to facilitate mission critical decisions in response to national security threats. This role offers the unique opportunity to conduct intelligence analysis to generate actionable insights used to build innovative riskassessment tools deployed to officers in the Field. The selected individual will be responsible for collecting, assessing, and synthesizing qualitative and quantitative data to: illustrate the risks as … they are; describe risk drivers; build and test hypotheses about how risks may evolve; and, ultimately, unveil the best means of recognizing risk and its evolution in a given threat context. The position requires fusing a sophisticated awareness of geopolitical drivers, supply chains, and trade regulations with specialized expertise applying intelligence techniques, tools, and methods to identify interventions. … understanding of the threat landscape, intelligence gaps, agency priorities, and available resources • Build and explore threat case studies focused on specific incidents or risks with the intent of identifying risk characteristics, behaviors, or trends that may be generalized to an entire risk population to support portfolio requirements • Developing metrics of success and systematic monitoring approaches to ensure work More ❯
sampling and analytical procedures and technology base programs that have quality challenges; Facilitates formal quality-related reviews; Conducts quality assurance assessments via on site and desk review processes; Establishes riskassessment methodologies and oversees the riskassessment process; Establishes Technical Monitoring Plans (TMPs), performs monitoring, and tracks the progress of corrections/issue resolution; Establishes methodologies More ❯
push the boundaries? We are seeking a person who is decisive, collaborative and calm under pressure, detail-oriented and analytical, to help us implement and run a new IT risk management framework. This is a multi-faceted role supporting both a Technology Transformation Programme as well as helping to ensure current operational technology and applications are reliable and resilient. … other experiences as we are creating a new diverse and dynamic team to build innovative ways of building and assessing operationally resilient technology services. Principal Accountabilities: - Business Impact Assessments & Risk Identification: Develop asset management strategies, lead business impact and vulnerability assessments, conduct threat modelling, and maintain risk identification frameworks. - RiskAssessment & Evaluation: Ensure compliance with governance … policies, provide expertise on operational resilience, and support risk assessments for internal operations and third-party vendors. - Crisis & Incident Management: Lead the design and implementation of IT Disaster Recovery and Business Continuity plans, conduct simulations, and manage the Crisis and Major Incident Management Framework. - Risk Governance & Compliance: Support governance service administration, optimise processes for efficiency, and assist with More ❯
analysis to assist in responding to Investment Portfolio (IP) actions and producing execution reports. Draftacquisition and program documents such as TTOs, Statements of Work (SOWs), Program Management Plans (PMPs), Risk Management Plans, program schedules, Technical CICA memorandums, and Acquisition Strategies. Prepare presentations to report analysis findings as well as program/portfolio status. The Level 3 Program Integrator (PI … of resources; recommend funding adjustments as appropriate (contract staffing, facilities, and budgets). • Assist program managers in developing program documentation (TTOs, Statements of Work (SOWs), Program Management Plans (PMPs), Risk Management Plans, program schedules, Technical CICA memorandums, and Acquisition Strategies), creating program schedules, tracking program status, evaluating operational and technical alternatives, performing riskassessment and managing integrated … late receipt of external funds, slow execution againstcertain appropriations • e. Bi-Weekly contracts report by program to track current contract funding run outs (i.e., when will contractor be at risk of work stoppage), current contract periods of performance, planned award dates, burn rate analyses, contractor CDRL deliverables f. Bi-Weekly Staffing report for LOE contracts, by program, illustrating current More ❯
