Permanent Risk Management Job Vacancies

576 to 600 of 2,441 Permanent Risk Management Jobs

Chief Data & Analytics Officer & Head of Transformation

London, United Kingdom
Eutopia Solutions Ltd
engineering, analytics, and data science. Lead the development of a high-performing Data Office to deliver best-in-class data capabilities. Define and deliver frameworks for data quality, information management, and privacy compliance across multiple jurisdictions. Analytics & Innovation: Drive innovative data exploitation opportunities, including automation, AI-driven solutions, and enhanced customer life cycle management, delivering tangible financial benefits … operational efficiencies. Develop advanced data analytics and reporting solutions to enhance strategic decision-making and improve regulatory reporting accuracy. Establish a single customer view capability for enhanced client relationship management and regulatory compliance. Transformation Leadership: Lead the enterprise-wide transformation agenda, ensuring alignment with strategic priorities and integration of cross-functional change initiatives. Chair the Transformation Committee, overseeing all … data sourcing strategies (achieving significant annual external data savings). Realise annualised benefits via improved data quality, automation, and process optimisation. Contribute to enhanced operational controls and efficiency, improving risk management and overall business performance. Qualifications & Experience Proven executive leadership experience in data management, analytics, and large-scale business transformation within financial services or similarly complex sectors. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Global Banking & Markets - IRP Volex Desk Strategist - Analyst - London London United Kingdom ...

London, United Kingdom
Goldman Sachs Bank AG
work closely with a trading desk and/or sales teams to identify and understand business needs, and address gaps through development of real-time tools for pricing and risk-management. Working as a desk strategist means being aware and reactive of market environments, and being collaborative with stakeholders on optimizing trading strategies and risk-hedging solutions. Your … impact: The interest rate options and exotics desk strategists will typically work with the trading desks on developing and enhancing pricing and risk-management tools, while also getting involved in the market-making of over-the-counter products. Being at the core of their business activities, strategists are in constant collaboration with colleagues from multiple regions as well … exotics sphere; Collaboration with trading and structuring in analysis of trade ideas; Development of analytical tools and infrastructure to assist on core trading activities such as quoting, valuation and risk management; Collaboration with adjacent teams on optimizing real-time infrastructures for pricing and risk calculations; Development of market-making tools and bid-offer generation, using state-of More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Global Banking & Markets - IRP Volex Desk Strategist - Analyst - London

London, United Kingdom
WeAreTechWomen
work closely with a trading desk and/or sales teams to identify and understand business needs, and address gaps through development of real-time tools for pricing and risk-management. Working as a desk strategist means being aware and reactive of market environments, and being collaborative with stakeholders on optimizing trading strategies and risk-hedging solutions. Your … impact: The interest rate options and exotics desk strategists will typically work with the trading desks on developing and enhancing pricing and risk-management tools, while also getting involved in the market-making of over-the-counter products. Being at the core of their business activities, strategists are in constant collaboration with colleagues from multiple regions as well … exotics sphere; Collaboration with trading and structuring in analysis of trade ideas; Development of analytical tools and infrastructure to assist on core trading activities such as quoting, valuation and risk management; Collaboration with adjacent teams on optimizing real-time infrastructures for pricing and risk calculations; Development of market-making tools and bid-offer generation, using state-of More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Artificial Intelligence Products Security Manager

East London, London, United Kingdom
Hybrid / WFH Options
A&O Shearman
and deployment of AI products. Ensure that AI model behaviour in the firms AI products is continuously monitored for any anomalies and/or potential security breaches. Conduct regular risk assessments and vulnerability analyses to identify potential security weaknesses in AI products and their environment. Define, develop, and maintain security policies, procedures, and standards specific to the firms AI … GDPR) and ethical guidelines. Standardise a control framework for any AI products produced by the firm, ensuring consistent security practices across all environments. Oversee the undertaking of any Governance, Risk, and Compliance (GRC) tasks or activities related to AI products, such as responding to queries or requests from external parties or auditors pertaining to AI products. Collaborate with legal … teams to assess the impact of the AI product on client confidentiality, data protection, and professional responsibility. AI Risk Assessments and Review Establish repeatable processes for security risk assessments and security assessments for any new AI products or new use cases existing products before they go to market, including bias detection and accountability. Perform security risk assessments More ❯
Employment Type: Permanent, Work From Home
Posted:

