computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its … to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security More ❯
assessments of computing environments to identify points of vulnerability, non-compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for networking, computing, and enclave environments to include … implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the system development life cycle. Contribute to the security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations. Review certification and accreditation (C&A) documentation, provide feedback on completeness and compliance of its … content. Support security authorization activities in compliance with NSA/CSS Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF), the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes for security engineering. The Level 2 Information Systems Security Engineer shall possess the following capabilities: • Participate as the primary security More ❯
LEAD IT RISK & CONTROL WHAT IS THE OPPORTUNITY? "The Lead IT Risk Controls Analyst is a subject-area specialist with specialized training, methods and analytic techniques to create recommendations and directions for cyber risk mitigation in a complex technical environment. Focus areas of security assessment by the Lead ITRC Security Analyst includes third party security and overall … This requires routinely authoring detailed reports and gathering metrics ensure stakeholders receive accurate and complete information. The Lead ITRC tkeeps abreast of external cyber security trends, technologies and cyber risk management approaches, and often works with other teams on cyber risk-related initiatives to provide subject-matter recommendations and guidance to achieve a posture within the bank's … overall risk appetite. The Lead ITRC serves as an expert area of specialization. This role is a working lead that provides functional guidance and may coordinates or supervise the daily activities of individual contributors or working teams in areas of specialization.Provides input on resources planning, procedures," WHAT WILL YOU DO? "Define analysis objectives, collect data from internal and More ❯
Senior Risk Analyst 1277CW SEIC - Somerset Energy innovation centre PAYE Option Up to £386.74 or Umbrella £539.18 per day Decision-Making • The jobholder will be accountable for the Risk information they generate, associated with Project delivery and the management of Project progress and forecasting data. The jobholder will have authority to make decision relating to the maintenance of … Project data and Reporting, within their area of work, and will be expected to identify programme/area issues and suggest resolutions or changes. Principal Accountabilities • The Senior Risk Analyst will be the face of Risk management in their nominated Programme/Area in the Project, bringing confidence to stakeholders that they are performing the right steps to … identify, analyse, respond to and manage their Risk Outputs. • Providing assurance of the maintenance of all Risk and Opportunity data for the Programme/Area within the Risk software system e.g. ARM. • Assurance of the delivery of Risk and Opportunity reports to a defined reporting cycle, including commentary on key time-related drivers and performance issues More ❯
Senior Risk Analyst 1277CW SEIC - Somerset Energy innovation centre PAYE Option Up to £386.74 or Umbrella £539.18 per day Decision-Making • The jobholder will be accountable for the Risk information they generate, associated with Project delivery and the management of Project progress and forecasting data. The jobholder will have authority to make decision relating to the maintenance of … Project data and Reporting, within their area of work, and will be expected to identify programme/area issues and suggest resolutions or changes. Principal Accountabilities • The Senior Risk Analyst will be the face of Risk management in their nominated Programme/Area in the Project, bringing confidence to stakeholders that they are performing the right steps to … identify, analyse, respond to and manage their Risk Outputs. • Providing assurance of the maintenance of all Risk and Opportunity data for the Programme/Area within the Risk software system e.g. ARM. • Assurance of the delivery of Risk and Opportunity reports to a defined reporting cycle, including commentary on key time-related drivers and performance issues More ❯
inputs from all programs. Qualified candidates will interface with all elements of the program team to develop and support regular maintenance of the program IMS. Candidates will perform schedule analysis in support of assigned programs or projects. Ensures major projects and program schedules and plans are integrated across company functional groups including finance, engineering, material, manufacturing, and quality. Tracks … plans and schedules, performs riskanalysis, identifies, and resolves critical path and network logic conflicts. Utilizes Gantt, Critical path, Driving Path, Variance metrics, milestone charts, earned value management and other project management techniques to gauge progress and identify performance variances to facilitate focus and intervention on critical areas. Ensures compliance with internal program procedures and project control system … May lead or participate in scheduling status reviews. Skills/Experience: Essential Functions: Develop integrated master schedules using IMP, SOW and WBS. Creates and tracks plans and schedules, performs riskanalysis, identifies and resolves critical path and network logic conflicts. Working knowledge of Planning & Scheduling Excellence Guide (PASEG), Version 4.0, EVMS Standard (EIA 748-D), Integrated Product and More ❯
Emersons Green, Bristol, Avon, England, United Kingdom
Gregory Martin International Limited
