accounts and access. Implementation: Lead the deployment and configuration of PAM solutions, such as CyberArk, BeyondTrust, or other relevant technologies, ensuring they are properly integrated with existing IT infrastructure. RiskAssessment and Management: Conduct regular risk assessments related to privileged access, identifying potential security risks and vulnerabilities, and developing mitigation strategies. Governance and Compliance: Ensure that PAM More ❯
think innovatively, and listen to each other and customers in meaningful ways. Moody's is transforming how the world sees risk. As a global leader in ratings and integrated riskassessment, we're advancing AI to move from insight to action-enabling intelligence that not only understands complexity but responds to it. We decode risk to unlock … present to both technical and non-technical stakeholders Commercial mindset with a drive to win new customers and experience supporting complex sales cycles Interest in or experience with Supplier Risk, TPRM, KYC, Compliance or Sales & Marketing use-cases is desired Strong team player and enjoying interacting with people of all levels in a multicultural environment Technical understanding of API … corporate segment by understanding client workflows, aligning Moody's solutions, and demonstrating their value. Understanding Client Needs: Engage with potential clients to uncover business requirements, challenges, and opportunities; analyze risk/reward trade-offs and build compelling business cases Client Workshops & Discovery: Lead interactive sessions with prospects and clients to explore needs and problem statements, enabling tailored solution proposals More ❯
Cambridge University Hospital NHS Foundation Trust
months of the anticipated start date of employment For NHS Cambridgeshire and Peterborough based roles, all applicants from NHS Cambridgeshire and Peterborough who have identified that they are at risk of redundancy will be prioritised over those not at risk. However, interviews cannot be guaranteed. The advert will close at midnight on 17 November 2025. Interviews are due to … Experience of working with BMS systems Significant experience of working within a warranted data centre environment Experience of working with and setting local H&S protocols Experienced in completing risk and impact assessments and understanding of riskassessment methodology within critical infrastructure Knowledge Essential Strong working knowledge of Health and Safety requirements of working in cab rooms More ❯
model performance. Manage the full prompt lifecycle, ensuring alignment with business needs and technical requirements. Formulate precise queries to guide AI models in analyzing vast datasets for market trends, riskassessment, and portfolio optimization. Help generate automated reports, summaries of key financial metrics, revenue/expense forecasts, and risk assessments. Optimize AI outputs to turn raw data More ❯
to security threats; supporting digital transformation through the adoption and modernisation of cloud-based security solutions; and fostering a high-performing, collaborative team environment that encourages innovation while prioritising risk management, compliance, and continual improvement of security controls. Core Business Responsibilities Responsible for overseeing the design, implementation, and ongoing enhancement of security infrastructure and operational security systems. This includes … high levels of security service availability and prompt incident response, supporting transformation through cloud security adoption and modernisation, and fostering a collaborative team culture that balances innovation with effective risk management and compliance. The role also involves working closely with IT teams, key security vendors, and business stakeholders to deliver critical security projects and support digital transformation initiatives whilst … providers Ability to manage workload and prioritise multiple tasks across projects and operational support Effective communication skills, able to translate technical issues to non-technical stakeholders Working knowledge of riskassessment and mitigation strategies Relevant industry certification (such as CompTIA Security+, SSCP, or equivalent) desirable Strong attention to detail and a methodical approach to troubleshooting Self-motivated, proactive More ❯
and maintain programme governance structures and processes. Manage financial aspects of the programme, including budgeting, forecasting, and ensuring the visibility of financial impacts on Business Line Profit & Loss. Lead risk management efforts across the programme, ensuring risks are identified, assessed, and mitigated effectively. Ensure that all programme milestones are achieved and that corresponding deliverables are accepted by the customer. … programmes involving multiple project streams. In-depth knowledge of programme management methodologies such as Prince2, Agile, and Safe. Exceptional leadership, communication, and stakeholder management skills. Robust financial management and riskassessment capabilities. Must hold DV Active clearance; SC clearance is not sufficient for this role. More ❯
Birmingham, West Midlands, England, United Kingdom
Solicitors Regulation Authority
About the Department The Risk and Information Governance Department plays a critical role in ensuring the SRA's compliance with regulatory and security standards. We work collaboratively across the organisation to manage risk, protect information assets, and uphold the highest standards of governance and assurance. The Role This is an exciting opportunity to lead and manage the SRA … be a subject matter expert, providing strategic advice and operational support to ensure robust information security practices are embedded across the organisation. You'll work closely with IT Security, Risk, and Governance colleagues to assess and manage risks, investigate incidents, and deliver assurance activities. You'll also lead internal audits, maintain compliance with PCI DSS, and manage external certification … strategic decisions and drive security awareness What we're looking for Essential: Strong knowledge of ISO:27001 and experience managing an ISMS Recognised security qualification (e.g. CISM) Experience in riskassessment, incident management, and internal auditing Ability to interpret vulnerability scans, penetration tests, and IT health checks Excellent communication and stakeholder management skills Knowledge of Data Protection legislation More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid/Remote Options
