Security Control Assessor (SCA) 2 is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security … oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure Perform assessment of ISs, based upon the RiskManagement Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG) Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security More ❯
Security Control Assessor (SCA) 2 is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security … oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure Perform assessment of ISs, based upon the RiskManagement Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG) Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security More ❯
Security Control Assessor (SCA) 2 is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security … oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure Perform assessment of ISs, based upon the RiskManagement Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG) Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security More ❯
Assessor (SCA) 2- This is a future position that may come open in the future. We are currently building our pipeline. Responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented … oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure Perform assessment of ISs, based upon the RiskManagement Framework (RMF) methodology in accordance with the Joint SAP Implementation Guide (JSIG) Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and More ❯
Security Control Assessor (SCA) 3 is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security … oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure Perform assessment of ISs, based upon the RiskManagement Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG) Advise the Information System Owner (ISO), Information Data Owner (IDO), Program SecurityOfficer More ❯
Assessor (SCA) 1- This is a future position that may come open in the future. We are currently building our pipeline. Responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an Information System (IS) to determine the overall effectiveness of the controls (i.e., the extent to which the controls … oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure Perform assessment of ISs, based upon the RiskManagement Framework (RMF) methodology in accordance with the Joint SAP Implementation Guide (JSIG) Advise the IS Owner (ISO), Information Data Owner, Program Security Officer, and the Delegated and More ❯
The IT Support Technician is primarily responsible for onsite support of end-user devices, asset management, and physical maintenance of IT equipment such as servers, switches, printers, cabling, video conferencing systems, mobile devices, handheld scanners, wireless LAN, warehouse tablets, in-vehicle displays, and label printers. Key Responsibilities: Set up and maintain end-user hardware (Wi-Fi access points, RF … infrastructure (routers, switches, cabling), file/print services, Active Directory, and basic server/network troubleshooting Knowledge of ITSM tools (e.g. ServiceNow), ITIL V3 Foundation certified, and change/riskmanagement awareness Strong customer service mindset, problem-solving ability, and end-to-end issue ownership Excellent communication, time management, and collaboration skills across all levels Presentation and More ❯
The IT Support Technician is primarily responsible for onsite support of end-user devices, asset management, and physical maintenance of IT equipment such as servers, switches, printers, cabling, video conferencing systems, mobile devices, handheld scanners, wireless LAN, warehouse tablets, in-vehicle displays, and label printers. Key Responsibilities: Set up and maintain end-user hardware (Wi-Fi access points, RF … infrastructure (routers, switches, cabling), file/print services, Active Directory, and basic server/network troubleshooting Knowledge of ITSM tools (e.g. ServiceNow), ITIL V3 Foundation certified, and change/riskmanagement awareness Strong customer service mindset, problem-solving ability, and end-to-end issue ownership Excellent communication, time management, and collaboration skills across all levels Presentation and More ❯
world. We work with the companies that are Britain's economic engine - ambitious, entrepreneurially-spirited and high growth businesses that fuel the economy - and directly advise the owners and management teams leading them. We're proud to deliver services to the higher education, social housing, and charity sectors. Join us to develop your expertise and share our passion for … responding quickly to, as well as anticipating requests/needs and k eeping stakeholders informed of progress in relation to all aspects of the audit. Responsible for the financial management of a portfolio. Complete assignments within agreed budgets and timescales and identify opportunities for additional billings. Ensure assignments are staffed with the appropriate mix of knowledge and skills required. … Ensure that the firm's riskmanagement and quality control procedures are adhered to at all times. Identify and recognise business and sales opportunities. Support Partners and Senior Managers in the development of new business relationships and business proposals through high level sales and marketing activity. Support Partners with the implementation and communication of any new business. Recruit More ❯
