Mastercard. Analytical Skills: Analyze chargebacks, identify trends, and develop strategies to minimize future occurrences. Solution Design and Implementation: Develop systems and processes for handling chargeback disputes, including data analysis, riskassessment, and workflow automation. Technology Expertise: Utilize programming languages (e.g., Java), databases, and cloud platforms (e.g., AWS) to build scalable and secure solutions. Compliance and Governance: Ensure adherence More ❯
and Takepayments. Our software platform and APIs enable our partners to offer flexible financing products, in their desired branding, to their merchant base. With YouLend's AI-driven credit riskassessment solutions, more merchants and SMEs than ever can receive fast, flexible and affordable funding. We operate in 9+ geographies across the UK, EU and the US. We More ❯
and Takepayments. Our software platform and APIs enable our partners to offer flexible financing products, in their desired branding, to their merchant base. With YouLend's AI-driven credit riskassessment solutions, more merchants and SMEs than ever can receive fast, flexible and affordable funding. We operate in 9+ geographies across the UK, EU and the US. We More ❯
in supporting research computing infrastructure in a large, complex research organisation, including provisioning and managing compute and research storage services. E2 Experience of maintaining IT security and resilience, including riskassessment, vulnerability management, major incident response, and backup/recovery strategies and disaster recovery. E3 Experience of working collaboratively with senior technical and non-technical colleagues with the More ❯
our new members. The due diligence and customer monitoring Team manages both financial crime due diligence as well as other relevant due diligence processes to mitigate fraud and financial risk at the onboarding stage. The team prides itself on conducting KYC/KYB due diligence checks whilst upholding Teya's stringent onboarding requirements to ensure Teya maintains compliance with … to working extended hours subject to business needs. Key Areas of Focus: Have experience in customer onboarding, including KYC/KYB due diligence as well as fraud and financial risk screening, and assessing risk of merchants at application stage. You will have experience reviewing PEP, Sanction, and adverse media screening alerts. You will have experience reviewing KYC/… KYB documentation, checking its authenticity, and making appropriate risk-based decisions. Ideally you will have experience dealing with escalations and complex cases. Experience drafting detailed internal Enhanced Due Diligence reports. You will be able to demonstrate examples of working to and achieving SLA's and KPI's. Ideally have experience working with several different digital verification companies. Confident in More ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Reed Technology
IT Risk & Compliance Manager Location: Newport Job Type: Full-time, Hybrid (1 day per week) Salary: 60 - 70K plus benefits We are seeking an IT Risk & Compliance Manager to join our client's IT team. This role is crucial in ensuring IT risks are identified, measured, and actively managed to protect the organisation from potential impacts. You will … develop and implement IT policies, conduct risk assessments, and ensure compliance with regulatory requirements while driving improvements in IT governance processes. Key Accountabilities * Identify, evaluate, and manage IT risks across infrastructure, data protection, and lifecycle management. * Own and maintain the IT risk register, ensuring mitigation plans are in place. * Align risk management frameworks with industry standards (ISO27001 … fieldwork, and track findings to ensure timely resolution. * Develop and implement IT policies, procedures, and security awareness initiatives. * Act as an SME, providing guidance on IT governance, compliance, and risk mitigation strategies. Required Skills & Qualifications * Proven experience in IT risk management, security governance, and compliance. * Strong knowledge of ISO27001, GDPR, PCI-DSS, and cybersecurity frameworks. * Experience in IT More ❯
UK, one of the fist automated loyalty solutions in the US and a game changing payment acceptance solution with patent pending. We are seeking an experienced and dynamic Senior Risk and Compliance Manager at Paynetics UK. This role is critical in driving the development and management of our enterprise-wide risk program, covering operational, compliance, financial crime, financial … and strategic risks. To excel in this role, you will bring: Proven experience in risk management within banking or payments. Deep working knowledge of risk management frameworks for FCA-regulated firms (experience with payments or e-money is a strong advantage). Strong technical understanding of the regulatory landscape. A solutions-focused mindset, with the ability to balance … accuracy and speed in execution. A willingness to get hands dirty, delivering pragmatic, actionable outcomes. What you'll do: Develop Risk framework - this includes risk events, development of a framework for the timely identification and reporting of major operational and security incidents , the development and tracking of KRIs, migration of the risk assessments to a technical solution. More ❯