AI Products Security Manager

London, United Kingdom
Hybrid / WFH Options
Allen & Overy LLP
deployment of AI products. Ensure that AI model behaviour in the firm's AI products is continuously monitored for any anomalies and/or potential security breaches. Conduct regular risk assessments and vulnerability analyses to identify potential security weaknesses in AI products and their environment. Define, develop, and maintain security policies, procedures, and standards specific to the firm's … GDPR) and ethical guidelines. Standardise a control framework for any AI products produced by the firm, ensuring consistent security practices across all environments. Oversee the undertaking of any Governance, Risk, and Compliance (GRC) tasks or activities related to AI products, such as responding to queries or requests from external parties or auditors pertaining to AI products. Collaborate with legal … teams to assess the impact of the AI product on client confidentiality, data protection, and professional responsibility. AI Risk Assessments and Review Establish repeatable processes for security risk assessments and security assessments for any new AI products or new use cases existing products before they go to market, including bias detection and accountability. Perform security risk assessments More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Architecture and Engineering Senior Manager

East London, London, United Kingdom
Hybrid / WFH Options
A&O Shearman
gain intel from the firms cybersecurity lawyers. The global team have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients cyber risk management and incident response programmes. What you will do Security Architecture Strategy & Governance Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture … strategy across the firms platforms, including M365, legal and risk platforms, legal tech systems, data platforms, AI, infrastructure, and knowledge management. Ensure that platform-specific security standards, patterns, and design principles which suitably support secure business operations and digital transformation have been defined and are enforced. Platform Security Oversight Serve as the security lead for platform-specific architecture, ensuring … to mitigate risks. Security Design and Architecture Assurance Review and approve security architecture designs for new services, platform upgrades, and major integrations, with a focus on data privacy, identity management, and access controls. Ensure alignment with firm-wide security policies, particularly in relation to cloud security, data loss prevention, AI governance, and information governance. Champion zero trust and defence More ❯
Employment Type: Permanent, Work From Home
Posted:

Security Architecture and Engineering Senior Manager

London, United Kingdom
Hybrid / WFH Options
Allen & Overy LLP
intel from the firm's cybersecurity lawyers. The global team have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients' cyber risk management and incident response programmes. What you will do Security Architecture Strategy & Governance Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture … strategy across the firm's platforms, including M365, legal and risk platforms, legal tech systems, data platforms, AI, infrastructure, and knowledge management. Ensure that platform-specific security standards, patterns, and design principles which suitably support secure business operations and digital transformation have been defined and are enforced. Platform Security Oversight Serve as the security lead for platform-specific architecture … to mitigate risks. Security Design and Architecture Assurance Review and approve security architecture designs for new services, platform upgrades, and major integrations, with a focus on data privacy, identity management, and access controls. Ensure alignment with firm-wide security policies, particularly in relation to cloud security, data loss prevention, AI governance, and information governance. Champion zero trust and defence More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Asset & Wealth Management - Birmingham - Associate / Vice President - Software Engineering

Birmingham, Staffordshire, United Kingdom
WeAreTechWomen
action. Create new businesses, transform finance, and explore a world of opportunity at the speed of markets . Goldman Sachs Engineers are innovators and problem-solvers, building solutions in risk management, big data, mobile and more. We look for creative collaborators who evolve, adapt to change and thrive in a fast-paced global environment. Asset & Wealth Management Division: Across Asset and Wealth Management (AWM), Goldman Sachs helps empower clients and customers around the world reach their financial goals. The Private Wealth management (PWM) business within Asset & Wealth Management division provides comprehensive Investment Management services and advice across a full range of asset classes for very high net worth individuals. PWM leverages a … technology platform offering, an integrated suite of tools, and applications to service clients. This platform helps realize a client's goals and objectives, develops, and implements an integrated wealth management plan and delivers first-class client service. Across AWM, our growth is driven by a relentless focus on our people, our clients and leading-edge technology, data, and design. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Regulatory Change Analyst

London, United Kingdom
Hybrid / WFH Options
Ruleguard
make it as easy as possible for banks, brokers, and investment firms to comply with regulation. We are looking for a Regulatory Change Analyst to support the Head of Risk & Compliance, who is responsible for our Thought Leadership Strategy and oversight of risk management at Ruleguard. This role is best suited to someone with prior experience, or … individual who is ready to take on a new challenge and grow with the business by enhancing their regulatory knowledge and skills. About the role Ensure the Regulatory Updates Management system remains up to date with changes to regulations Develop understanding of international regulatory developments Undertake key research projects to support the international strategy Undertake administrative duties for the … R&C team such as follow up on risk issues, monthly reporting, posting TLS content to third party sites Undertake and maintain ongoing surveillance of our client base Assist colleagues in learning and understanding matters of regulatory compliance Review and advise on our collateral in relation to matters of regulatory compliance (working with marketing team to draft key email More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Chief Information Security Officer

