working knowledge of Defence Standards DefStan 05-138 Issue 3 and DefStan 05-139 Issue 1 . If you're an experienced professional with strong capabilities in threat modelling , riskassessment , and secure systems architecture , we want to hear from you. Role Responsibilities: Integrate security controls throughout the product development lifecycle Conduct detailed threat modelling and risk assessments using recognised tools Lead the implementation of risk management strategies based on industry best practices (NIST, ISO) Work closely with development teams to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incident response efforts and coordinate remediation … MOD ISN 23/09 Ability to identify, assess and mitigate risks across software and hardware product ecosystems Strong written and verbal communication skills, including the ability to convey risk to non-technical audiences Ideal Candidate Traits: Analytical thinker with strong problem-solving skills Detail-oriented with excellent planning and organisational abilities Resilient, proactive, and capable of driving initiatives More ❯
working knowledge of Defence Standards DefStan 05-138 Issue 3 and DefStan 05-139 Issue 1 . If you're an experienced professional with strong capabilities in threat modelling , riskassessment , and secure systems architecture , we want to hear from you. Role Responsibilities: Integrate security controls throughout the product development lifecycle Conduct detailed threat modelling and risk assessments using recognised tools Lead the implementation of risk management strategies based on industry best practices (NIST, ISO) Work closely with development teams to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security policies, documentation, and awareness training Support incident response efforts and coordinate remediation … MOD ISN 23/09 Ability to identify, assess and mitigate risks across software and hardware product ecosystems Strong written and verbal communication skills, including the ability to convey risk to non-technical audiences Analytical thinker with strong problem-solving skills Detail-oriented with excellent planning and organisational abilities Resilient, proactive, and capable of driving initiatives forward independently A More ❯
CONTINGENT opportunity for a Cybersecurity Engineer to join our team of smart and innovative technical team members working in the Point Loma area of San Diego, California. Provide Cybersecurity Assessment and Authorization (A&A) services and serve as a Cybersecurity expert for Navy Afloat programs throughout all stages of acquisition, systems engineering and maintenance processes. Be familiar with Information … Systems Security Engineer (ISSE) responsibilities in accordance with the US Navy's Risk Management Framework (RMF) Process Guide as follows: Oversee the development and maintenance of a system's cybersecurity solutions. Identify areas of operation and Service Contract Act (SCA) cognizance of the system, as well as any applicable authorization requirements, such as reciprocity, cross domain and applicable overlays … control baseline with applicable overlays. Assist with development, maintenance and tracking of the System Security Plan (SSP). Lead the security control implementation and testing efforts. Perform vulnerability-level riskassessment on the Plan of Action and Milestones (POA&Ms). Ensure the execution of any security testing required as part of A&A or annual reviews. Ensure More ❯
project it is also required you hold a British Citizenship or Dual Citizenship. As an Aker Lead Security Architect, you will be a recognised subject matter expert in security, risk management and compliance with demonstrable experience in highly regulated industries, specifically UK Government and/or Defence. You will build effective working relationships with delivery team members and Aker … testing (e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG Information Assurance RiskAssessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST … CSF, and CSA Identify and deliver appropriate controls based on industry standards (e.g. CCM) to drive cloud and customer security solutions framework based on business risk and cloud native threats. Provide oversight and guidance on government security procedures and processes. Continually evaluate new threats in the cloud, to identify the impact on IT and the business to develop and More ❯
own and optimize Collinson’s internal payment systems while managing key external partnerships with PSPs, Acquirers, payment orchestration, fraud prevention, and observability providers. In addition, you will oversee payment risk and fraud management, ensuring regulatory compliance and enhancing payment security. Key Responsibilities Payments Strategy & Execution • Define and execute a comprehensive payments strategy, balancing consumer experience, revenue optimization, and compliance. … Mastercard, Amex), and alternative payment method (APM) providers. • Collaborate with orchestration platforms to streamline global payment routing, retries, and conversion optimization. • Integrate with fraud prevention providers, implementing real-time riskassessment and fraud mitigation tools. • Work with observability partners to ensure real-time monitoring, reporting, and payment analytics for proactive issue resolution. Payment Risk & Fraud Management • Oversee … payment security, fraud prevention, and risk mitigation strategies across all payment channels. • Ensure compliance with PCI DSS, PSD2, Strong Customer Authentication (SCA), AML, and cross-border payment regulations. • Optimize authorization rates while reducing fraud, chargebacks, and transaction failures. Analytics & Optimization • Utilize payment data and insights to optimize transaction success rates and reduce costs. • Develop A/B testing frameworks More ❯
