Warwick, Warwickshire, West Midlands, United Kingdom
Tata Technologies Europe Ltd
SPICE (ASPICE) process framework, including systems engineering, software engineering, coding, and all levels of functional testing. Beyond core development, ESS also integrates critical supporting processes such as project management, riskassessment, functional safety, and cybersecurity, ensuring compliance with ASPICE standards and delivering reliable, secure, and high-quality embedded systems & solutions. The Role: Were looking for a forward-thinking More ❯
of procedures and policies, while delivering performance against metrics Collaborating with the Operations Principal Engineer, site Chief Engineers and broader operations teams to streamline maintenance procedures and implement standardized riskassessment protocols Ensuring 100% uptime on all customer-supporting infrastructure Training and mentoring technical operations staff on corrective and preventative maintenance of mission-critical infrastructure Collaborating with 3rd More ❯
SANS Top 25). Understanding of API security best practices (REST, GraphQL). Knowledge of secure coding principles and best practices for Java programming language. o General Security Concepts Riskassessment and management. Identity and Access Management (IAM) principles and best practices (RBAC, ABAC, least privilege). Data security and privacy principles (encryption in transit/at rest More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom
Yorkshire Water
in permanent and temporary changes to assets, plant, and equipment Ability to understand and practically discuss the relevant aspects of technical and process related investigations and documentation i.e. Engineering RiskAssessment/Safety Reviews, Functional Design Specifications, Process and Instrumentation Diagrams (P&IDs), Electrical/Loop drawings etc You will have excellent written and verbal communication skills, including More ❯
s most complex and rewarding challenges. Join our team. Barbaricum is seeking an Information System Security Manager (ISSM) to guide the delivery of secure systems within the Navy's Risk Management Framework (RMF). This role provides cybersecurity oversight and lifecycle documentation support to ensure sustained compliance and threat resilience. Responsibilities: Develop and submit RMF and DIACAP riskassessment packages Ensure systems and solutions meet DoD cybersecurity policy and accreditation requirements Track system compliance status and coordinate with stakeholders to mitigate security gaps Maintain configuration management of security baselines and assess impacts of change Guide teams through cybersecurity audits and implement corrective action plans as needed Maintain continuing education hours and OJT milestones per DoD policy More ❯
a Security Analyst . This is a company investing heavily in technology, compliance, and security. In this role, you'll be part of a collaborative team, working across compliance, risk, and technical security to protect the business, strengthen frameworks, and support transformation projects. It's a varied position offering real scope to grow both your governance and technical skills. … Identify and assess security risks, ensuring mitigation plans are in place. Support the development and maintenance of security policies and standards. Assist with third-party security reviews and supplier risk management. Provide oversight of vulnerability assessments. Conduct architecture reviews for new systems and services. Evaluate technical controls and recommend improvements. Support the rollout of new security tools and technologies. … Provide input into incident management and security metrics reporting. About You: 2+ years' experience in an security role. Strong understanding of riskassessment methodologies. Knowledge of frameworks such as ISO 27001. Experience with vulnerability management and technical controls. Excellent problem-solving skills with strong attention to detail. Confident communicator with the ability to explain security concepts to non More ❯
a Security Analyst . This is a company investing heavily in technology, compliance, and security. In this role, you'll be part of a collaborative team, working across compliance, risk, and technical security to protect the business, strengthen frameworks, and support transformation projects. It's a varied position offering real scope to grow both your governance and technical skills. … Identify and assess security risks, ensuring mitigation plans are in place. Support the development and maintenance of security policies and standards. Assist with third-party security reviews and supplier risk management. Provide oversight of vulnerability assessments. Conduct architecture reviews for new systems and services. Evaluate technical controls and recommend improvements. Support the rollout of new security tools and technologies. … Provide input into incident management and security metrics reporting. About You: 2+ years' experience in an security role. Strong understanding of riskassessment methodologies. Knowledge of frameworks such as ISO 27001. Experience with vulnerability management and technical controls. Excellent problem-solving skills with strong attention to detail. Confident communicator with the ability to explain security concepts to non More ❯