to assist in responding to Investment Portfolio (IP) actions and producing execution reports. Draft acquisition and program documents such as TTOs, Statements of Work (SOWs), Program Management Plans (PMPs), Risk Management Plans, program schedules, Technical CICA memorandums, and Acquisition Strategies. Prepare presentations to report analysis findings as well as program/portfolio status. The Level 3 Program Integrator (PI … of resources; recommend funding adjustments as appropriate (contract staffing, facilities, and budgets). • Assist program managers in developing program documentation (TTOs, Statements of Work (SOWs), Program Management Plans (PMPs), Risk Management Plans, program schedules, Technical CICA memorandums, and Acquisition Strategies), creating program schedules, tracking program status, evaluating operational and technical alternatives, performing riskassessment and managing integrated … late receipt of external funds, slow execution against certain appropriations Bi-Weekly contracts report by program to track current contract funding run outs (i.e., when will contractor be at risk of work stoppage), current contract periods of performance, planned award dates, burn rate analyses, contractor CDRL deliverables. Bi-Weekly Staffing report for LOE contracts, by program, illustrating current and More ❯
Responsible for implementing and developing the DHS IT security - Gathering and organizing technical information about the lab's mission goals and needs, existing security products, and ongoing programs - Performing risk analyses, which also includes riskassessment - Providing support to plan, coordinate, and implement the lab's information security - Providing support for facilitating and helping the lab identify More ❯
to assist in responding to Investment Portfolio (IP) actions and producing execution reports. Draft acquisition and program documents such as TTOs, Statements of Work (SOWs), Program Management Plans (PMPs), Risk Management Plans, program schedules, Technical CICA memorandums, and Acquisition Strategies. Prepare presentations to report analysis findings as well as program/portfolio status. The Level 3 Program Integrator (PI … of resources; recommend funding adjustments as appropriate (contract staffing, facilities, and budgets). Assist program managers in developing program documentation (TTOs, Statements of Work (SOWs), Program Management Plans (PMPs), Risk Management Plans, program schedules, Technical CICA memorandums, and Acquisition Strategies), creating program schedules, tracking program status, evaluating operational and technical alternatives, performing riskassessment and managing integrated … receipt of external funds, slow execution against certain appropriations e. Bi-Weekly contracts report by program to track current contract funding run outs (i.e., when will contractor be at risk of work stoppage), current contract periods of performance, planned award dates, burn rate analyses, contractor CDRL deliverables f. Bi-Weekly Staffing report for LOE contracts, by program, illustrating current More ❯
negotiating, and managing complex financing arrangements. You will take full ownership of external financing relationships-including banks, institutional lenders, and investors-while working closely with internal teams across finance, risk, legal, product, and commercial to align capital strategy with business priorities. This is a high-impact leadership role ideal for a senior capital markets or structured finance professional who … structures-including securitisation, off-balance sheet, and embedded lending models. Oversee capital deployment, utilisation, and performance monitoring across all funding vehicles. Ensure compliance with covenants, regulatory obligations, and internal risk parameters. Lead capital markets-related fundraising efforts, including data room preparation and investor due diligence. Partner with legal teams and external counsel on contract development, execution, and negotiation. Provide … or fintech. Deep expertise in debt structuring, credit facilities, and capital planning. Proven ability to lead complex negotiations and drive high-value financing outcomes. Strong financial modelling and credit riskassessment skills. Excellent stakeholder management, with the ability to influence at the executive and board level. Entrepreneurial mindset with high ownership, strategic thinking, and a track record of More ❯
currently seeking a Nessus Administrator for an onsite position in Chantilly, VA. We are seeking a skilled Nessus Administrator to manage, configure, and optimize our Nessus vulnerability scanning and assessment platform. The Nessus Administrator will be responsible for ensuring that Nessus is effectively integrated into the organization's vulnerability management processes, running regular scans, troubleshooting issues, and providing detailed … Clearance Proven experience administering and configuring Nessus servers, scanners, and plugins Experience working with large-scale environments, conducting network vulnerability assessments, and remediating findings. Strong understanding of vulnerability management, riskassessment, and remediation processes. Familiarity with scripting languages (Python, Bash) for automation of Nessus tasks is a plus. Strong troubleshooting and analytical skills to resolve Nessus-related issues … Center Security Analysis: Define and implement scan policies and audit policies Add and manage scan credentials Schedule and execute vulnerability scans Generate, import, and upload scan reports for vulnerability assessment Analyze and validate scan results Maintenance and Support: Provide O&M services for Phase 1 tools in the EITaaS Enterprise solution Troubleshoot issues and optimize system performance Stay current More ❯
