consecutive days in the past 5 years) Project Overview: The Preventative Risking (PR) team within RIS is responsible for managing the risking and compliance referral processes for Self-Assessment (SA) registrations. Currently, the system identifies approximately 200,000 fraudulent registrations out of 1 million, resulting in an estimated £51 million to £219 million in lost SA repayment claims for … of concept (POC) was developed using: SAS Enterprise Guide for table creation, SAS Studio V and SAS RTENG to build the SA registration network, SAS Viya 3.5 tools for riskassessment of new SA registrations. The POC leveraged data from 20 different sources, most of which were already housed in the Minerva Oracle database. Previously, some data had More ❯
newport, midlands, united kingdom Hybrid / WFH Options
Undisclosed
days in the past 5 years) Role purpose/summary The Preventative Risking (PR) team within RIS is responsible for managing the risking and compliance referral processes for Self-Assessment (SA) registrations. Currently, the system identifies approximately 200,000 fraudulent registrations out of 1 million, resulting in an estimated £51 million to £219 million in lost SA repayment claims … of concept (POC) was developed using: SAS Enterprise Guide for table creation, SAS Studio V and SAS RTENG to build the SA registration network, SAS Viya 3.5 tools for riskassessment of new SA registrations. The POC leveraged data from 20 different sources, most of which were already housed in the Minerva Oracle database. Previously, some data had More ❯
newport, midlands, united kingdom Hybrid / WFH Options
Undisclosed
consecutive days in the past 5 years) Project Overview: The Preventative Risking (PR) team within RIS is responsible for managing the risking and compliance referral processes for Self-Assessment (SA) registrations. Currently, the system identifies approximately 200,000 fraudulent registrations out of 1 million, resulting in an estimated £51 million to £219 million in lost SA repayment claims for … of concept (POC) was developed using: SAS Enterprise Guide for table creation, SAS Studio V and SAS RTENG to build the SA registration network, SAS Viya 3.5 tools for riskassessment of new SA registrations. The POC leveraged data from 20 different sources, most of which were already housed in the Minerva Oracle database. Previously, some data had More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Operations Resources
Senior IT Security Analyst with an exposure to cloud security to lead in the development of cloud security measures with a view to identifying weakness in the system via risk assessments and providing solutions. Working as a Senior member of a small team you should have a strong knowledge of RiskAssessment frameworks and methodologies especially in More ❯
Knowledge/Skills Comprehensive knowledge of the National Occupational Standards of Care and the Health & Social Care Standards Internal and external audit experience. Must understand internal auditing standards and riskassessment practices. Proven leadership, interpersonal and communication skills Excellent analytical skills. Sound and robust ICT skills and knowledge Knowledge and experience within the care sector The successful candidate More ❯
Altrincham, Cheshire, England, United Kingdom Hybrid / WFH Options
Key Partnership Recruitment Limited
for engineers, ensuring they have clear instructions for their assignments Track engineer progress using scheduling and tracking tools, resolving issues as they arise Prepare and manage permit and RAMS (RiskAssessment Method Statement) documentation to ensure compliance Communicate proactively with customers regarding scheduling updates, delays or changes Maintain accurate records of visits, reports and project metrics in the More ❯
CAT A) Asbestos Awareness CSCS/ECS Card Manual Handling Working at Height PASMA/IPAF First Aid at Work SSSTS Confined Space Training Step Ladder/Ladder Awareness RiskAssessment Awareness Next Steps: As a business, we're on a journey to build on our culture where everyone is included, treated fairly and with respect. This starts More ❯
shortfalls when necessary. Proactively indicate and report if SLAs are in danger of being breached. Ensure all work is carried out within a 'safe system' and approved work processes, riskassessment, and specified work procedures, complying with best practice standards and legal requirements. Lead and manage projects to identify root causes of facility issues, acting as an escalation More ❯
Livingston, West Lothian, Scotland, United Kingdom Hybrid / WFH Options
Apogee Corporation**
convictions, cautions, reprimands, and final warnings that are not protected under the Exceptions Order 1975. Any offer of employment will be conditional upon a satisfactory DBS certificate and a riskassessment of any disclosed information. We are committed to fair recruitment and will consider disclosed information on a case-by-case basis, in line with our policy on More ❯
security, application, data) and how they interconnect. Experience in As-Is/To-Be network design, endpoint mapping, and integration design. Working knowledge of Zero Trust principles and network risk assessment. Proven ability to define technical requirements for RFPs and assess supplier capabilities. Strong stakeholder management and communication skills — able to translate complex concepts into actionable designs and clear More ❯
bolton, greater manchester, north west england, united kingdom
Forsyth Barnes
security, application, data) and how they interconnect. Experience in As-Is/To-Be network design, endpoint mapping, and integration design. Working knowledge of Zero Trust principles and network risk assessment. Proven ability to define technical requirements for RFPs and assess supplier capabilities. Strong stakeholder management and communication skills — able to translate complex concepts into actionable designs and clear More ❯
warrington, cheshire, north west england, united kingdom
Forsyth Barnes
security, application, data) and how they interconnect. Experience in As-Is/To-Be network design, endpoint mapping, and integration design. Working knowledge of Zero Trust principles and network risk assessment. Proven ability to define technical requirements for RFPs and assess supplier capabilities. Strong stakeholder management and communication skills — able to translate complex concepts into actionable designs and clear More ❯
required in Service Management to ensure compliance. Proven experience of working with operational independence using discretion and taking calculated risks to ensure continuity in service and change delivery. Structured risk assessment. Ability to assess risks associated with systems, technologies and processes. - Ability to demonstrate good judgement IS Service-related decisions through a combination of riskassessment and More ❯
