Prevention Senior Specialist to oversee the identification and management of fraud and operational risks across PingPong’s global payment network, embedding effective controls into both cross-border systems and local market operations. WHAT’S THE CHALLENGE? You will participate in identifying, assessing, and controlling fraud, money laundering, terrorist financing, sanction and operational risks across PingPong's global … transactions in line with company’s policies and risk appetite. Monitor customer transactions in real-time to detect and prevent suspicious or fraudulent activities. Review and analyse customer information and documentation to assess risk levels and identify red flags. Collaborate with Product and Risk Strategy teams to embed risk signals, fraud controls, and compliance requirements directly into systems. More ❯
london (city of london), south east england, united kingdom
PingPong Payments
Prevention Senior Specialist to oversee the identification and management of fraud and operational risks across PingPong’s global payment network, embedding effective controls into both cross-border systems and local market operations. WHAT’S THE CHALLENGE? You will participate in identifying, assessing, and controlling fraud, money laundering, terrorist financing, sanction and operational risks across PingPong's global … transactions in line with company’s policies and risk appetite. Monitor customer transactions in real-time to detect and prevent suspicious or fraudulent activities. Review and analyse customer information and documentation to assess risk levels and identify red flags. Collaborate with Product and Risk Strategy teams to embed risk signals, fraud controls, and compliance requirements directly into systems. More ❯
technical faults. Customer Service Perfection: Provide exceptional service, ensuring a positive experience for panel members. Educate and encourage proper care and usage of metering equipment. Compliance and Data Management: Make follow-up calls to address compliance issues or resolve technical problems. Accurately log home activity and update central databases with detailed information about installed equipment. Collaboration … view than anyone else. Combining our expertise in human understanding with advanced technologies, Kantar's 25000 people help the world's leading organisations succeed and grow. Privacy For information about how Kantar processes your personal data in the job application process, please click here to read our candidate privacy notice. More ❯
products of which the complexity, diversity and level of risk lead to implement strong organisations to control and report drive by architecture and process rationalisation across locations. The management of these activities have to be compliant with a regulation more and more strong regarding data quality, completeness and availability of the information. Objectives The purpose of the role … issues and budget tracking Escalate issues as required to the appropriate stakeholders Measure and report benefits deliver process analysis and business requirements to time and quality Be accountable for systems and process documentation Participation in the Test strategy definition and coordinate UAT. Ensure all project documentation is appropriately approved Ensure process and architectures are aligned and simplified Escalate issues … Institute (PMI) or Lean Six Sigma certification (Green belt) highly desirable ̈Knowledge of BTF project methodology ̈French Tax knowledge ̈Liquidity and Regulatory capital knowledge. ̈Knowledge of trading systems: Summit, Sophis, Murex, Calypso The role will be based in Krakow Poland part of Finance Product Control Change. Salary will be circa £70K or up to circa Euros 85K. More ❯
or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading information security company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … creating policies for the secure and ethical use of AI. While the primary focus is on AI, you will also apply your expertise to broader GRC projects, including information security assessments, ISO 27001 audits, and general information security consulting. The ability to be adaptable and work on a variety of projects is essential. Essential experience and … skills: A strong foundation in traditional GRC, demonstrated by significant experience in auditing and implementing Information Security Management Systems. A recognised ISO 27001 qualification (e.g., Lead Auditor or Lead Implementer) is essential. You must be able to apply this rigorous mindset to new challenges. Demonstrable, hands-on experience applying AI governance principles. This must include practical More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading information security company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … creating policies for the secure and ethical use of AI. While the primary focus is on AI, you will also apply your expertise to broader GRC projects, including information security assessments, ISO 27001 audits, and general information security consulting. The ability to be adaptable and work on a variety of projects is essential. Essential experience and … skills: A strong foundation in traditional GRC, demonstrated by significant experience in auditing and implementing Information Security Management Systems. A recognised ISO 27001 qualification (e.g., Lead Auditor or Lead Implementer) is essential. You must be able to apply this rigorous mindset to new challenges. Demonstrable, hands-on experience applying AI governance principles. This must include practical More ❯