global, defence, energy, space, maritime, and intelligence & communications programmes. As a Cost Consultant you will be delivering technical consulting projects within the defence sector. You will be providing detailed analysis of data and costs to assist your client’s industry make better decisions. This may be working in customer teams to support procurement decisions with analytical thinking and outcomes … modelling of operational performance and sustainment, or historical analysis to support learning lessons from previous operations. Responsibilities for Senior Cost Engineer Consultant will include: Provide detailed analysis to support key decisions within the project teams. Identifying and bidding for and winning future work within your client’s industry. Building new relationships and maintaining the relationships with current customers. … Using and developing problem structuring methods and a variety of tools and techniques, including novel approaches where required. Working organically in customer teams to deliver rapid turn-around analysis or using one of the company’s offices as a team hub from which to plan and deliver tasks. Essential Requirements re role of Senior Cost Consultant/Cost Engineer More ❯
computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. RESPONSIBILITIES Participate as a security … IA architectures, systems, or system components Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures Support security planning, assessment, riskanalysis, and risk management Identify overall security requirements for the proper handling of Government data Provide security planning, assessment, riskanalysis, and risk management More ❯
IA architectures, systems, or system components Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures Support security planning, assessment, riskanalysis, and risk management Identify overall security requirements for the proper handling of Government data Provide security planning, assessment, riskanalysis, and risk management More ❯
training as an IT specialist Experience in conceptual design of software and tuning options with practice of database modelling Experience with complex SQL queries as well as database performance analysis and optimization Confident handling of database management systems, preferably DB2 and the associated database languages and tools Knowledge of the structures in TWS/OPC for setting up automated … batch processes Prooved experience in IT project management, i.e. IT process riskanalysis, requirements analysis + business client communication Analytical and strategic thinking Systematic, methodical and solution-oriented approach Good English language skills, preferably also some French language skills, good German is an advantage Collaboration with international colleagues on challenging IT projects Analyze and expand existing software … training as an IT specialist Experience in conceptual design of software and tuning options with practice of database modelling Experience with complex SQL queries as well as database performance analysis and optimization Confident handling of database management systems, preferably DB2 and the associated database languages and tools Knowledge of the structures in TWS/OPC for setting up automated More ❯
Are you an experienced consultant with a background in riskanalysis, corporate intelligence or consulting, looking to transition into the world of cybersecurity? We are looking for individuals with strong analytical skills, an investigative mindset, and problem-solving capabilities to join our team and help our clients respond and recover to cyber threats. S-RM is a global … invest in our people's wellbeing and learning every day. The role As our practice continues to expand globally, we are looking for experienced consultants with a corporate intelligence, RiskAnalysis or Consulting background to join us in a pivotal career transition into cybersecurity. Your role responsibilities may include: Responding to a range of cyber-attacks by helping … of talents, experiences, and perspectives. What we're looking for Creative problem solvers with excellent analytical skills and a keen eye for detail. 3-6 years of experience in riskanalysis, corporate intelligence, or consulting. Strong and effective communicators who can articulate findings clearly in both written and spoken forms. Experience in a client-facing role, and an More ❯
designs used in DoD weapon systems) from proposal development through product phase-out, including but not limited to customer briefings, proposal writing, technical planning, system integration, verification and validation, risk and supportability, performing anaylses, and customer requirements management. The System Engineer will also ensure the logical and systematic conversion of customer or product requirements into total systems solutions that … acknowledge technical, schedule and cost constraints. Perform functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications. Assist with creation and maintenance of detailed design and drawings and assist with hardware builds and testing. Essential Functions: Translate end-user/customer needs into end-to-end … systems requirements Work collaboratively across the engineering organization to perform requirements analysis, requirements decomposition and assignment of requirements to appropriate functional areas of responsibility, and manages traceability of requirements back to customer specifications and system level derived requirements Leads design synthesis and generation of supporting design documentation which includes technical specifications, interface control documents, test plans and procedures, and More ❯
Senior Risk Analyst - SwapClear # LCH and SwapClear and Listed RatesLCH Ltd is an international multi-asset class central counterparty clearing house (CCP), part of the London Stock Exchange Group. LCH Ltd serves a broad range of exchanges and over-the-counter trading platforms providing critical risk management services. It has a unique membership model and its customers … with over 60 member bank groups and over 1000 clients serviced.# Role Profile Enter role description, team description and department description: This contract role is part of the SwapClear Risk Change team, which is responsible for delivering key risk-related change initiatives for the SwapClear service. The position involves supplying to risk projects and providing domain expertise … to support the end-to-end delivery of products and enhancements.As a member of a dedicated scrum team, the successful candidate will support the Product Owner in delivering risk-related items and will be involved throughout the full project lifecycle - from functional and test design to validation and hands-on testing of deliverables.A good understanding of the Interest Rate More ❯