is seeking an experienced Cybersecurity engineers to work out of Lackland AFB. IS3 provides cybersecurity support to 16th Air Force. Job Description: Must be highly proficient in use of Risk Management (RMF) methodology, its associated assessments and report requirements, understanding of the plans and policies, and conduct timely and in-depth research for policies and processes applicable to security … engineering. Solid knowledge and experience with the NIST 800 Risk Management Framework (RMF) NIST 800 series 800-37 Rev 2, 800-53 Rev. 5. Demonstrated expertise in RMF processes and tools such as Xacta and eMASS, ensuring systems and applications to meet both AF IC and related IC policies and regulations. Ability to apply IT security control requirements to … the confidentiality, integrity and availability of system data and resources. Develop solutions and recommendations (with test plans) and provide POA&M and documentation support including, but not limited to, assessment methodologies, and proficiency in Governance, Risk, and Compliance (GRC) platforms, RiskAssessment Reports (RARs), plan of action and milestones (POA&Ms), assessment and authorization (A More ❯
the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/riskassessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact … of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), RiskAssessment Reports, Assessment & Authorization (A&A) packages, and System Controls Traceability Matrices (SCTMs). Supports security authorization activities in compliance with the NIST Risk Management Framework (RMF) and any DoD and IC tailored requirements. Key tasks include: • Plan and coordinate the IT … under their control • Understand the authorization boundary of systems • Collaboration with System and Network administrators to understand and document data flow and architecture diagrams • Knowledge of security controls, the assessment and applicability to systems • Maintain operational baseline of systems under their purview • Provide ongoing Continuous Monitoring to assigned systems • Provide and validate the operational security posture of systems and More ❯
The Security Engineer III participates in all aspects of information systems and network security including intrusion detection, incident response, vulnerability assessment, application security and compliance with the corporate information security policy. Primarily be responsible for implementing, operating and improving security technologies including DLP, Antivirus, IPS/IDS, End Point Protection, Database Activity Monitoring, Web Application Firewall and processes. Essential … security implementations, monitoring, and enforcement - Investigates, recommends, evaluates, deploys and integrates operational security tools and techniques to improve our ability to protect corporate assets and infrastructure - Participate in technical risk assessments and security exposure analyses of systems, networks and business applications - Analyze network security elements and overall network security architectural designs to ensure secure and optimal system and network …/procedures - Evaluate, implement, tune and operate Security Solutions such as IPS, Vulnerability scanning tools, encryption capabilities, etc. - Monitor and recommend improvements of security technologies and their various reports - Risk Management/Security Audit/Assessment Support/Ad-hoc support - Support security audit/assessment related activities and compliance reviews# - Performs other task, duties and projects More ❯
Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Able to execute strategic security plans aligned with threat intelligence and operational priorities Threat Intelligence and RiskAssessment Interprets threat intelligence based on real-world risks Conduct risk-based evaluations of critical systems, networks, and Industrial Control Systems (ICS) infrastructure Maintain current knowledge of … Computer Science, Information Technology, or related field 3-5 years of experience in Cybersecurity operations Proven experience in incident response, threat hunting, and vulnerability management Understanding of threat intelligence, riskassessment methodologies, and adversary tactics (MITRE ATT&CK, etc.) Knowledge of SIEMs, EDRs, forensic tools, and scripting languages (e.g., Python, PowerShell) Excellent communication and collaboration skills Preferred Qualifications More ❯
Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Able to execute strategic security plans aligned with threat intelligence and operational priorities Threat Intelligence and RiskAssessment Interprets threat intelligence based on real-world risks Conduct risk-based evaluations of critical systems, networks, and Industrial Control Systems (ICS) infrastructure Maintain current knowledge of … Computer Science, Information Technology, or related field 3-5 years of experience in Cybersecurity operations Proven experience in incident response, threat hunting, and vulnerability management Understanding of threat intelligence, riskassessment methodologies, and adversary tactics (MITRE ATT&CK, etc.) Knowledge of SIEMs, EDRs, forensic tools, and scripting languages (e.g., Python, PowerShell) Excellent communication and collaboration skills Preferred Qualifications More ❯
materials Supporting workshop delivery and client meetings Conducting research and analysis Client Engagement Support Typical activities include: Leading client workshops such as security strategy sessions, Cloud security architecture reviews, Riskassessment workshops, technology evaluation sessions. Producing client materials including, Security assessment reports, technical architecture diagrams, implementation roadmaps and project status updates. Conducting security assessments by gathering and …/security experience in the Defence Sector Demonstrable experience of one or more of the following areas: MoD Security GRC/Assurance Processes: Secure by Design and RMADs/RiskAssessment Cloud security architecture documentation, s ecurity controls mapping and c ompliance checking automation MoD Cyber Operations: SOC tool evaluation support, SIEM use case development, Metrics and reporting … frameworks, and Technology integration assessment. Cyber Vulnerability Investigations Identity & Access: IAM architecture reviews, p rivileged access solutions, authentication technology assessment, and Zero Trust implementation planning OT Security OT RiskAssessment/Assurance and OT Vulnerability Management Key Strengths Detail-oriented with a strong focus on quality Well-organised and committed to developing customer service skills Enthusiastic about More ❯
methods; translates testing requirements; and makes recommendations for appropriate test venues. Must have experience developing dendritic decomposition and determination of operational measures of effectiveness. Must have experience providing technical riskassessment identifying test limitations and assisting in developing risk mitigation strategies for planning joint tests and evaluations. Education: Master's Degree in a technical field (math, science More ❯
bid, labor category, and skill level is at the discretion of the Contractor. INTRODUCTION: The Sponsor supports a diverse set of corporate goals across the organization by conducting technical risk assessments and providing technical risk mitigation guidance on the use of various enabling technologies. The Sponsor requires subject matter expertise in technical risk analysis of enterprise and … and wireless networks, cloud-based computing, network management platforms, communication protocols, scripting or programming products, configuration scripts, and IT hardware and software products in support of Sponsor's technical riskassessment activities. The Sponsor also requires software development to maintain an online infrastructure, evaluating and extracting relevant data, web development, and software coding. WORK REQUIREMENTS: Contractor Support; HHR … Yes The Contractor shall perform technical risk assessments and provide technical risk mitigation guidance on the use of various enabling technologies. The Contractor shall gather Body of Evidence (BOE) and assess artifacts, such as CONOPS, use cases, detailed network diagrams, technical design details, procurement methods, and System Security Plan (SSP) to get a holistic view of the interworking More ❯
the global onboarding process across all products and entities. By centralizing due diligence activities previously managed across different teams and locations, this team enhances operational efficiency, regulatory compliance, and risk monitoring-supporting payabl.'s continued growth as a global payment solutions provider. In this role, you will oversee the end-to-end due diligence process for new merchants, partners … and third parties, ensuring full compliance with relevant regulations. As the primary client contact during onboarding, you will work closely with internal stakeholders across Sales, Customer Success, AML, Product, Risk, and Finance to facilitate seamless and compliant onboarding experiences. Success in this position requires critical thinking, autonomy, and the ability to handle complex cases while building strong relationships with … Kingdom, Cyprus or Lithuania Reporting to: Head of Compliance & MLRO UK What You'll Do: Customer Due Diligence (CDD): Perform end-to-end CDD, reviewing prospect cases and conducting risk assessments to categorize and monitor customers accurately. Approval & Escalation: Approve low- and medium-risk merchants and escalate high-risk or complex cases to regional MLROs/AMLCOs More ❯