St. Albans, Hertfordshire, South East, United Kingdom
JobHeron
next level in a company that values excellence, innovation, and collaboration? Join a small but growing team of passionate specialists at the forefront of fire engineering, safety strategy, and risk management. Our client is a dynamic, independent fire safety consultancy known for their friendly, professional approach and commitment to delivering first-class service to every client from local developers … collaboration Opportunities for professional development and Chartership support Influence the growth of the company Key Responsibilities of the Senior Fire Safety Engineer: Lead and support fire safety design and riskmanagement for a wide range of building types Build strong relationships with new and existing clients Mentor and support junior engineers Conduct site surveys, inspections, and fire risk … in the UK and abroad when required Relevant Experience: Ideal for those with experience in roles such as; Fire Safety Consultant, Senior Fire Protection Engineer, Fire Engineering Manager, Fire Risk Specialist, or similar. Ready to join a company where your voice is heard and your expertise makes a real difference? Apply Now for this exciting new position with your More ❯
Overview 170+ Years Strong. Industry Leader. Global Impact. At Pinkerton, the mission is to protect our clients. To do this, we provide enterprise riskmanagement services and programs specifically designed for each client. Pinkerton employees are one of our most important assets and critical to the delivery of world-class solutions. Bonded together, we share a commitment to … who seeks candidates with diverse backgrounds, experiences, and perspectives to joinour family of industry subject matter experts. The security specialist EMEA will be responsible for the day-to-day management of allEnterprise security operations in EMEA, reporting to the EMEA Security Operations leads.This will include interacting with all corporate XF partners and country leadership teams ifrequired, vendor management … values of integrity, vigilance, and excellence. Managing the day-to-day security operations at client's corporate locations acrossEMEA. Drive multiple security projects effectively, including managing key performanceindicators, vendor management, and quality control. This will often include liaising withother members of the Enterprise Security team to ensure alignment on new projects. Where necessary, contextualize and add regional-specific vigor More ❯
Senior Security SA, Thailand, Security SA, APJ Do you have the passion for helping customers and partners design and create robust security architectures to address their enterprise riskmanagement requirements using cloud computing? Do you enjoy helping customers become more secure across their workloads and assisting them meet compliance accreditation? Would you like to do this using the … possess customer facing skills that will allow them to represent AWS well within the customer's environment and drive discussions with senior personnel regarding trade-offs, best practices, and risk mitigation. They should also have a demonstrated ability to think strategically about business, product, and technology challenges. The ideal candidate will look like this Be great fun to work More ❯
protection laws outlined by the FTC and customer requirements. Process optimization to develop best practices for efficient annotation workflows and continuously refine labeling guidelines within conditions and standards. Tool management and improvement, work alongside geospatial and AI experts to refine annotation guidelines and accuracy benchmarks, utilizing feedback loops on labeling tools and applications to enhance functionality. Monitor industry trends … in previously mentioned degrees and 10+ years' experience in Geospatial Analysis, Geospatial Engineering, or Cartography. Certifications in AI Ethics, Machine Learning, Geographic, Geospatial, or Regulatory Compliance (e.g., NIST AI RiskManagement Framework, Certified GEOINT Professional, GIS Professional, ASPRS, GEOINT Professional). Extensive experience in AI-powered image and video annotation. Experience working with government agencies or defense-related More ❯
West Sussex, England, United Kingdom Hybrid / WFH Options
Arguile Search
key role in managing high-value technology based defence contracts, from bidding and pre-signature negotiations to post-signature contract management. You will be responsible for ensuring commercial success, risk mitigation, and compliance within a highly regulated and strategic environment. Key Responsibilities: ✅ Lead commercial activities across airborne defence contracts. ✅ Oversee the end-to-end bid process, ensuring competitive and … Provide commercial guidance to internal teams and senior stakeholders. ✅ Collaborate with procurement, finance, and legal teams to drive business objectives. About You: ✔ Proven experience in a commercial/contracts management role. ✔ Strong understanding of defence contracts, including MOD and international agreements. ✔ Experience managing bids, pre-signature negotiations, and post-contract delivery. ✔ Excellent negotiation, riskmanagement, and stakeholder More ❯