a Security Analyst . This is a company investing heavily in technology, compliance, and security. In this role, you'll be part of a collaborative team, working across compliance, risk, and technical security to protect the business, strengthen frameworks, and support transformation projects. It's a varied position offering real scope to grow both your governance and technical skills. … Identify and assess security risks, ensuring mitigation plans are in place.· Support the development and maintenance of security policies and standards.· Assist with third-party security reviews and supplier risk management.· Provide oversight of vulnerability assessments.· Conduct architecture reviews for new systems and services.· Evaluate technical controls and recommend improvements.· Support the rollout of new security tools and technologies. … Provide input into incident management and security metrics reporting. About You: · 2+ years' experience in an security role.· Strong understanding of riskassessment methodologies.· Knowledge of frameworks such as ISO 27001.· Experience with vulnerability management and technical controls.· Excellent problem-solving skills with strong attention to detail.· Confident communicator with the ability to explain security concepts to non More ❯
cost reduction programmes. Strong communication and stakeholder management skills, with the ability to articulate complex concepts clearly and concisely. Proficiency in Microsoft Office Suite, particularly PowerPoint and Excel. Strong risk awareness and mitigation skills. Preferably you will also have Experience in developing compelling business/value cases for operating model changes and disruptive technology solutions, particularly in areas such … as data analytics, AI, and automation, within the insurance sector. Experience in implementing AI-driven solution within the general insurance lifecycle (e.g., claims automation, fraud detection, riskassessment, etc.) is highly desirable. Connect to your business - Technology and Transformation Distinctive thinking, deep expertise, innovation and collaborative working. That's what connects us. That's what makes us Deloitte. More ❯
of ISO 27001 and ISAE 3402; You are familiar with security technologies such as XDR, EDR, SIEM, NAC, IDS/IPS, and SASE; You have experience with incident response, riskassessment, and security policy development; You have excellent command of both Dutch and English, in spoken and written communication. Wij bieden A competitive salary based on knowledge and … coordinate the external SOC, MDR, and DFIR services, monitor the effectiveness of the ISMS, and prepare regular reports for senior management. You liaise with auditors, clients, and vendors, conduct risk assessments and penetration tests, and manage incident response processes. Additionally, you oversee access management, data security, and the execution of business continuity and disaster recovery plans. You also lead … coordinate the external SOC, MDR, and DFIR services, monitor the effectiveness of the ISMS, and prepare regular reports for senior management. You liaise with auditors, clients, and vendors, conduct risk assessments and penetration tests, and manage incident response processes. Additionally, you oversee access management, data security, and the execution of business continuity and disaster recovery plans. You also lead More ❯
King Of Prussia, Pennsylvania, United States Hybrid / WFH Options
Lockheed Martin
coding, scripting, and automation tools. Knowledgeable in cloud technologies, containers, and orchestration tools like Kubernetes. • Security Knowledge: Deep understanding of security principles, practices, and tools. Familiar with threat modeling, riskassessment techniques, and security testing tools. • Collaboration and Communication: Ability to work closely with development, operations, and security teams. Excellent communication skills to articulate security concerns and solutions … timely and effective manner. • Automation Mindset: Leverages automation to integrate security into CI/CD pipelines efficiently. Familiar with tools like Jenkins, GitLab CI, and automated security testing tools. • Risk Management: Ability to assess, prioritize, and manage security risks in alignment with business objectives. • Compliance and Governance: Understanding of legal and regulatory requirements related to information security. Ensures that More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
Tata Technologies Europe Ltd
SPICE (ASPICE) process framework, including systems engineering, software engineering, coding, and all levels of functional testing. Beyond core development, ESS also integrates critical supporting processes such as project management, riskassessment, functional safety, and cybersecurity, ensuring compliance with ASPICE standards and delivering reliable, secure, and high-quality embedded systems & solutions. The Role: As the Technical Delivery Lead for … Orchestration & Agile Delivery Drive PI planning, story mapping, and sprint velocity tracking for the HW Integration Squad Guide cross-disciplinary engineers in delivering functional prototypes and release candidates Support risk assessments, validation planning, and incremental integration gates Stakeholder Communication & Governance Represent integration squad progress in leadership and governance reviews Provide strategic updates on delivery timelines, resource planning, and technical More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
including: Incident, Problem, and Change Management Service Level Management Knowledge Management Continual Service Improvement Governance & Assurance: Provide service input into design authorities, governance forums, and acceptance boards. Service Impact Assessment : Review proposed solutions to assess and influence impacts to live service and support structures. KEY SKILLS AND EXPERIENCE You will have experience in designing full end-to-end service … support and transitioning services into BAU support environments. Excellent interpersonal skills to engage technical and non-technical stakeholders at all levels. Strong analytical and documentation skills, including gap analysis, riskassessment, and transition planning. Experience working within cross-functional, multidisciplinary teams including engineering, cyber security, and programme teams It is desirable for the Service Architect to have: ITIL More ❯