London, United Kingdom
ameygroupi
the IT function and external partners. Establishing a target operating model, governance frameworks, and a strategic roadmap to ensure cohesive implementation of security and privacy strategies, supporting business enablement, risk management, and resilience across all markets and functions. Key responsibilities: Define and deliver multi-year cyber-security and privacy strategies aligned to corporate objectives and customer trust requirements. … and privacy policies across the organisation. Define and report on key metrics to the board and executive leadership on the effectiveness of security and privacy programmes. Own the enterprise risk register for cyber security and privacy; define KPIs, lead cyber resilience initiatives and tabletop exercises in coordination with Crisis Management, BCP, and ITDR. Oversee the integration of PIAs … project lifecycles to ensure privacy risks are identified and mitigated early. Maintain strategic relationships with partners and suppliers that support the information security and privacy programme; oversee third-party risk assurance activities including due diligence, contract reviews, and ongoing monitoring. Monitor threat intelligence sources and conduct horizon scanning to identify emerging risks and technology trends. Lead all security activities More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Principal Cyber Security Consultant

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
QinetiQ Limited
with cutting-edge technology in partnership with some of the most brilliant minds. The Role: As a Principal Cyber Security Consultant you will join our Information Assurance and Cyber Risk team that provides expert risk assessments, analysis and advice to clients within the Defence Sector. Day-to-day, you'll be a key stakeholder in the Security Risk Management process, working closely with our clients to identify and respond to cyber threats and security risks. Your responsibilities will include: Leading cyber security consultancy with key customers at a senior level providing subject matter expertise, advice and guidance on security matters Implementing Secure by Design for systems across live, test and training environments Monitoring and reporting on … system security requirements and vulnerabilities, escalating unresolved vulnerabilities when appropriate Managing the effective coordination of all security-related activities, including but not limited to, queries, incident management, document reviews and testing Modelling Cyber security risks using established and novel frameworks Essential experience of the Principal Cyber Security Consultant: In-depth knowledge of MoD Security policy In-depth knowledge of More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior QARA Engineer - Software

London, United Kingdom
Hybrid / WFH Options
Crane Venture Partners
and EU MDR. Lead software validation and verification (V&V) activities, including test planning, execution, and documentation. Collaborate with software engineers to ensure software development lifecycle (SDLC) compliance, including risk management (ISO 14971) and cybersecurity considerations. Support regulatory submissions (e.g., FDA 510(k), CE marking) by preparing software-related documentation such as Software Development Plans, Software Design History … a related field Strong knowledge of ISO 13485, IEC 62304, FDA 21 CFR Part 820, and EU MDR regulations for software Experience with software validation, V&V testing, and risk management (ISO 14971) Familiarity with software configuration management, cybersecurity standards, and AI/ML regulatory considerations is a plus Hands-on experience with document control systems (e.g. … eQMS), CAPA management, and audit processes Strong analytical and problem-solving skills with a detail-oriented mindset Excellent communication skills, with the ability to translate regulatory requirements into practical engineering processes. Benefits: Company equity plan Company pension scheme Private medical, dental and vision insurance Group life assurance Comprehensive mental health support and resources Unlimited holiday allowance (+ bank holidays More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity Course Instructor with Security Clearance

Hanover, Maryland, United States
Eccalon LLC
growing and innovative academic program. Responsibilities: Instruction and curriculum Delivery Course Instruction: Teach undergraduate or graduate-level cybersecurity courses, including topics such as network security, ethical hacking, digital forensics, risk management, cryptography, and incident response using blended learning techniques to include reverse learning objectives. Curriculum Development: Produce capstones, design and update course materials, including syllabi, lecture notes, practical … lab activities, assignments, and exams to ensure content reflects current industry trends, best practices, and emerging threats. Upload curriculum into the Eccalon Learning Management System. Hands-on Lab Exercises: Build labs as well as create, implement, and manage cybersecurity lab tools like UAS, AUV, and additive manufacturing control systems, etc., to provide students with real-world scenarios and hands … content aligns with industry-recognized certifications, such as CompTIA Security+, Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and others. Lab and Practical Component Oversight Cyber Lab Management: Oversee and manage the cyber lab environment, including setting up virtualized networks, attack and defense simulations, and monitoring student use of the systems. Troubleshooting: Assist students in troubleshooting technical More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Control Assessor with Security Clearance