security assessment by the Lead ITRC Security Analyst includes third party security and overall security program effectiveness in mitigating risk. The ITRC Analyst's goal to create actionable information for IT and business leadership, and to provide objective assessment of cyber security risks for auditors, regulators and external parties. This requires routinely authoring detailed reports and gathering metrics … ensure stakeholders receive accurate and complete information. The Lead ITRC tkeeps abreast of external cyber security trends, technologies and cyber risk management approaches, and often works with other teams on cyber risk-related initiatives to provide subject-matter recommendations and guidance to achieve a posture within the bank's overall risk appetite. The Lead ITRC serves as an … specialization.Provides input on resources planning, procedures," WHAT WILL YOU DO? "Define analysis objectives, collect data from internal and external sources, and evaluate/analyze data to provide objective information on cyber risks for IT and business management with both summary and detailed reporting Assess risk within subject specialty area to evaluate the design and effectiveness of More ❯
Job Summary: Marathon TS is seeking a Domain Specialist to provide specialized expertise across various domains, including systems, business, technical, cultural, protocol, or management subjects. The ideal candidate will have deep knowledge and proficiency in their area of expertise, with the ability to offer insights, perform complex problem-solving, and bridge any gaps in understanding across various … to ensure seamless communication within the organization. Key Responsibilities: Serve as a subject matter expert in specific domains, including but not limited to technical, business, cultural, protocol, or management areas. Provide in-depth analysis, guidance, and strategic recommendations to stakeholders and leadership based on specialized knowledge. Offer language interpretation and translation support to ensure effective communication between parties … particularly in international or cross-cultural settings. Troubleshoot and resolve domain-specific issues by leveraging specialized knowledge and resources. Qualifications: Proven expertise in one or more specialized domains, including systems, business, technical, cultural, protocol, or management. Demonstrated ability to provide language interpretation and translation services with high proficiency. Strong analytical and problem-solving skills with the ability to apply More ❯
Job Summary: Marathon TS is seeking a Domain Specialist to provide specialized expertise across various domains, including systems, business, technical, cultural, protocol, or management subjects. The ideal candidate will have deep knowledge and proficiency in their area of expertise, with the ability to offer insights, perform complex problem-solving, and bridge any gaps in understanding across various … to ensure seamless communication within the organization. Key Responsibilities: Serve as a subject matter expert in specific domains, including but not limited to technical, business, cultural, protocol, or management areas. Provide in-depth analysis, guidance, and strategic recommendations to stakeholders and leadership based on specialized knowledge. Offer language interpretation and translation support to ensure effective communication between parties … particularly in international or cross-cultural settings. Troubleshoot and resolve domain-specific issues by leveraging specialized knowledge and resources. Qualifications: Proven expertise in one or more specialized domains, including systems, business, technical, cultural, protocol, or management. Demonstrated ability to provide language interpretation and translation services with high proficiency. Strong analytical and problem-solving skills with the ability to apply More ❯
government regulations, and company policies. Support transition planning, onboarding, and offboarding for personnel assigned to the contract. Required Qualifications: Active Secret clearance. Bachelor's degree in Business Administration, Management, Information Technology, or related field. 8+ years of experience in client relationship management, program management, or account management in federal IT … requirements. Excellent communication, interpersonal, and presentation skills. Ability to lead cross-functional teams and influence stakeholders at all levels. Proficient in Microsoft Office Suite, collaboration tools, and contract management systems. Preferred Qualifications: Experience on Department of Defense (DoD) or Intelligence Community (IC) contracts. PMP, CSM, or other relevant project management certifications. Experience with IT service delivery More ❯
virtual leadership experience Senior Business Designer or Head of CX/SX experience with proven ability to lead virtually and influence across complex enterprise environments, preferably in Wealth Management, Asset Management, or Financial Services. Track record of leading CX/SX functions through collaborative partnerships that deliver pragmatic business outcomes. Experience leading virtual teams and driving … in collaborative design tools (Miro, Figma) with ability to facilitate virtual cross-team workshops. Practical experience with digital ecosystems including Salesforce, CRM, and MarTech solutions. Balanced expertise in information architecture, interaction design, visual design, and prototyping with focus on feasible implementation. Collaborative & pragmatic leadership competencies Systematic yet flexible approach to identifying realistic opportunities and implementing practical solutions through … orchestrated delivery methods. Exceptional virtual leadership and stakeholder management skills with ability to build consensus and drive decision-making across diverse, distributed groups. This is an orchestra conductor role that requires influence, credibility and clout with resources that report to other functional heads. Talent for translating customer insights into actionable, implementable business strategies across enterprise functions. Strong collaborative More ❯