requirements and operational constraints. Conduct or oversee security control assessments for management, operational, and technical controls, leveraging interviews, evidence review, technical validation, and security testing. Document assessment results and risk impacts in the Security Assessment Report (SAR), providing a clear summary of control effectiveness, risk posture, and any residual vulnerabilities. Support SAR preparation activities including: Vulnerability assessments and … validation Security categorization reviews System Security Plan (SSP) analysisRisk issue resolution and remediation status reporting Preparation of SAR briefings, findings presentations, and meeting support materials Provide independent contributions to the Authorization to Operate (ATO) process by delivering the SAR, risk determinations, and supporting documentation for inclusion in the final ATO package. Generate draft Plan of Action … and Milestones (POA&M) entries based on control deficiencies and observations documented during assessments, excluding any actions already remediated by the implementation team. Prepare a Residual Risk Statement with a recommendation for risk acceptance or mitigation, which feeds into the Authorizing Official's risk decision process and the Risk Acceptance Recommendation Report. Determine and document the More ❯
activities. Duties may include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Provides expert support, research and analysis … and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories … SSE IPT reviews Provides expert level consultation and technical services on all aspects of Information Security Review ISSE related designs and provides security compliance recommendations Develop and provide IA risk management recommendations to the customer Provide ISSE support for Mission and Training systems design and development Assist with development and maintenance of the Program Protection Plan Assist with site More ❯
activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Provides expert support, research and analysis … and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations. Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories … SSE IPT reviews. Provides expert level consultation and technical services on all aspects of Information Security Review ISSE related designs and provides security compliance recommendations. Develop and provide IA risk management recommendations to the customer. Provide ISSE support for Mission and Training systems design and development. Assist with development and maintenance of the Program Protection Plan. Assist with site More ❯
Our DOD/Aerospace client is looking to fill a Sr. Principal Systems Engineer position that just opened in Scottsdale, AZ. In this role you'll participate in requirements analysis and management, functional analysis, performance analysis, system design, trade studies, systems integration and test (verification) in the development and evaluation of networks and information systems. To be … with possibility of going direct/permanent Pay: $95/hour - $113/hour DOE Telecommute: Hybrid Overview: As a Senior Principal Systems Engineer, you'll participate in requirements analysis and management, functional analysis, performance analysis, system design, trade studies, systems integration and test (verification) in the development and evaluation of networks and information systems Responsibilities: -Performs … requirements analysis, requirements definition, requirements management, functional analysis, performance analysis, system design, detail trade studies, systems integration and test (verification), validation and interface definition studies of subsystem or system elements under supervision of the lead systems engineer -Performs technical planning, cost and risk analyses, and supportability and effectiveness analyses for subsystems and system elements -Performs customer More ❯
contract supporting an intelligence community customer. The mission of this program is to drive actionable management of risks, issues, and opportunities by applying credible cost/schedule/performance analysis to achieve mission success. This program leverages a diverse workforce (engineering/science, mathematics, computer science, business, etc.) to provide cradle-to-grave support across the entire agency's … enterprise. We support cutting-edge technology for Space, Ground, and Launch Systems to ensure mission success. As a Cost Analyst, you will perform cost, schedule, and risk analyses to support budget build/execution, source selections, technology tradeoffs, etc. Additionally, collect, normalize, and analyze historical cost/schedule/technical/programmatic data to develop innovative models/methods. … Work Location: Chantilly, VA Aerospace Building (On-site requirement) Clearance Level: TS-SCI/CI Poly Education: Bachelor's degree in engineering, physics, operations research, cost analysis, mathematics, finance, economics, business administration, or similar quantitative field. Position Overview: • Cost Estimating using parametric approaches, with preference for space system experience (including software estimating). • Tool development using COTS (i.e., MS More ❯
needed. • Identify and recommend solutions to close holes/gaps in data. • Develop/apply quality standards and create checklists for data/normalization and data cleansing. • Perform data analysis to support current and emerging analytic topics (e.g. commercial markets, proliferated architectures) • Cost Estimating using parametric approaches, with preference for space system experience (including software estimating) • Tool development using … e.g., NSSL) • Ground System Cost Estimating (e.g., mission management/command and control software, processing, ground terminals, communication networks, data centers) • Services Cost Estimating • Data Collection and Normalization • Data Analysis to include statistical methods • Tool Development • Method Development (i.e., multivariate regression analysis, riskanalysis (e.g., Monte Carlo simulation tools), cost improvement curve analysis) • Source Selection … evaluation support • Cost estimating of Agile Development efforts Education Requirements: At least a Bachelors Degree in Engineering, Physics, Operations Research, Cost Analysis, Mathematics, Finance, Economics, Business Administration, or similar quantitative field More ❯