Solutions Parameta Solutions is the Data & Analytics division of TP ICAP Group. The business provides clients with unbiased OTC content and proprietary data, in-depth insights across price discovery, riskmanagement, benchmark and indices, and pre and post-trade analytics. Its post-trade solutions offering helps market participants control their counterparty and regulatory risks through a growing range … our people's know-how with the latest technology to improve price discovery, trade execution and liquidity flow. Connections create strength. Through them, we help our clients to manage risk, realise investment strategies and expand the scope for growth. And connections act as a catalyst. Sparking richer solutions for our clients to break new ground, modernising markets for future More ❯
of ServiceNow development experience Communication Skills Creative Problem Solving Javascript Software Development Desired Skills: Experience with ServiceNow CAM, RMF, GRC, and/or SecOps modules NIST SP 800-53 RiskManagement Framework (RMF) ServiceNow More ❯
knowledge of network security, cryptography, firewalls, VPNs, and security protocols ️ Familiarity with cloud security solutions (AWS, Azure, GCP) and security technologies (IDS/IPS, SIEM, DLP) ️ Strong experience with riskmanagement, threat modeling, and security architecture frameworks ️ Certifications such as CISSP, CISM, TOGAF, or equivalent are highly preferred More ❯
corporates then this role might be for you. You will join a rapidly expanding team of experts providing valuable solutions to some of the world's biggest organisations around RiskManagement & Cyber Security. Strong STEM degree, ideally MSc level & above Good knowledge & Experience of Machine Learning Algorithms Strong Software Engineering skills - ideally Python Ability to articulate how you More ❯
Contribute to system reviews and studies to help establish system requirements, performance parameters, and integration with related acquisition elements. • Assist in the development and execution of configuration, data, and riskmanagement processes and plans. Required Experience One of the following combinations of education and experience is required: o Bachelor's degree in an ABET-accredited engineering discipline and More ❯
including daily profit and loss (P&L) attribution, balance sheet substantiation, and reconciliations. Execute independent price verification (IPV) processes across a range of financial instruments. Collaborate with trading desks, riskmanagement, and operations teams to ensure data integrity and resolve discrepancies. Assist in the development and enhancement of financial reporting and product control frameworks and processes. Support regulatory More ❯
Are you a Penetration Tester with a passion for working in the government and defense sectors? Join a global consultancy specializing in security and riskmanagement, helping organizations understand threats to their critical assets and implement intelligent security solutions. With a strong presence in the UK and operations worldwide, the company enable clients to navigate complex security challenges More ❯
systems design, network architecture/administration, and Continuity of Operations (COOP). Evaluate vulnerability findings and determine conceptual mitigations and next steps, integrating technical and mission-impact perspectives. Support riskmanagement and other business process frameworks to bridge the gap between technical threats/vulnerabilities and non-technical stakeholders. Ensure evaluation and mitigation techniques are technically sound and More ❯
experience in the following skillsets/disciplines: o Littoral Combat Ship (LCS) Total Ship Computing Environment (TSCE) experience; o Computer security, military system specifications, and DoD cybersecurity policies; o RiskManagement Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection More ❯
experience in the following skillsets/disciplines: o Littoral Combat Ship (LCS) Total Ship Computing Environment (TSCE) experience; o Computer security, military system specifications, and DoD cybersecurity policies; o RiskManagement Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection More ❯
implications. • Perform technical assessments of products and services for secure integration into Sponsor systems. • Document solution architectures, integration processes, and system interfaces. • Align all activities with the Sponsor's RiskManagement Framework (RMF). • Coordinate and lead stakeholder engagements including requirements sessions and user feedback meetings. • Utilize Sponsor-approved tools to track issues, action items, and progress. • Conduct More ❯