onsite in Huntsville, AL. Responsibilities: • Monitor & Analyze user activity data to detect anomalous behavior and potential insider threats. • Triage & Investigate alerts, documenting findings and reporting them through case management systems. • Develop & Implement countermeasures against known adversarial tactics, techniques, and procedures (TTPs). • Collaborate with cybersecurity, counterintelligence, and law enforcement teams to refine detection strategies. • Conduct Forensic Analysis on … integrating multiple security data sources and refining detection triggers. • Provide Briefings & Reports to leadership on trends, risks, and mitigation strategies. Required Experience: • Education: Bachelor's degree in cybersecurity, information assurance, or related field (or equivalent experience). • Experience: o 3 years relevant experience in UAM or insider threat detection, including bility to develop dashboards, filters, and audit policy More ❯
onsite in Washington, DC. Responsibilities: • Monitor & Analyze user activity data to detect anomalous behavior and potential insider threats. • Triage & Investigate alerts, documenting findings and reporting them through case management systems. • Develop & Implement countermeasures against known adversarial tactics, techniques, and procedures (TTPs). • Collaborate with cybersecurity, counterintelligence, and law enforcement teams to refine detection strategies. • Conduct Forensic Analysis on … integrating multiple security data sources and refining detection triggers. • Provide Briefings & Reports to leadership on trends, risks, and mitigation strategies. Required Experience: • Education: Bachelor's degree in cybersecurity, information assurance, or related field (or equivalent experience). • Experience: o 3 years relevant experience in UAM or insider threat detection, including bility to develop dashboards, filters, and audit policy More ❯
continually develop your data analyst skills. Opportunities to extend further into Python are available. You will have experience with BI visualisation tools (Tableau, Power BI, Looker...). Additional Information Your impact on Radius will be rewarded with the opportunity to develop and progress your career in many directions. You’ll also have access to our competitive reward and More ❯
Description The InformationSystems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/… or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to … ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for More ❯
InformationSystems Security Officer 2 & 3 Provide support for a program, organization, system, or enclave's information assurance program. Provide support for proposing, coordinating, implementing, and enforcing informationsystems security policies, standards, and methodologies. Maintain operational security posture for an informationsystem or program to ensure informationsystems … ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configuration management (CM) for informationsystems security software, hardware, and firmware. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment … SRTMs). Support security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF). The Level 2 InformationSystems Security Officer shall possess the following capabilities: • Provide support to senior ISSOs for implementing, and enforcing informationsystems security policies, standards, and methodologies. • Assist with preparation More ❯
The InformationSystems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Supports the building of security architectures. … Responsibilities • Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. • Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate … information security functionality to ensure uniform application of security policy and enterprise solutions. • Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. • Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. • Contributes to More ❯
BCT is seeking an ISSO to serve as a principal advisor to the Government on all matters, technical and otherwise, involving the security of an InformationSystem (IS) A career at BCT-LLC says you want to contribute and make a difference to something larger than yourself where success results from the dedication our team members have in … strategies. o Utilize XACTA, the system of record for SCA data. Individual Capabilities/Experience Required: o Bachelor's degree or advanced degree in computer science, informationsystems, engineering or other related discipline plus at least 20 years of systems engineering experience. A Master's degree or PhD may be substituted for two years of experience. … A high school diploma or GED plus 24 years of systems engineering experience would also be acceptable (adjust experience levels appropriately for labor category) o DoD8570 compliance with Information Assurance Technical (IAT) Level 2 or higher is required. o Strong experience as an ISSO with the customer. o Position requires TS/SCI clearance with polygraph. Individual More ❯
The InformationSystems Security Engineer II Hanover, MD TS/SCI Full Scope Polygraph The InformationSystems Security Engineer II (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and … verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects … and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architecture. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. More ❯
Maintain the appropriate operational security posture for assigned systems, programs, and/or enclaves. • Provide guidance and technical expertise on all matters that impact or effect the security of the information system. • Assist in the development and execution of an enterprise level continuous monitoring program to minimize security risks and ensure compliance with that program on a … routine basis. • Developing, updating, and submitting the System Security Plan and other required documentation that make up the Security Authorization Package. • Conduct configuration management for security-relevant changes to software, hardware, and firmware. • Perform and deliver security impact analyses of changes to the system or its environment … of operation. • Assess the effectiveness of system security controls on an ongoing basis to determine system security status. • Maintain and enforce IT security policies and implementation guidelines for customer systems in diverse operational environments. • Provides configuration management for security-relevant informationsystem software, hardware, and firmware. " Education and Experience: • 10 years of related work experience More ❯