Leidos Innovations UK Limited
authorities, governance forums, and acceptance boards. Continuous improvement & innovation: Identify opportunities for improvement, process & cost efficiency, and innovation. Introduce best practices in service management, automation, and monitoring. Service Impact Assessment: Review proposed solutions to assess and influence impacts to live service and support structures. What does Leidos need from me? You will have experience in designing full end-to … activity. Development of cost models for new business. Excellent interpersonal skills to engage technical and non-technical stakeholders at all levels. Strong analytical and documentation skills, including gap analysis, riskassessment, and transition planning. Experience working within cross-functional, multidisciplinary teams including engineering, cyber security, and programme teams It is desirable for the Service Architect to have: ITIL More ❯
think innovatively, and listen to each other and customers in meaningful ways. Moody's is transforming how the world sees risk. As a global leader in ratings and integrated riskassessment, we're advancing AI to move from insight to action-enabling intelligence that not only understands complexity but responds to it. We decode risk to unlock … learning how AI tools can be used to improve processes and drive efficiency. Interest in exploring AI systems and a willingness to develop awareness of responsible AI practices, including risk management and ethical use Education Bachelor's degree in Computer Science, Software Engineering, or a related technical field Responsibilities Design, build, and maintain scalable software solutions for Moody's … for delivering innovative software solutions that support Moody's public and private sector clients We enable data driven decision making through secure, scalable platforms We drive operational efficiency and risk transparency across government and corporate domains We foster a culture of technical excellence, inclusion, and continuous learning By joining our team, you'll be part of exciting work inregulatory More ❯
Azure environment - Essential Defender and Sentinel commercial experience - Essential Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerability management, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid understanding of riskassessment frameworks and methodologies Strong communication More ❯
Azure environment - Essential Defender and Sentinel commercial experience - Essential Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerability management, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid understanding of riskassessment frameworks and methodologies Strong communication More ❯
Azure environment - Essential Defender and Sentinel commercial experience - Essential Proven experience in a security-focused role, ideally across several of the following areas: security operations, vulnerability management, security assurance, risk management, or project consultancy A clear enthusiasm for cybersecurity, with a proactive attitude and eagerness to learn Solid understanding of riskassessment frameworks and methodologies Strong communication More ❯
implementation, procurement, testing, turnover to production and client migration. Plan, prepare, and track project schedules and budgets to assure controlled completion of each project step. Prepare and maintain a riskassessment and mitigation action plan. Maintain resource forecasts to ensure that schedule compliance and desired results are achieved. Update the company and external stakeholders on project progress, changes More ❯
future demands and support growth. 3. Analytical and Judgement Skills Technical Problem Solving : Act as escalation point for complex issues, using analytical skills to interpret logs and performance data. RiskAssessment : Identify and mitigate risks including security vulnerabilities and hardware failures. Decision-Making : Make informed decisions on upgrades and expansions, balancing technical needs with financial constraints. 4. Planning More ❯
experience of designing, engineering and securing cloud hosted solutions against real-world threats. Strong cloud security engineering and/or architecture experience in the fundamental Cloud Security Domains - Governance, Risk and Control (GRC), Identity and Access Management, Cloud Network and Compute Infrastructure Security, Data Protection (at-rest/in-transit), Workload Security, SIEM, Logging and Monitoring. Experience with Cloud … Frameworks - JAVA REST services with Spring, Python, .NET, etc. Threat Modelling Skills with tools such as IriusRisk or similar; experienced at identifying security flaws in cloud solutions via architectural assessment and threat modelling. Experience in Cloud Security RiskAssessment/Cloud Security Assurance. Strong engineering and/or architecture experience in the fundamental Cloud Security Domains - Identity More ❯
at InfoSum, ensuring that the company operates within the framework of application laws and regulations while supporting business objectives. You will provide strategic legal guidance to senior leadership, manage risk, and ensure InfoSum's continued growth through sound legal and regulatory practices. This role requires a balance of legal expertise, business acumen, and the ability to navigate a fast … to assess and address legal risks associated with new products, features, and partnerships. Lead and manage legal aspects of mergers, acquisitions, and strategic partnerships. Establish and maintain InfoSum's risk management framework, identifying potential legal risks and implementing appropriate mitigation strategies. Manage external counsel relationships and control legal spend efficiently. Develop and implement company-wide policies and training on … commercial contract negotiation, corporate governance, and regulatory compliance. Strong knowledge of data protection laws (GDPR, CCPA) and experience advising on privacy-related legal matters. Excellent analytical, problem-solving, and riskassessment skills. Ability to balance legal considerations with commercial priorities and business strategy. Exceptional communication and stakeholder management skills, with the ability to explain legal concepts to non More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Lorien