and Takepayments. Our software platform and APIs enable our partners to offer flexible financing products, in their desired branding, to their merchant base. With YouLend's AI-driven credit riskassessment solutions, more merchants and SMEs than ever can receive fast, flexible and affordable funding. We operate in 9+ geographies across the UK, EU and the US. We … disbursements, repayments, and account activity) to identify unusual patterns or red flags in real-time and post-event scenarios. Enhanced Due Diligence (EDD): Conduct in-depth reviews on higher risk customers, including gathering additional documentation, performing open-source intelligence (OSINT) checks, and assessing risk indicators. Fraud Investigations: Investigate suspicious transactions, credit applications, identity mismatches, and fraud attempts (e.g. … and complete investigation records, create internal case files, and support the preparation of Suspicious Activity Reports (SARs) in line with regulatory standards. Cross-Team Collaboration: Work closely with credit risk, underwriting, collections, and engineering teams to resolve fraud cases and help build smarter detection workflows. Process Optimization: Contribute to the improvement of financial crime detection systems by feeding back More ❯
including but not limited to acquisition, development, integration, sustainment, continued evolution, deployment/fielding and installation, and operations oversight. Provide engineering support services and inputs to program and project risk management activities in compliance with Air Force SEAM processes. Capable of performing problem/gap definition, trade space analysis, science and technology roadmap analysis, "Set based design" for concept … and commercially accepted standards and requirements. Constructs models and simulations of systems to demonstrate the ability to meet user requirements. Conducts engineering performance, cost-effectiveness, reliability, technical and schedule riskassessment, and scheduling trade-off studies and document this information in a technical report as directed by the task order. Provide aid or guidance as necessary in the More ❯
Wakefield, West Yorkshire, Yorkshire, United Kingdom
Gallagher
Introduction Indulge your passion for problem-solving and embrace the thrill of addressing risk head-on at Gallagher's global brokerage team. Join a family of diverse minds, united by a relentless pursuit of excellence. As part of our team, you'll be the architect of protection, safeguarding businesses and empowering their ambitions. Together, we'll build a legacy … of trust and triumph in the dynamic world of risk management. We believe that every candidate brings something special to the table, including you! So, even if you feel that youre close but not an exact match, we encourage you to apply. Overview Would you like to join our Cyber and Technology Practice Group? Our encouraging and ambitious team … responsible for servicing accounts in an efficient, flexible manner. Supporting your peers to meet client demands, achieve both renewal retention and growth rates in the Cyber Insurance and Cyber Risk Management specialisms. Youre driven, hardworking and business focused, whilst keeping our clients at the heart of your actions. How you'll make an impact Develop and implement regional strategies More ❯
Verisk 4 days ago Be among the first 25 applicants Principal Software Architect At Verisk Analytics, we’re driving the future of insurance with world-class data analytics and riskassessment solutions. As a global tech leader, we empower insurers to make faster, smarter decisions through the power of advanced AI, machine learning, and cutting-edge cloud technologies. … Our platforms support everything from catastrophe modeling and underwriting to fraud detection and claims optimization—helping insurers manage complexity, reduce risk, and respond to change with confidence. With a deep commitment to innovation and a global team of experts, Verisk is where technology meets purpose—and where your work can truly make a difference. Job Description This role is … analytics and technology partner to the global insurance industry by delivering value to our clients through expertise and scale. We empower communities and businesses to make better decisions on risk, faster. At Verisk, you'll have the chance to use your voice and build a rewarding career that's as unique as you are, with work flexibility and the More ❯