Powder River Industries, LLC provides technical services across the entire system development life cycle (SDLC). As a prime, we are responsible for complete end to end systemmanagement for a … customer's mission system. This includes a data center, integrated logistics support, COOP, and disaster recovery. As a subcontractor we are providing services from: DevSecOps, software development, network administration, systems analysis, database administration, storage engineering, hardware engineering, Tier 1 - Tier 3 support in traditional data center environments (bare metal frames), cloud, and hybrid cloud. The cloud environments we are … M activities related to ATO Asset where possible in completing POA&M activities. -Ensuring the implementation of DOE and NNSA cybersecurity policies and procedures for designated informationsystems Conducting the Assessment and Authorization (A&A) activities for designated systems -Documenting the implementation of protection measures within the security plan for the systems -Ensuring the appropriate More ❯
Job Number: 123 Job Title: INFORMATIONSYSTEMS SECURITY ENGINEER I - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 145K Background Support the government in the enforcement of the design and implementation of trusted relationships among external systems and architectures … secure networking, computing, and enclave environments Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components Identify overall security requirements for the proper handling of government data Interact with the customer and other project team members Support security planning, assessment, risk analysis … and risk management Requirements Bachelor's degree in computer science, information assurance, information security system engineering, or a related discipline from an accredited college or university 7 years of experience as an ISSE on programs and contracts of similar scope, type, and complexity 4 years of ISSE experience DoD 8570.01-M compliance with IASAE More ❯
This is a contingent opportunity InformationSystems Security Manager (ISSM) K2 Group is searching for an ISSM to support the Air Force Research Laboratory Sensors Directorate (AFRL/RY) at Wright-Patterson Air Force Base, OH. Duties: Be the Directorate's Certification & Accreditation (C&A) process expert. Perform C&A duties in compliance with the Risk Management … Operate IATO/Approval to Operate (ATO). Prepare, submit, and track all Directorate C&A packages of all Research, Development, Test, & Evaluation (RDT&E) computer informationsystems for base-level and higher headquarters approval, and ensure that all systems are following DoD Information Technology (IT) C&A guidance. Submit a quarterly Plan of … Action and Milestones (POA&Ms) to HQ AFRL and maintain 100% accountability for all accredited systems and RDT&E systems requiring POA&Ms. Ensure the Directorate C&A community remains updated on eMASS; review eMASS registration workbooks, recommend changes/clarification and submit updated workbooks to HQ AFRL for registration of Point-to-Point, Standalone, Standalone Enclave systemsMore ❯
InformationSystems Security Officer (ISSO) Mid-Senior Level $90,000 - $142,000 Colorado Springs, CO TS/SCI Clearance Required Protect critical systems. Power national defense. Your cybersecurity leadership starts here. A Day in the Life - What You'll Do • Maintain and enhance the security posture of classified informationsystems within DoD environments. • Collaborate … security impact analysis. Core Skills & Tools Cybersecurity & Compliance • NIST 800-53, RMF, DoD 8500 Series, Security Authorization Packages • Continuous Monitoring & Vulnerability Assessment • Configuration Management and System Recovery Systems & Platforms • Windows and Linux Operating Systems • Secure Media Handling Procedures • System Topology Design (Logical and Physical) Documentation & Audit • Security Assessments and Technical Reports • Audit Log Management … Certified small business. For decades, we've been at the forefront of delivering engineering excellence to national security programs. Trusted by the DoD, we develop and support mission-critical systems that protect our nation. At Caribou Thunder, we fuse tradition and innovation - with a deep sense of purpose rooted in integrity and service. Why Caribou Thunder? Empowering You and More ❯
success is attributed to the intelligence, dedication, and years of experience within many government organizations including the Intelligence Community (IC), Department of Defense (DoD), and Defense InformationSystems Agency (DISA). RBR-Technologies is seeking an experienced ISSE to support one of our customers in Maryland. POSITION SUMMARY The InformationSystems Security Engineer shall … and verifies system security requirements definitions and analysis and establishes system security designs. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. RESPONSIBILITIES Participate as a security engineering representative on engineering teams for the design, development, implementation and/or integration of secure networking, computing, and enclave environments Participate … as a security engineering representative on engineering teams for the design, development, implementation and/or integration of IA architectures, systems, or system components Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments Apply knowledge of IA policy, procedures, and workforce More ❯