and Takepayments. Our software platform and APIs enable our partners to offer flexible financing products, in their desired branding, to their merchant base. With YouLend's AI-driven credit riskassessment solutions, more merchants and SMEs than ever can receive fast, flexible and affordable funding. We operate in 9+ geographies across the UK, EU and the US. We … journeys, and we are building the solutions that will power that future. About the Role We are looking for a proactive and analytical Loan Underwriter to join our Credit Risk team and take full ownership of the underwriting function for the German market. You will be instrumental in setting up and optimising the underwriting framework from the ground up. … This is a unique opportunity to combine hands-on underwriting, risk evaluation and strategic process building in a fast-growing fintech environment. Key Responsibilities Design and set up the full underwriting process for SME loans in Germany, aligning with local regulatory and market expectations. Own and refine credit policies, scorecards, and riskassessment criteria based on market More ❯
pay will be based on your skills and experience — talk with your recruiter to learn more. Base pay range Direct message the job poster from InterQuest Group Recruitment Consultant- Risk, Regulation and Compliance About the Role An exciting opportunity has opened up for an experienced Underwriter to join a dynamic and fast-scaling Electronic Money Institution (EMI) based in … London. Operating at the forefront of digital payments, this organization is committed to delivering secure, scalable, and compliant payment solutions for a diverse client base. As part of the Risk & Compliance function, you’ll play a key role in shaping the underwriting strategy, supporting client onboarding, and driving sustainable business growth. What You’ll Be Doing This role is … based onsite in London and will involve building and evolving the underwriting framework to support business expansion. You’ll lead efforts to assess financial crime risk, creditworthiness, operational robustness, and reputational factors of prospective and existing clients. Collaborating across compliance, sales, onboarding, and operations teams, your goal will be to ensure thorough riskassessment and smooth onboarding More ❯
Information Security Third-Party Risk Specialist Hybrid - Southampton - 60% Time on site £42,848 - £55,000 Please note for to apply for this role you must use the link included below. Job summary Are you passionate about information security and confident assessing and managing supply chain risks? Do you have experience working with third-party suppliers to embed secure … our people, systems, and data across both internal operations and external suppliers. Your work will directly support MCA's broader Information Security strategy, helping to embed best practices and risk awareness throughout the organisation and its supply chain. You'll influence how security requirements are considered from the earliest design stages of projects through to operational delivery and the … management by advising on appropriate Government Security Schedules, reviewing supplier Security Management Plans (SMPs), and conducting annual security reviews to maintain compliance with MCA requirements. Leading the onboarding and riskassessment of existing MCA suppliers into the organisation's chosen Third-Party Risk Management platform, with prioritisation based on supplier criticality and risk exposure. Attendance at More ❯
would be advising and developing cybersecurity policy across the enterprise. This position is instrumental in ensuring alignment with DoD and USAF directives, transitioning to cloud environments, and supporting the Risk Management Framework (RMF) process. Duties: Provide subject matter expertise in developing and tailoring local cyber policy based on DoD and USAF directives. Create enterprise-wide frameworks encompassing the full … in the preparation of RMF documentation for all lifecycle steps. Support development of cloud-transition cybersecurity policies. Contribute to drafting Tactics, Techniques, and Procedures (TTPs) including threat hunting and riskassessment strategies Basic Qualifications: At least 5 years of relevant experience in: Air Force Information Assurance System accreditation processes NIST cybersecurity standards Proficiency in: AFI 33 series guidance More ❯
are aware and working within the Quality Framework. Assures consistent product value, performance, and compliance. Inputs into the category strategies to deliver: Value, Continuous Product improvements, and reduce Product Risk Decision maker in product withdrawal/recall decisions. Safe and Compliant Product Ensures ways of working are in place to remove, reduce, and inform of risk associated with … Framework through their own product knowledge. Strong understanding of supply chain and critical path/cost - (e.g., product lead times/flexibility/supplier capability) Is able to apply riskassessment in decision making and protects the brand from potential reputational damage. Skilled negotiator to seek resolutions without compromising New Looks quality or legal obligations. Confident presenting quality … to work in a fast-paced environment and adapt to rapid change. Knowledge & Experience Team management experience Ability to initiate and build strong relationships with Buying, Design and Merchandising Riskassessment and SWOT analysis Strong Numerical and analytical skills Organisational skills Relevant experience in a Fast-Paced Fashion Environment Why New Look? We care about you and the More ❯