to assist in responding to Investment Portfolio (IP) actions and producing execution reports. Draft acquisition and program documents such as TTOs, Statements of Work (SOWs), Program Management Plans (PMPs), Risk Management Plans, program schedules, Technical CICA memorandums, and Acquisition Strategies. Prepare presentations to report analysis findings and program/portfolio status. Job Description: Agency Program management support Program review … resources; recommend funding adjustments as necessary (e.g., contract staffing, facilities, and budgets). Assist program managers in developing program documentation (TTOs, Statements of Work (SOWs), Program Management Plans (PMPs), Risk Management Plans, program schedules, Technical CICA memorandums, and Acquisition Strategies), creating program schedules, tracking program status, evaluating operational and technical alternatives, performing riskassessment and managing integrated … late receipt of external funds, slow execution against certain appropriations. Bi-Weekly contracts report by program to track current contract funding run outs (i.e., when will contractor be at risk of work stoppage), current contract periods of performance, planned award dates, bum rate analyses, contractor CDRL deliverables f. Bi-Weekly Staffing report for LOE contracts, by program, illustrating current More ❯
Risk Management Framework (RMF), NMAP, PKI, Wireshark, auditing, penetration testing, scripting, IASAE, CISSP, ISSEP, NISCAP Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen Must have TS/SCI clearance w/active polygraph Bachelor's degree in Computer … Five (05) years of experience with Defense in Depth Principals/technology including access control, authorization, identification and authentication, public key infrastructure, network and enterprise security architecture and applying riskassessment methodology to system development. Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience. Must have experience applying Risk Management … Certification. Computer Information Systems Security Professional CISSP Certification. Experience developing/implementing integrated security services management processes, such as assessing and auditing network penetration testing, anti-virus planning assistance, risk analysis, and incident response. Experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls that encompass the development, design, and implementation. More ❯
and Takepayments. Our software platform and APIs enable our partners to offer flexible financing products, in their desired branding, to their merchant base. With YouLend's AI-driven credit riskassessment solutions, more merchants and SMEs than ever can receive fast, flexible and affordable funding. We operate in 9+ geographies across the UK, EU and the US. We … for ensuring acceptable terms while deciding the size, duration, and price of an application. You will complete KYC checks using 3rd party tools to verify our customer, flagging high risk applications. Key Responsibilities Assessing merchants on ability to repay Pricing deals Reviewing credit reports Assessing revenue and payment data Verifying identity Assessing onboarding risks Confirming PEP/Sanction matches More ❯
production sites, meeting country-specific and Group requirements. Managing network activities such as lifecycle management, software upgrades, and deployment. Providing specialized knowledge during operations, including incident management, change impact assessment, and participation in on-call support if required. Applying riskassessment, detailed work planning, centralized configuration, and continuous improvement, similar to modern DevOps practices. Establishing new production More ❯
production sites, meeting country-specific and Group requirements. Managing network activities such as lifecycle management, software upgrades, and deployment. Providing specialized knowledge during operations, including incident management, change impact assessment, and participation in on-call support if required. Applying riskassessment, detailed work planning, centralized configuration, and continuous improvement, similar to modern DevOps practices. Establishing new production More ❯
production sites, meeting country-specific and Group requirements. Managing network activities such as lifecycle management, software upgrades, and deployment. Providing specialized knowledge during operations, including incident management, change impact assessment, and participation in on-call support if required. Applying riskassessment, detailed work planning, centralized configuration, and continuous improvement, similar to modern DevOps practices. Establishing new production More ❯