the transformation of a large-scale enterprise's threat and vulnerability landscape. This role is focused on rebooting the organisation’s vulnerability management capabilities to deliver a more dynamic, risk-based view of threats across cloud, hybrid, and on-prem environments. You’ll be responsible for designing and implementing a modern exposure management framework that enables real-time visibility … and lead the implementation of an enterprise-wide exposure management strategy. Identify and assess digital assets, attack surfaces, and potential vulnerabilities. Develop and apply exposure scoring models to evaluate risk in context. Recommend and support the selection of appropriate security tools and platforms. Collaborate with engineering, security, and leadership teams to tailor risk reporting and remediation strategies. Maintain … continuous monitoring and adapt to evolving environments (cloud, remote work, DevSecOps pipelines). What You’ll Bring Proven experience in Exposure Management , including: - Asset Identification - Attack Surface Mapping - RiskAssessment - Prioritisation & Remediation - Continuous Monitoring Strong understanding of exposure scoring systems (e.g., VPR, ACR, contextual risk). Hands-on experience with tools such as Qualys, Tenable, Rapid7 . More ❯
the transformation of a large-scale enterprise's threat and vulnerability landscape. This role is focused on rebooting the organisation’s vulnerability management capabilities to deliver a more dynamic, risk-based view of threats across cloud, hybrid, and on-prem environments. You’ll be responsible for designing and implementing a modern exposure management framework that enables real-time visibility … and lead the implementation of an enterprise-wide exposure management strategy. Identify and assess digital assets, attack surfaces, and potential vulnerabilities. Develop and apply exposure scoring models to evaluate risk in context. Recommend and support the selection of appropriate security tools and platforms. Collaborate with engineering, security, and leadership teams to tailor risk reporting and remediation strategies. Maintain … continuous monitoring and adapt to evolving environments (cloud, remote work, DevSecOps pipelines). What You’ll Bring Proven experience in Exposure Management , including: - Asset Identification - Attack Surface Mapping - RiskAssessment - Prioritisation & Remediation - Continuous Monitoring Strong understanding of exposure scoring systems (e.g., VPR, ACR, contextual risk). Hands-on experience with tools such as Qualys, Tenable, Rapid7 . More ❯
Eton, Berkshire, United Kingdom Hybrid/Remote Options
Connect Recruitment
the director(s) to confirm, re-arrange and ensure that the director has all necessary documents and proof prepared for their visit. 7. A strong understanding of commercial lending, riskassessment and financial analysis is required. 8. Absolute professionalism whilst representing the company is essential. 9. Strong time management is vital in this role. Role Responsibilities • Support the More ❯
Process improvement - Identify inefficiencies in workflows, proposing automation or process improvements. Project management - Drive delivery of software and hardware initiatives, managing scope, timelines, and dependencies across cross-functional teams. Riskassessment - Anticipate technical and operational risks to delivery, proposing mitigations early in the project lifecycle. Required Skills/Experience The successful candidate will have a strong and positive More ❯
Greater London, England, United Kingdom Hybrid/Remote Options
Icebrg.co
ensure accurate, timely portfolio data synchronisation Lead continuous improvement initiatives to enhance operational efficiency and reduce manual intervention, including automation initiatives for client money reconciliation and reporting Manage operational riskassessment and implement appropriate controls and monitoring procedures Coordinate with technology teams to ensure operational requirements are incorporated into platform development Implement best practices for data security and More ❯
position is not linked to a specific project, but rather encompasses a broad range of critical subject areas, including: Conducting and overseeing Data Protection Impact Assessments (DPIAs) for high-risk processing activities. Managing third-party vendor data protection risk, from initial due diligence through to ongoing monitoring. Overseeing personal data breach incident response, ensuring timely containment, investigation, and … and continuous improvement in data protection. Essential Skills and Attributes Demonstrable expertise in data protection and privacy compliance (e.g. GDPR or equivalent frameworks). Strong understanding of data protection riskassessment and mitigation processes. Proven experience in data breach management and incident response coordination. Desirable Skills and Attributes Collaboratively curious — keen to engage with colleagues to find pragmatic More ❯
position is not linked to a specific project, but rather encompasses a broad range of critical subject areas, including: Conducting and overseeing Data Protection Impact Assessments (DPIAs) for high-risk processing activities. Managing third-party vendor data protection risk, from initial due diligence through to ongoing monitoring. Overseeing personal data breach incident response, ensuring timely containment, investigation, and … and continuous improvement in data protection. Essential Skills and Attributes Demonstrable expertise in data protection and privacy compliance (e.g. GDPR or equivalent frameworks). Strong understanding of data protection riskassessment and mitigation processes. Proven experience in data breach management and incident response coordination. Desirable Skills and Attributes Collaboratively curious — keen to engage with colleagues to find pragmatic More ❯