Saint Louis, Missouri, United States
Life Cycle Engineering
packages (e.g., ISO/IEC 15026- 2). Establish acceptable limits for the software application, network, or system. Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network. Manage accreditation packages (e.g., ISO/IEC 15026-2) Required Education, Skills, and Experience: Bachelor's degree in … experience in establishing, implementing, and tracking project plans (more experience required for sr. level openings). Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of risk management processes (e.g., methods for assessing and mitigating risk) Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. Knowledge of cybersecurity and … privacy principles and tools. Knowledge of Security the Risk Management Framework (RMF) and Assessment and Authorization process. Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). Skill in discerning the protection needs (i.e., security controls) of information systems and networks. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Program Manager with Security Clearance

Washington, Washington DC, United States
SiloSmashers
SiloSmashers, Inc. is a strategy, technology, and management consulting firm, founded in 1992, and located in Reston, Virginia. SiloSmashers delivers superior services and solutions to the public sector in the areas of project/program management, performance management, and IT security. The company provides innovative, collaborative business approaches, and proven methodologies that enable customers to break down … The Program Manager serves as the single point of contact for the contracting officer and the contracting officer's representative. The ideal candidate has experience managing a security program management office (PMO), positively affecting change and improving operations in a federal cybersecurity environment. The position entails managing a team of up to 50 individuals. General Responsibilities Collect requirements from … customer on production and delivery of documentation providing operational guidance and processes around cybersecurity capability services, cybersecurity management, and other topics as needed. Translate technical cybersecurity capability requirements into stakeholder needs and solutions statements. Manages overall contract financials. Maintains a budget and seeks efficiencies to save costs. Produces financial reports as required by the contract and by management. Primary More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Analyst - Audit, Compliance & Cybersecurity

Southampton, Hampshire, United Kingdom
Hybrid / WFH Options
NICE
CSOC) activities, including incident monitoring and response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation: Assist internal control owners in scoping appropriate evidence and preparing for external audits. Gap Assessments: Facilitate and/or conduct internal gap assessments and … of compliance processes. Audit Findings: Identify control deficiencies and work with stakeholders to recommend cost-effective, value-added remediation actions. Compliance Reporting: Draft audit reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as … implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. Vulnerability Management: Support the tracking and remediation of vulnerabilities in coordination with IT and Security Operations teams. Have you got what it takes? Strong expertise in audit and compliance frameworks, including More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Digital Procurement Solution Manager - Supplier Journey

London, United Kingdom
Virgin Media Business Ireland
Source-to-Pay processes including category strategy and supplier discovery, sourcing, contracting and enablement. You will work in tight partnerships and cross-collaboration with other Digital Procurement Solution Managers, Risk and ESG team and Data and Insights team to ensure supplier data and process is seamlessly integrated, ensuring data accuracy and holistic approach to mature supplier information and data … accuracy of framework. You will own supplier backlog items across multiple solutions, prioritize initiatives in alignment with other Digital Procurement Solution Managers. In addition, you will closely collaborate with Risk and ESG team for the market research/scouting, identification dedicated supplier journey orchestration (i.e. supplier onboarding, Third-Party Risk Management) and supplier master data management solutions and once identified collaborate in implementation translating Risk and ESG team business requirements into the solution functionality. Additionally, you may define and propose new product offerings that enhance supplier lifecycle management to our clients. The ideal candidate will be hard-working, motivated and resilient, with demonstrable experience working within a fast paced, demanding service design/ More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

ISSM 2 102-025 with Security Clearance

Hampton, Virginia, United States
IC-CAP
program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues … Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training … security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-022 with Security Clearance

Bedford, Massachusetts, United States
IC-CAP
program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues … Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training … security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-060 with Security Clearance

Dayton, Ohio, United States
IC-CAP
program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues … Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training … security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 1 102-133 with Security Clearance

Colorado Springs, Colorado, United States
IC-CAP
program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues … Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training … security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