ML problems to deploying models and monitoring their impact on key product and business metrics. Our Machine Learning Scientists collaborate in cross-functional squads across Data, Engineering, Product, and Risk, tackling a broad range of issues including fraud detection and prevention, transaction monitoring for various suspicious activities, customer riskassessment, and operational tooling. About our Machine Learning More ❯
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
Monzo
ML problems to deploying models and monitoring their impact on key product and business metrics. Our Machine Learning Scientists collaborate in cross-functional squads across Data, Engineering, Product, and Risk, tackling a broad range of issues including fraud detection and prevention, transaction monitoring for various suspicious activities, customer riskassessment, and operational tooling. About our Machine Learning More ❯
and make them real - contributing along the full range from conception, to design, development, implementation, evaluation, and technology transfer. The ideal candidate thrives in an applied research environment, managing risk, and balancing management responsibilities with technical and scientific contributions, and brings such contributions to practice. We expect the successful candidate to collaborate with Hewlett Packard Labs' research teams, with … Computer Literacy, Creativity, Critical Thinking, Design Thinking, Empathy, Follow-Through, Group Problem Solving, Growth Mindset, Intellectual Curiosity (Inactive), Long Term Planning, Managing Ambiguity, Office Administration, Policy and procedures, Recordkeeping, RiskAssessment, Software Development + 5 more What We Can Offer You: Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite More ❯
of directly applicable ACAS experience • Knowledge of cybersecurity policies and guidelines o (NIST SP 800-53, DoD Instruction 8510.01), a strong understanding of o Security controls, vulnerability management, and riskassessment methodologies • Hands-on experience utilizing DoD-approved scanning/testing tools o Nessus, STIG Checker, SCAP, etc. • Experience with DoD cybersecurity applications o ACAS, HBSS, SCC • Required More ❯
security, including security groups, network ACLs and load balancers in cloud environments Strong knowledge of IAM solutions with desired experience in Microsoft Entra ID Strong application and Network security riskassessment skills to identify gaps in security configuration and design Expert-level problem-solving and analytical skills Strong written and oral English communication skills, and ability to convey More ❯
Technical Assistance (SETA) to one of its critical customers. The selected candidate will support the customer's program manager by engaging in and leading activities in project management, technical riskassessment and analysis, and supported test coordination, advance high-impact R&D programs, and communicate and collaborate closely with the PM to drive the desired execution of breakthrough More ❯
Job Description: • Designs, tests, and implements state-of-the-art secure operating systems, networks, and database products. • Conducts riskassessment and provides recommendations for application design. • Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. • Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security More ❯
Lead end-to-end execution of senior debt transactions in digital infrastructure, particularly data centres, telecom towers and fibre networks . Manage due diligence processes, including financial model analysis, riskassessment, and advisor coordination. Oversee portfolio management for designated clients, including annual reviews, waivers, amendments, and internal ratings. Negotiate and review complex legal documentation for new and existing More ❯
impacts and provide timely insights to program leadership Collaborate with stakeholders to refine schedules and manage dependencies Ensure accuracy, transparency, and timeliness of schedule-related data and reports Support riskassessment, resource planning, and schedule optimization REQUIREMENTS TS/SCI clearance required, including additional security screenings Full Performance: High school diploma/GED with 8 years, associate's More ❯
provide recommendations to management on investment decisions (10%); 5) Conduct sensitivity analysis for real estate investments to ensure the security of the investment (10%); 6) Perform financial analysis and riskassessment, using Excel, for investment projects according to the companys investment plans and the preferences of potential investors (10%); 7) Understand and monitor government policies related to housing More ❯
enhancements. Requirements Management: Define, document, and manage system requirements throughout the entire development lifecycle. This involves capturing stakeholder needs, analyzing and allocating requirements, and maintaining traceability between system elements. RiskAssessment and Mitigation: Identify potential risks and uncertainties associated with system design, integration, and operation. Develop and implement strategies to mitigate risks, ensure system safety, and enhance reliability. More ❯
products Support a wide range of network facilities to include physical media, protocol stacks, hubs, routers, bridges, gateways, digital servers, line drivers, telecommunications components, and network management components Conduct riskassessment and provide recommendations for application design Troubleshoot a range of security issues including architecture, firewalls, electronic data traffic, and network access Analyze systems for malware, misuse, or More ❯