business units, as requested, when a business disruption occurs and assist with recovery efforts Help Maintain the internal Business Continuity Management Website and network shared drive Participate in vendor risk management program on behalf of the BC in the Business Continuity review and evaluation in the vendor risk management program Co-assist the global emergency notification system to … and gathering timelines, data points and action items, and following up with responsible parties for close-out of assigned action items. Collaborate with various teams, including Facilities, IT, Operations, Risk as well as BCP stakeholders within each line of business at the firm ; Work closely with development teams who own/maintain BC related software and platforms. Perform other … V-Lookups, etc.) Excellent interpersonal and communication skills (written, verbal, presentation) Demonstrated skill in development of working relationships with key contacts both inside and outside the organization Understand Operational Risk in the Finance sector. Proven ability to work independently and manage multiple project initiatives, and as part of a team Ability to coordinate and implement Business Continuity strategies and More ❯
during all phases of the IS lifecycle • Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis • Conduct required IS vulnerability scans according to riskassessment parameters. • Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities • Manage the risks to ISs and other FBI assets by coordinating appropriate correction … system owner concurrence for correction or mitigation actions • Monitor security controls for FBI ISs to maintain security Authorized To Operate (ATO) • Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase • Ensure that changes to an FBI IS, its environment, and/or operational needs that may … with the system owner, ISSM, and ISSR JOB DESCRIPTION: ISSO Responsibilities: • Knowledgeable with Systems Development Lifecycle (SDLC) methodologies and continuous monitoring activities • Extensive experience analyzing information technology and system risk in complex environments and articulating results (verbal/reports) to all levels of management. • Demonstrated experience conducting information system security controls assessments (SCAs) and appling standard auditing techniques during More ❯
Basildon, Essex, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
on deliverable artefacts. Form part of a wider Product IA and Security community across Leonardo Electronics UK, influencing corporate policies, processes and guidance. Generation of Security Management Plans, Security Risk Assessments, Security Design and Management Documentation, and risk Remediation Action Plans. Create artefacts, support Product Design Reviews and Product Security deliverable information (Product Integrity certificates, product security cases. … What you'll bring You will have experience of owning a security risk management system for highly regulated products based on recognised frameworks. As well as this, you will have a good understanding of engineering development lifecycles and how product security specialism is aligned. Engineering degree with minimum 5 years' experience in product security and CISSP, CISM or equivalent … qualification Practical experience of risk management frameworks (NIST SP800-37, ISO27001) Practical experience of riskassessment processes (NIST SP800-30 and ISO 27005) Practical experience of applying security controls (NIST SP800-53 and ISO27002) Practical experience of Secure by Design requirements (ISN 2023/09) Demonstrable experience of writing IA Technical Risk Assessments and the management More ❯
RFP products Review acquisition documents and provides comments with programmatic perspective to ensure consistency and accuracy. Documents may include, but are not limited to, ADMs, LCSP, Acquisition Strategies, APBs, Risk Management Plans, PMRs and milestone decision briefings Support, prepare, review and develop acquisition reports, including statutory and regulatory acquisition report and milestone review documentations identified in DoDI 5000.02 Support … and potential cost avoidance Assist with planning, evaluating and implementing program acquisition strategies. This includes DoD and AF policy and/or guidance; technical approach and/or requirements; riskassessment; and realism in achieving a product suitable for the war fighter within cost, schedule, and performance constraints. Also includes broad range of program acquisition strategies, market research … in DoDI 5000.80, Operation of the Middle Tier of Acquisition and DoDI 5000.81, Urgent Capability Acquisition Support and coordinate with program level scheduling personnel Develop, maintain, and update program risk management plans IAW the Risk Management Guide for DoD Acquisition, AFPAM 63-128, and the Air Force RI3 Guidebook; facilitate program risk identification, risk analysis, riskMore ❯
internal processes. This role will manage the team responsible for the core security programming for TSE Ops, AHS, and AIT teams across Permissions and Access, Secure Products and Tools, riskassessment consulting, Vendor security, and security auditing. You will also assess risks, anticipate bottlenecks, manage escalations, make trade-offs, balance the business needs versus technical constraints and operational … escalating blockers as required. This role requires partnership with customer and stakeholders across the globe, both tech and non-tech. The successful candidate will have a demonstrated knowledge of risk investigations processes, have an ability to see the big picture and look for opportunities to better understand their customers in order to drive alignment to a common goal. Strong … ones. • Monitor and analyze emerging desktop security trends, data protection best practices, and security technology advancements through threat intelligence feeds, security publications, industry conferences, and cybersecurity networks to inform risk management and security strategy decisions. BASIC QUALIFICATIONS - 5+ years of cross functional project delivery experience - 5+ years of program or project management experience - 5+ years of working cross functionally More ❯