OT Cyber Security Consultant

Bristol, United Kingdom
Hybrid / WFH Options
Reed Technology
a leading, nationwide organisation delivering high-impact cyber advisory services across critical infrastructure and the built environment. These roles are ideal for experienced cyber professionals who are passionate about risk management, resilience, and embedding security into complex, real-world systems. You will work closely with internal teams and external clients to identify and manage cyber risks, applying industry … to embed security into the full project lifecycle. Engage with clients across sectors such as energy, water, transport, and smart infrastructure. Share knowledge and support internal awareness of cyber risk across the wider business. Required Skills & Qualifications: Proven experience in cyber risk management and advisory, ideally within the built environment or critical infrastructure . Strong understanding of … cyber-physical systems , OT environments , and connected infrastructure . Experience applying assurance frameworks and technical standards (e.g. NIST, ISO27001, CAF). Background in governance, risk, and compliance (GRC) functions. Excellent communication and stakeholder engagement skills. Agile, analytical, and solutions-focused mindset. Experience in sectors such as energy, water, transport, or smart cities is highly desirable. Relevant certifications (e.g. CISSP More ❯
Employment Type: Permanent
Salary: £50000 - £100000/annum plus benefits
Posted:

OT Cyber Security Consultant

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Reed Technology
a leading, nationwide organisation delivering high-impact cyber advisory services across critical infrastructure and the built environment. These roles are ideal for experienced cyber professionals who are passionate about risk management, resilience, and embedding security into complex, real-world systems. You will work closely with internal teams and external clients to identify and manage cyber risks, applying industry … to embed security into the full project lifecycle. Engage with clients across sectors such as energy, water, transport, and smart infrastructure. Share knowledge and support internal awareness of cyber risk across the wider business. Required Skills & Qualifications: Proven experience in cyber risk management and advisory, ideally within the built environment or critical infrastructure . Strong understanding of … cyber-physical systems , OT environments , and connected infrastructure . Experience applying assurance frameworks and technical standards (e.g. NIST, ISO27001, CAF). Background in governance, risk, and compliance (GRC) functions. Excellent communication and stakeholder engagement skills. Agile, analytical, and solutions-focused mindset. Experience in sectors such as energy, water, transport, or smart cities is highly desirable. Relevant certifications (e.g. CISSP More ❯
Employment Type: Permanent
Salary: GBP 50,000 - 100,000 Annual
Posted:

OT Cyber Security Consultant

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Reed Technology
a leading, nationwide organisation delivering high-impact cyber advisory services across critical infrastructure and the built environment. These roles are ideal for experienced cyber professionals who are passionate about risk management, resilience, and embedding security into complex, real-world systems. You will work closely with internal teams and external clients to identify and manage cyber risks, applying industry … to embed security into the full project lifecycle. Engage with clients across sectors such as energy, water, transport, and smart infrastructure. Share knowledge and support internal awareness of cyber risk across the wider business. Required Skills & Qualifications: Proven experience in cyber risk management and advisory, ideally within the built environment or critical infrastructure . Strong understanding of … cyber-physical systems , OT environments , and connected infrastructure . Experience applying assurance frameworks and technical standards (e.g. NIST, ISO27001, CAF). Background in governance, risk, and compliance (GRC) functions. Excellent communication and stakeholder engagement skills. Agile, analytical, and solutions-focused mindset. Experience in sectors such as energy, water, transport, or smart cities is highly desirable. Relevant certifications (e.g. CISSP More ❯
Employment Type: Permanent, Work From Home
Posted:

Cyber Security Governance Lead

Scotland, United Kingdom
Nortal
functions to embed secure-by-design principles, assess cyber workforce requirements, and lead the development of governance policies and controls. Responsibilities Design and implement effective cyber governance structures and risk management processes. Develop organisational models that strengthen governance and streamline cybersecurity operations. Collaborate with multi-disciplinary teams to embed cybersecurity into governance frameworks, considering people, process, and technology. … or organisational goals. Build alignment with executive stakeholders, board members, and external partners to ensure accountability and clear decision-making processes. Qualifications A proven track record in leading cybersecurity risk and governance transformations in complex or government/defence environments. Deep knowledge of cybersecurity frameworks (e.g., NIST, ISO 27001, CIS Controls) and regulatory obligations. Experience designing and implementing cybersecurity … engagement skills Demonstrated ability to manage concurrent projects and priorities under tight deadlines. A passion for innovation and continuous learning in cybersecurity. Preferred Qualifications Degree in Cybersecurity, Information Technology, Risk Management, or related field. Professional certifications: CISSP, CISM, CRISC (or equivalent experience). Minimum 10 years' experience in cybersecurity transformation, ideally in a defence or maritime context. UK More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Risk Management
10th Percentile
£46,250
25th Percentile
£52,500
Median
£72,500
75th Percentile
£97,500
90th Percentile
£131,250