you'll play a key role in enhancing the organisation's cyber resilience. You'll provide expert support across Microsoft 365 and Azure environments, ensuring effective security controls, proactive risk management and compliance with global standards. This position is ideal for someone with a deep technical understanding of Microsoft 365 Security and the Azure Security stack , including tools such … s resilience to cyber-attacks and security incidents Participate in the design and implementation of systems and applications Develop user and technical training guides Maintain and manage the IT Risk register Test DR plans and capabilities to ensure they work as designed, identifying gaps and lessons learnt and work with the business to drive continual development and enhancement. What … including Microsoft Defender for Cloud, Microsoft Sentinel, Azure AD etc). Solid understanding of security frameworks (e.g., ISO 27001, Cyber Essentials, NIST, GDPR etc). Experience with vulnerability scanning, riskassessment, and remediation planning. Strong communication skills with the ability to work with both technical and non-technical teams. A proactive approach to identifying and addressing security risks. More ❯
background in cyber security to support our projects, including those in non-permissive environments. The successful candidate will also provide guidance on cyber, physical and human security, delivering comprehensive risk management strategies. We are particularly interested in individuals with experience working on UK or US government-funded projects and those with professional backgrounds in military, law enforcement, or intelligence. … to the unique needs of our global projects. Conduct regular vulnerability assessments and provide actionable recommendations to enhance digital security. Ensure secure communication protocols for teams operating in high-risk environments. Physical And Human Security Advise on physical security measures, including site risk assessments and travel safety protocols. Develop human security strategies to protect personnel and project participants … focusing on situational awareness and mitigation of threats. RiskAssessment And Crisis Management Conduct thorough risk assessments across physical, human, and cyber security domains. Develop crisis management plans and lead response efforts in the event of security incidents. Training And Capacity Building Deliver tailored training programs to staff and partners on best practices in cyber, physical, and More ❯
Birmingham, West Midlands, England, United Kingdom
Michael Page Finance
of IT controls and governance frameworks. Prepare detailed audit reports with actionable recommendations for improvement. Collaborate with stakeholders to ensure compliance with regulatory requirements. Provide expert advice on IT risk management and control best practices. Monitor the implementation of audit recommendations to ensure timely resolution. Stay updated on technological advancements and emerging risks relevant to the financial services industry. … team members through knowledge sharing and mentorship. Profile A successful Principal IT Auditor should have: Professional qualifications such as CISA, CISSP, or equivalent. Proven expertise in IT auditing and riskassessment, ideally within financial services. Strong knowledge of regulatory requirements and IT governance frameworks. Experience with technology platforms and systems used in financial services. Strong written and verbal More ❯
to facilitate mission critical decisions in response to national security threats. This role offers the unique opportunity to conduct intelligence analysis to generate actionable insights used to build innovative riskassessment tools deployed to officers in the Field. The selected individual will be responsible for collecting, assessing, and synthesizing qualitative and quantitative data to: illustrate the risks as … they are; describe risk drivers; build and test hypotheses about how risks may evolve; and, ultimately, unveil the best means of recognizing risk and its evolution in a given threat context. The position requires fusing a sophisticated awareness of geopolitical drivers, supply chains, and trade regulations with specialized expertise applying intelligence techniques, tools, and methods to identify interventions. … understanding of the threat landscape, intelligence gaps, agency priorities, and available resources • Build and explore threat case studies focused on specific incidents or risks with the intent of identifying risk characteristics, behaviors, or trends that may be generalized to an entire risk population to support portfolio requirements • Developing metrics of success and systematic monitoring approaches to ensure work More ❯