required in Service Management to ensure compliance. Proven experience of working with operational independence using discretion and taking calculated risks to ensure continuity in service and change delivery. Structured risk assessment. Ability to assess risks associated with systems, technologies and processes. - Ability to demonstrate good judgement IS Service-related decisions through a combination of riskassessment and More ❯
predictive models to forecast the impacts of floods, cyclones, and heat stress. Utilizing satellite imagery and remote sensing technology for climate hazard detection. Enhancing time-series forecasting to inform risk planning at the asset level. Integrating simulation data with ML for combined physical and statistical modelling. What We're Looking For Demonstrated leadership with extensive hands-on experience. Proven … related fields. Exceptional communication and collaboration skills across teams. A background in startups or scale-ups. Bonus Points Experience analyzing satellite imagery or Earth-observation data. Familiarity with climate riskassessment, catastrophe modelling, or environmental data. Knowledge of physics-informed ML or simulation-driven methodologies. Experience in regulated or data-sensitive industries. If you find this opportunity appealing More ❯
technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerability management, riskassessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across CI/CD … zoom between strategy and execution without losing the thread. Customer obsession : genuine curiosity for security workflows and pain points. Nice to Have Experience at security product companies (vuln management, risk platforms, detection). Background as a backend/infrastructure engineer turned PM. Product marketing or technical content track record. AI/ML or agent-based systems experience. Exposure to More ❯
technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerability management, riskassessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across CI/CD … zoom between strategy and execution without losing the thread. Customer obsession : genuine curiosity for security workflows and pain points. Nice to Have Experience at security product companies (vuln management, risk platforms, detection). Background as a backend/infrastructure engineer turned PM. Product marketing or technical content track record. AI/ML or agent-based systems experience. Exposure to More ❯
technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerability management, riskassessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across CI/CD … zoom between strategy and execution without losing the thread. Customer obsession : genuine curiosity for security workflows and pain points. Nice to Have Experience at security product companies (vuln management, risk platforms, detection). Background as a backend/infrastructure engineer turned PM. Product marketing or technical content track record. AI/ML or agent-based systems experience. Exposure to More ❯
technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerability management, riskassessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across CI/CD … zoom between strategy and execution without losing the thread. Customer obsession : genuine curiosity for security workflows and pain points. Nice to Have Experience at security product companies (vuln management, risk platforms, detection). Background as a backend/infrastructure engineer turned PM. Product marketing or technical content track record. AI/ML or agent-based systems experience. Exposure to More ❯
london (city of london), south east england, united kingdom
Heart Mind Talent
technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerability management, riskassessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across CI/CD … zoom between strategy and execution without losing the thread. Customer obsession : genuine curiosity for security workflows and pain points. Nice to Have Experience at security product companies (vuln management, risk platforms, detection). Background as a backend/infrastructure engineer turned PM. Product marketing or technical content track record. AI/ML or agent-based systems experience. Exposure to More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson McCade
experience securing ML/AI systems (not theoretical knowledge). Deep technical expertise in AI/ML architectures, data pipelines, and model lifecycle security. Strong understanding of threat modeling, riskassessment, and security controls in AI/ML contexts. Previous experience as a Security Architect or senior security consultant. Excellent problem-solving, communication, and stakeholder management skills. Must More ❯
experience securing ML/AI systems (not theoretical knowledge). Deep technical expertise in AI/ML architectures, data pipelines, and model lifecycle security. Strong understanding of threat modeling, riskassessment, and security controls in AI/ML contexts. Previous experience as a Security Architect or senior security consultant. Excellent problem-solving, communication, and stakeholder management skills. Must More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Anson McCade
experience securing ML/AI systems (not theoretical knowledge). Deep technical expertise in AI/ML architectures, data pipelines, and model lifecycle security. Strong understanding of threat modeling, riskassessment, and security controls in AI/ML contexts. Previous experience as a Security Architect or senior security consultant. Excellent problem-solving, communication, and stakeholder management skills. Must More ❯
london, south east england, united kingdom Hybrid / WFH Options
Anson McCade
experience securing ML/AI systems (not theoretical knowledge). Deep technical expertise in AI/ML architectures, data pipelines, and model lifecycle security. Strong understanding of threat modeling, riskassessment, and security controls in AI/ML contexts. Previous experience as a Security Architect or senior security consultant. Excellent problem-solving, communication, and stakeholder management skills. Must More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Anson McCade
experience securing ML/AI systems (not theoretical knowledge). Deep technical expertise in AI/ML architectures, data pipelines, and model lifecycle security. Strong understanding of threat modeling, riskassessment, and security controls in AI/ML contexts. Previous experience as a Security Architect or senior security consultant. Excellent problem-solving, communication, and stakeholder management skills. Must More ❯