Microsoft Azure and an affinity for cloud security best practices. Information Security Knowledge: Strong knowledge of security principles and frameworks, including CIS controls and MITRE ATT&CK. Governance and RiskAssessment: Comprehensive understanding of security frameworks and best practices for risk management, including ISO, CSA, and CIS controls. Collaboration & Adaptability: A proactive team player who is flexible More ❯
and Takepayments. Our software platform and APIs enable our partners to offer flexible financing products, in their desired branding, to their merchant base. With YouLend's AI-driven credit riskassessment solutions, more merchants and SMEs than ever can receive fast, flexible and affordable funding. We operate in 9+ geographies across the UK, EU and the US. About … and Takepayments. Our software platform and APIs enable our partners to offer flexible financing products, in their desired branding, to their merchant base. With YouLend's AI-driven credit riskassessment solutions, more merchants and SMEs than ever can receive fast, flexible and affordable funding. We operate in 9+ geographies across the UK, EU and the US. We More ❯
Des Plaines, Illinois, United States Hybrid / WFH Options
Kranze Technology Solutions, Inc
The Information System Security Manager (ISSM) is responsible for applying and documenting Information System (IS) security principles, practices, and procedures under the Risk Management Framework (RMF) to maintain compliance with applicable security regulations such as NIST, CNSSI, and NISPOM as well as governing the development and management of classified information systems. This position requires the ISSM to be a … from home position. It is a full-time onsite position at the office in Des Plaines, IL. Responsibilities: Achieve and maintain Authorization to Operate for classified information systems Manages Risk Management Framework (RMF) process Leads and supports security assessments and audits Perform tasks to meet continuous monitoring requirements such as audit log reviews, security patching, and hardware/software … as assigned Minimum Educational Qualifications & Requirements: Bachelor's degree in an applicable field and at least five years of relevant experience Preferred Security+ (or equivalent) certified Ability to perform riskassessment and risk management for classified information systems Ability to obtain Security Clearance, for which the United States Government requires United States citizenshi Strong written and verbal More ❯
up to date, including entering and checking information in Glovia (our production planning system) to make sure materials and kits are routed correctly. Help keep the workplace safeby supporting risk assessments and lift plans for new tasks or equipment. Take part in improvement activities, like Rapid Improvement Workshops (RIWs), and help roll out better ways of working. Follow all … initiatives. Experience increating or updating Standard Work documentstoCaterpillar Production System (CPS)standards, ensuring consistency and quality in operational processes. What You May Have: Holds British Safety Council Level 2 RiskAssessment training and/or CPS (Caterpillar Production System) Green Belt certification, demonstrating a strong commitment to workplace safety, risk awareness, and continuous improvement in safety-related More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
Tata Technologies Europe Ltd
SPICE (ASPICE) process framework, including systems engineering, software engineering, coding, and all levels of functional testing. Beyond core development, ESS also integrates critical supporting processes such as project management, riskassessment, functional safety, and cybersecurity, ensuring compliance with ASPICE standards and delivering reliable, secure, and high-quality embedded systems & solutions. The Role: This role sits within the (BEV … skills Track record as an effective team player with strong interpersonal skills Relevant experience of system definition, system architecture development, requirements specification, design/performance modelling, systems integration, system assessment and acceptance Full driving licence Relevant degree or equivalent experience preferred Desirable: Experience in applying Systems Engineering verification and in solving complex technical issues using a structured approach Experience More ❯
technologies are disrupting the insurance value chain. Our innovative minds in IT spearhead the transformation and make change happen. We support clients with a comprehensive range of insurance and risk management products. Our goal is to become even more digital through the expertise of our IT & Tech specialists, and by leveraging data and insights to support innovation and client … Collaborate with diverse stakeholders to create and implement a prioritized, multi-year change roadmap for Networks and Voice initiatives Foster and maintain strong relationships with entity CIOs, Procurement, Information Risk Management (IRM), and Global IT leaders to support collaborative success Drive the MRE Group's Cloud and Data Center strategy, focusing on consolidating over 20 diverse data centers and … with more than 11,000 employees at over 50 locations, Munich Re introduces a paradigm shift in the way you think about insurance. By turning uncertainty into a manageable risk we enable fundamental change. Join us working on topics today that will concern society tomorrow, whether that be climate change, major construction projects, medical riskassessment or More ❯
