business systems, ensuring alignment with organizational objectives. System Architecture & Design: Define and oversee system architecture, ensuring solutions are scalable, secure, and aligned with business needs. Requirements Gathering & Impact Assessment: Work with stakeholders to identify, document, and analyse system change requirements, evaluating potential impacts across business processes. Development & Implementation: Oversee the design, development, and deployment of system enhancements More ❯
changes to business systems, ensuring alignment with organizational objectives. System Architecture & Design: Define and oversee system architecture, ensuring solutions are scalable, secure, and aligned with business needs. Requirements Gathering & Impact Assessment: Work with stakeholders to identify, document, and analyse system change requirements, evaluating potential impacts across business processes. Development & Implementation: Oversee the design, development, and deployment of system enhancements More ❯
changes to business systems, ensuring alignment with organizational objectives. System Architecture & Design: Define and oversee system architecture, ensuring solutions are scalable, secure, and aligned with business needs. Requirements Gathering & Impact Assessment: Work with stakeholders to identify, document, and analyse system change requirements, evaluating potential impacts across business processes. Development & Implementation: Oversee the design, development, and deployment of system enhancements More ❯
changes to business systems, ensuring alignment with organizational objectives. System Architecture & Design: Define and oversee system architecture, ensuring solutions are scalable, secure, and aligned with business needs. Requirements Gathering & Impact Assessment: Work with stakeholders to identify, document, and analyse system change requirements, evaluating potential impacts across business processes. Development & Implementation: Oversee the design, development, and deployment of system enhancements More ❯
compliance with security and governance standards. Conduct root cause analysis of complex issues, implementing long-term solutions to improve stability and user experience. Manage Oracle quarterly update cycles , including impact assessment, regression testing, and communication of changes to users. Design and develop data-driven reporting solutions using OTBI , BI Publisher , and FDA tools to support business intelligence needs. Deliver More ❯
compliance with security and governance standards. Conduct root cause analysis of complex issues, implementing long-term solutions to improve stability and user experience. Manage Oracle quarterly update cycles , including impact assessment, regression testing, and communication of changes to users. Design and develop data-driven reporting solutions using OTBI , BI Publisher , and FDA tools to support business intelligence needs. Deliver More ❯
compliance with security and governance standards. Conduct root cause analysis of complex issues, implementing long-term solutions to improve stability and user experience. Manage Oracle quarterly update cycles , including impact assessment, regression testing, and communication of changes to users. Design and develop data-driven reporting solutions using OTBI , BI Publisher , and FDA tools to support business intelligence needs. Deliver More ❯
Business Sponsor/Product Owner. Lead the business analysis approach to ensure the effective delivery of Enterprise Change initiatives covering activities such as: Confirming nature and scope of change Impact assessment of changes GAP & Options analysis Analysis and documentation of requirements Identification and analysis of solutions Design and implementation of process and organisational changes Interpret business requirements into process More ❯
Define and implement security frameworks, policies, and operating models. Ensure compliance with GDPR, PCI DSS, Cyber Essentials Plus, and ISO/IEC 27001:2022 aligned practices. Lead Data Protection ImpactAssessments (DPIAs), data mapping, classification, and retention programs. Oversee incident response, vulnerability management, patch compliance, and secure configuration baselines using SCCM, Ivanti, Intune, GPO, and Azure Defender. Drive … and response capabilities. Manage hybrid environments, including Azure, AWS, Nutanix, and on-premise infrastructure. Support SD-WAN, cloud Firewalls, CASB, Zero Trust, and SASE architectures. Own enterprise security risk assessments, track key risk indicators (KRIs), and report on cyber maturity to executive leadership. Drive security culture through training, phishing simulations, and awareness programs. Partner with IT, Legal, HR, and … business units to embed security in operations and service delivery. Provide security input for vendor assessments, third-party risk, and M&A due diligence. Candidate Profile: Proven senior leadership experience in information, cyber, or data security. CISSP, CISM, or CISA certified (or equivalent). Track record of delivering security programs aligned to ISO 27001, NIST, PCI DSS, and Cyber More ❯
Define and implement security frameworks, policies, and operating models. Ensure compliance with GDPR, PCI DSS, Cyber Essentials Plus, and ISO/IEC 27001:2022 aligned practices. Lead Data Protection ImpactAssessments (DPIAs), data mapping, classification, and retention programs. Oversee incident response, vulnerability management, patch compliance, and secure configuration baselines using SCCM, Ivanti, Intune, GPO, and Azure Defender. Drive … and response capabilities. Manage hybrid environments, including Azure, AWS, Nutanix, and on-premise infrastructure. Support SD-WAN, cloud Firewalls, CASB, Zero Trust, and SASE architectures. Own enterprise security risk assessments, track key risk indicators (KRIs), and report on cyber maturity to executive leadership. Drive security culture through training, phishing simulations, and awareness programs. Partner with IT, Legal, HR, and … business units to embed security in operations and service delivery. Provide security input for vendor assessments, third-party risk, and M&A due diligence. Candidate Profile: Proven senior leadership experience in information, cyber, or data security. CISSP, CISM, or CISA certified (or equivalent). Track record of delivering security programs aligned to ISO 27001, NIST, PCI DSS, and Cyber More ❯