Job description : Preferred Qualifications Bachelor s or Master s degree in Finance, Accounting, Information Systems, or related field 8+ years of experience in SAP Treasury and Risk Management (TRM) Strong understanding of financial instruments, cash flow forecasting, and liquidity planning Experience with SAP S/4HANA and Fiori apps for Treasury Familiarity with integration tools (e.g., SWIFT, BCM, payment … C_S4FTR_1809 or C_S4FTR_2023) SAP Certifications in one or more of SAP FI/CO, Funds Management, and Grants Management Key Technical Skills SAP Treasury and Risk Management configuration and process design Cash and liquidity management Bank account and payment management Financial riskanalysis and hedge accounting Integration with external banking systems SAP Fiori … Treasury KPI reporting Project management and change management Strong documentation and training capabilities Key Responsibilities Configure and support SAP Treasury modules, including Cash Management, In-House Cash, Transaction Manager, Risk Analyzer, Liquidity Planner, Debt and Investment Management, Bank Communication Management (BCM), and Electronic Bank Statement (EBS) Design and implement solutions for financial transactions, market riskanalysis, and More ❯
computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include … and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its … to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security More ❯
secure reliable and uninterrupted availability of the Sponsor's developed and deployed systems and networks. Provide core security engineering principles are implemented into assigned programs information systems architecture. Perform analysis and evaluation to design, implement, test and field secure systems, networks, and architectures. Work closely with the architects, engineers, and developers in the identification and implementation of appropriate information … and implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the program life cycle. Contribute to the security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations. Review assessment and accreditation (A&A) documentation, provide feedback on completeness and compliance of its … to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security More ❯
Laboratory Sensors Directorate (AFRL/RY) at Wright-Patterson AFB, OH. The Security and Data Management Assistant will serve as an administrator and data manager in the field of riskanalysis to support AFRL and the Risk Identification and Security Countermeasure (RISC) mission. The RISC effort is a security-focused cross-functional capability that gathers and consolidates … potential risks associated with AFRL's intellectual property, programs, and personnel. RISC supports science and technology (S&T) managers and engineers and empowers AFRL leaders to make well-informed risk-management decisions to minimize the adversary's impact on our technological edge. RISC educates the AFRL workforce on these potential risks. Duties: Maintain critical security review records and provide … administrative and technical support. Help analyze and present written and oral risk reports AFRL, USAF, and DoD. Provide broad administrative and technical support to the RISC organization. Collate data and draw riskanalysis conclusions based on current threats. Assist senior analysts in evaluating organizational efficiency and effectiveness. Input and maintain secure review data and track actions via More ❯
bid, labor category, and skill level is at the discretion of the Contractor. INTRODUCTION: The Sponsor supports a diverse set of corporate goals across the organization by conducting technical risk assessments and providing technical risk mitigation guidance on the use of various enabling technologies. The Sponsor requires subject matter expertise in technical riskanalysis of enterprise … and wireless networks, cloud-based computing, network management platforms, communication protocols, scripting or programming products, configuration scripts, and IT hardware and software products in support of Sponsor's technical risk assessment activities. The Sponsor also requires software development to maintain an online infrastructure, evaluating and extracting relevant data, web development, and software coding. WORK REQUIREMENTS: Contractor Support; HHR; Yes … The Contractor shall perform technical risk assessments and provide technical risk mitigation guidance on the use of various enabling technologies. The Contractor shall gather Body of Evidence (BOE) and assess artifacts, such as CONOPS, use cases, detailed network diagrams, technical design details, procurement methods, and System Security Plan (SSP) to get a holistic view of the interworking parts More ❯
and with little supervision. • Excellent interpersonal skills, sound judgment, and organizational/administrative skills. • Ability to communicate and interact with diverse technical and non-technical groups. DESIRED SKILLS: • Malware analysis or digital computer forensics experience is a plus. • Cyber related Law Enforcement or Counterintelligence experience. • Existing Subject Matter Expert of Advanced Persistent Threats and Emerging Threats. • Understanding of risk … technology from device turn on to power off, network functions (SMS, MMS, Voice, Data) and cellular system functions. • Understanding of wireless and RF technology. • Understanding and experience in conducting riskanalysis, risk management, infosec, system testing and client structures. TECHNOLOGIES USED: Operating Systems: • Microsoft Windows (7 - 10, Server ) • UNIX (Solaris, HP-UX, etc.,) Operating System versions • Common More ❯