operations and combat overseas tours with a SMU and or SOF in an operational environment • Advanced skill sets with the HUMINT Operations Cycle, Cl Support to HUMINT Operations, Asset RiskAssessment System (ARMS), Operational Risk Management Process, and Patterns of Life Analysis and one or more of the following areas: Human Factors Analysis, Human Terrain Analysis, SIGINT More ❯
and lead high-performing project teams of 10+ members, including junior and mid-level project managers Serve as primary executive consultant to C-level stakeholders, providing strategic guidance and riskassessment for critical business initiatives Process Innovation: Design and implement scalable project management frameworks that support organizational growth and operational efficiency Champion advanced lean and agile methodologies, driving … of emerging technologies and ability to assess their strategic value for business applications Proven track record of managing complex stakeholder ecosystems including clients, vendors, and internal teams Experience with risk management, compliance frameworks, and governance in regulated environments Why Join Us: Be part of a company shaping the future of e-mobility in Europe Gain real-world experience with More ❯
portfolio : Private Equity & Financial Services : We work with top-tier investment firms, global financial institutions, and leading wealth management companies, providing portfolio performance analytics, AI-powered value creation, and risk identification tools. Retail & Consumer: Our solutions help major national retailers, high-street brands, and premium consumer goods companies optimise inventory, enhance price competitiveness, and deliver personalised customer experiences. Asset … Management: We build AI-powered investment decision support systems, alternative data integration platforms, and automated risk management solutions for prestigious asset management firms. Public Sector: We're trusted by multiple UK government departments and public sector organisations to deliver predictive maintenance systems, supply chain optimisation, and process automation. SaaS, Manufacturing & More : From innovative SaaS providers to global manufacturing leaders … opportunities to creating inventory optimisation algorithms for household-name retailers.Tackle Exciting Challenges: Design and implement technically sophisticated solutions such as real-time analytics platforms for FTSE 100 companies, automated riskassessment systems for asset managers, and predictive maintenance pipelines for government departments. Build Solutions That Scale: Your analytics engineering will power data products used by millions of customers More ❯
Collège Financement Participatif par France FinTech
roadmap. Marketing and Branding: Collaborate with the marketing team to develop and implement marketing strategies that align with the branch goals and increase brand visibility within the UK market. Risk Management: Identify potential risks related to business operations and implement effective mitigation strategies. Ensure a framework for riskassessment and management is in place. Preferred Experience You More ❯
and Takepayments. Our software platform and APIs enable our partners to offer flexible financing products, in their desired branding, to their merchant base. With YouLend's AI-driven credit riskassessment solutions, more merchants and SMEs than ever can receive fast, flexible and affordable funding. We operate in 9+ geographies across the UK, EU and the US. We More ❯
and Takepayments. Our software platform and APIs enable our partners to offer flexible financing products, in their desired branding, to their merchant base. With YouLend's AI-driven credit riskassessment solutions, more merchants and SMEs than ever can receive fast, flexible and affordable funding. We operate in 9+ geographies across the UK, EU and the US. We More ❯
and Takepayments. Our software platform and APIs enable our partners to offer flexible financing products, in their desired branding, to their merchant base. With YouLend's AI-driven credit riskassessment solutions, more merchants and SMEs than ever can receive fast, flexible and affordable funding. We operate in 9+ geographies across the UK, EU and the US. We More ❯
and ensure timely completion of vendor deliverables. IPT Participation: Participate in the Integrated Product Team, contributing to all aspects of the new sensor system. Support budget management, logistics, and riskassessment, as it pertains to system acquisition and lifecycle management. Required Skills & Experience: A strong understanding of the Defense Acquisition System, DoDi 5000, and product life cycle management. More ❯
vendors accountable for continuous service improvements and innovation. Commercial & Contract Management Work closely with Legal and Finance teams to review, negotiate, and manage vendor contracts and renewals. Assess contractual risk, costs, and value-add opportunities, ensuring commercial efficiency. Support budget planning and cost optimization strategies for vendor services. Track vendor spend and ensure alignment with financial goals. Risk & Compliance Management Ensure vendors comply with regulatory, security, and data protection requirements (e.g., PCI DSS, GDPR, ISO 27001). Conduct regular vendor risk assessments and monitor any security or compliance concerns. Partner with Security and Compliance teams to ensure third-party risk is actively managed. Collaboration & Reporting Work closely with Service Management, Technology, and Finance teams to … availability services (preferably in FinTech or payments). Experience defining, tracking, and enforcing vendor SLAs and performance metrics. Strong commercial acumen and experience in contract negotiation, cost optimization, and risk assessment. Ability to lead Quarterly Business Reviews (QBRs) and drive service improvements. Understanding of regulatory requirements relevant to vendor management (e.g., PCI DSS, GDPR, ISO 27001). Excellent stakeholder More ❯