Define and implement security frameworks, policies, and operating models. Ensure compliance with GDPR, PCI DSS, Cyber Essentials Plus, and ISO/IEC 27001:2022 aligned practices. Lead Data Protection ImpactAssessments (DPIAs), data mapping, classification, and retention programs. Oversee incident response, vulnerability management, patch compliance, and secure configuration baselines using SCCM, Ivanti, Intune, GPO, and Azure Defender. Drive … and response capabilities. Manage hybrid environments, including Azure, AWS, Nutanix, and on-premise infrastructure. Support SD-WAN, cloud firewalls, CASB, Zero Trust, and SASE architectures. Own enterprise security risk assessments, track key risk indicators (KRIs), and report on cyber maturity to executive leadership. Drive security culture through training, phishing simulations, and awareness programs. Partner with IT, Legal, HR, and … business units to embed security in operations and service delivery. Provide security input for vendor assessments, third-party risk, and M&A due diligence. Candidate Profile: Proven senior leadership experience in information, cyber, or data security. CISSP, CISM, or CISA certified (or equivalent). Track record of delivering security programs aligned to ISO 27001, NIST, PCI DSS, and Cyber More ❯
Define and implement security frameworks, policies, and operating models. Ensure compliance with GDPR, PCI DSS, Cyber Essentials Plus, and ISO/IEC 27001:2022 aligned practices. Lead Data Protection ImpactAssessments (DPIAs), data mapping, classification, and retention programs. Oversee incident response, vulnerability management, patch compliance, and secure configuration baselines using SCCM, Ivanti, Intune, GPO, and Azure Defender. Drive … and response capabilities. Manage hybrid environments, including Azure, AWS, Nutanix, and on-premise infrastructure. Support SD-WAN, cloud firewalls, CASB, Zero Trust, and SASE architectures. Own enterprise security risk assessments, track key risk indicators (KRIs), and report on cyber maturity to executive leadership. Drive security culture through training, phishing simulations, and awareness programs. Partner with IT, Legal, HR, and … business units to embed security in operations and service delivery. Provide security input for vendor assessments, third-party risk, and M&A due diligence. Candidate Profile: Proven senior leadership experience in information, cyber, or data security. CISSP, CISM, or CISA certified (or equivalent). Track record of delivering security programs aligned to ISO 27001, NIST, PCI DSS, and Cyber More ❯
data processing, security and confidentiality agreements. Assist with various parts of the Aptos Privacy Program, such as managing our record of processing activities (ROPA), sub-processor lists and privacy assessments (legitimate interest, data protection impactassessments etc). Draft and review customer facing SaaS agreements, professional services agreements and partnership agreements. Review marketing agreements and providing advice More ❯
to convey information clearly and accurately A degree or equivalent working experience Key Responsibilities: Engage with business partners and Operations teams to define, analyze, and prioritize business requirements. Conduct impactassessments and gap analyses to transform business requirements into functional designs. Collaborate with internal technology partners and vendors to implement effective solutions. Assist the project manager in creating … QA environments. Maintain a Vendor defects log for allocated projects and support UAT results validation. Ready to Apply? If you are excited about the prospect of making a significant impact and being part of a forward-thinking team, we would love to hear from you! Apply today to embark on an exhilarating journey with us as a Product Analyst. More ❯
to convey information clearly and accurately A degree or equivalent working experience Key Responsibilities: Engage with business partners and Operations teams to define, analyze, and prioritize business requirements. Conduct impactassessments and gap analyses to transform business requirements into functional designs. Collaborate with internal technology partners and vendors to implement effective solutions. Assist the project manager in creating … QA environments. Maintain a Vendor defects log for allocated projects and support UAT results validation. Ready to Apply? If you are excited about the prospect of making a significant impact and being part of a forward-thinking team, we would love to hear from you! Apply today to embark on an exhilarating journey with us as a Product Analyst. More ❯
to convey information clearly and accurately A degree or equivalent working experience Key Responsibilities: Engage with business partners and Operations teams to define, analyze, and prioritize business requirements. Conduct impactassessments and gap analyses to transform business requirements into functional designs. Collaborate with internal technology partners and vendors to implement effective solutions. Assist the project manager in creating … QA environments. Maintain a Vendor defects log for allocated projects and support UAT results validation. Ready to Apply? If you are excited about the prospect of making a significant impact and being part of a forward-thinking team, we would love to hear from you! Apply today to embark on an exhilarating journey with us as a Product Analyst. More ❯