certification artefact production aligned to EASA and UK CAA expectations. Lead the development and review of cybersecurity documentation, including the PSecAC (Airworthiness Security Process Plan), PASRA (Preliminary Aircraft Security RiskAssessment), ASAM (Aircraft Security Architecture Model), and Security Verification Methods. Provide input into the AWSP frameworks, including the tailoring of compliance checklists, activity outcomes, and document templates. Ensure … traceability between security risk assessments, controls, and compliance objectives across the aircraft systems and software architecture. Coordinate the development of cybersecurity methods and processes, contributing to their alignment with recognised standards. Engage with DAG's internal stakeholders, including engineering, safety, and systems integration teams, to embed cybersecurity into the design and certification lifecycle. Act as the primary technical interface … cybersecurity engineering principles in the context of safety-critical systems and regulated environments. Demonstrated experience leading the development of cybersecurity assurance artefacts for certification programmes. Practical understanding of airworthiness risk modelling, threat identification, attack surface reduction, and aircraft-level threat scenarios. Ability to produce certification-ready documentation aligned to EASA/UK CAA guidance, including traceability to compliance objectives. More ❯
responsible for network related activities such as lifecycle management, software upgrades, and deployment supporting the need for specialized knowledge during operations (e.g. incidents with significant business impact, change impact assessment, including participation in on-call team if required) working with riskassessment, detailed work planning, centralized configuration, and continuous improvement in a manner similar to modern DevOps More ❯
responsible for network related activities such as lifecycle management, software upgrades, and deployment supporting the need for specialized knowledge during operations (e.g. incidents with significant business impact, change impact assessment, including participation in on-call team if required) working with riskassessment, detailed work planning, centralized configuration, and continuous improvement in a manner similar to modern DevOps More ❯
infrastructure. The ideal candidate will play a critical role in designing and implementing cybersecurity frameworks to align with the business objectives and mitigate potential threats. Main Responsibilities: Perform Security Risk and Threat analysis during the initial design and the Software Development Life Cycle planning, analysis, and design phases. Providing recommendations and requirements for mitigating any security weaknesses identified while … of the SAFe Agile method would be an asset Understanding of security testing in the software pipeline (SAST, DAST, SCA, RASP) Knowledge of STRIDE, DICE and other threat and risk frameworks Knowledge of AWS tools Proven experience managing multiple projects simultaneously Practical interpersonal skills; adaptable to all levels of the organization Ability to contribute in a collaborative environment Communication … the impact of risks Technical Systems Proficiency: Security Management Tools (email filtering, vulnerability scanning tools, security dashboards, etc.) Cloud security management tools like CNAPP, CSPM, CWPP, and CIEM. Security riskassessment methodology (EBIOS RM) Security Requirement Definition and Review Travel Required: 10-15% Domestic and International We thank all applicants for applying. Only selected applicants will be contacted. More ❯
infrastructure. The ideal candidate will play a critical role in designing and implementing cybersecurity frameworks to align with the business objectives and mitigate potential threats. Main Responsibilities: Perform Security Risk and Threat analysis during the initial design and the Software Development Life Cycle planning, analysis, and design phases. Providing recommendations and requirements for mitigating any security weaknesses identified while … of the SAFe Agile method would be an asset Understanding of security testing in the software pipeline (SAST, DAST, SCA, RASP) Knowledge of STRIDE, DICE and other threat and risk frameworks Knowledge of AWS tools Proven experience managing multiple projects simultaneously Practical interpersonal skills; adaptable to all levels of the organization Ability to contribute in a collaborative environment Communication … the impact of risks Technical Systems Proficiency: Security Management Tools (email filtering, vulnerability scanning tools, security dashboards, etc.) Cloud security management tools like CNAPP, CSPM, CWPP, and CIEM. Security riskassessment methodology (EBIOS RM) Security Requirement Definition and Review Travel Required: 10-15% Domestic and International We thank all applicants for applying. Only selected applicants will be contacted. More ❯
responsible for network related activities such as lifecycle management, software upgrades, and deployment supporting the need for specialized knowledge during operations (e.g. incidents with significant business impact, change impact assessment, including participation in on-call team if required) working with riskassessment, detailed work planning, centralized configuration, and continuous improvement in a manner similar to modern DevOps More ❯