determine which require WHS Alerts or RME Safety Network Actions and drive the site RME and WHS teams to develop content through the WHS communications process. • Partner with High Risk Operations team, equipment OEMs, Ops Engineering, RME, Operations, Global Risk Team etc. on equipment related incidents where design or retrofits may be necessary across multiple business units. • Support … peer review related safety programs. A day in the life Each day, we work backwards starting with our customer needs and partner with stakeholders to identify and mitigate high-risk safety hazards, ensuring maintenance operations remain safe. We analyse incidents, review KPIs, and conduct root cause investigations to drive continuous improvement. Through training, policy development, and engagement initiatives, we … influence safe behaviours and strengthen Amazon's safety culture. Our work ensures that risk reduction is proactive, comprehensive, and always evolving. About the team RME WHS is part of the High-Risk Operations (HRO) family, working under the mantra: "Safe to Operate. Operate Safely." We enable and equip our partners to manage the highest safety risks to Amazon More ❯
determine which require WHS Alerts or RME Safety Network Actions and drive the site RME and WHS teams to develop content through the WHS communications process. • Partner with High Risk Operations team, equipment OEMs, Ops Engineering, RME, Operations, Global Risk Team etc. on equipment related incidents where design or retrofits may be necessary across multiple business units. • Support … peer review related safety programs. A day in the life Each day, we work backwards starting with our customer needs and partner with stakeholders to identify and mitigate high-risk safety hazards, ensuring maintenance operations remain safe. We analyse incidents, review KPIs, and conduct root cause investigations to drive continuous improvement. Through training, policy development, and engagement initiatives, we … influence safe behaviours and strengthen Amazon's safety culture. Our work ensures that risk reduction is proactive, comprehensive, and always evolving. About the team RME WHS is part of the High-Risk Operations (HRO) family, working under the mantra: "Safe to Operate. Operate Safely." We enable and equip our partners to manage the highest safety risks to Amazon More ❯
Support the implementation of a comprehensive business resilience framework aligned with DORA and other regulatory requirements (e.g., NIST, ISO 22301, ISO 27001). Develop training materials, policies, controls, and riskassessment methodologies to ensure adherence to regulatory standards. Support key pillars of the DORA program, including ICT Risk Management, Digital Resilience Testing, and Third-Party Risk … adherence. Training & Awareness: Design and execute DORA related workshops to support the successful delivery of the DORA programme. Develop and deliver training programs to educate employees on resilience and risk management practices. Foster a culture of preparedness and continuous improvement across ION Markets. Experience, Skills and Qualifications: Bachelor's or Master's degree in Business, Risk Management, Cybersecurity … with extensive exposure to Operational Resilience, particularly DORA . Strong understanding of UK regulatory requirements and frameworks such as DORA, NIST, ISO 22301, and ISO 27001. Proven experience conducting risk assessments, regulatory compliance reviews, and resilience testing . Ability to translate regulatory requirements into actionable plans and track them to completion. Strong stakeholder management and ability to work with More ❯
The purpose of this role is to assist in the operation of Technology External Assurance (TEA) function focused on supplier assurance by the execution and oversight of activities including risk assessments, contract reviews, due diligence, auditing, findings and reporting to manage the information security risks related to these areas for BGIUK's evolving supplier profile aligned to defined OLAs … oversee the delivery of end-to-end supplier assurance both as part of the onboarding and ongoing processes aligned to defined OLAs, including first pass and follow-up reviews, risk-based analysis and conclusions of supplier responses based on supplier engagement & risk profile, documentation and reporting of findings. Execute and oversee the delivery of end-to-end audits … both for Information Security engagements and wider Supplier Assurance audits aligned to Bupa's standard and timelines, including planning, risk-based scoping, fieldwork, documentation, and reporting, in direct partnership with suppliers and Procurement. Reviewing supplier contractual agreements to ensure that Bupa's expectations are fully achieved or formally risk accepted by appropriate leadership to defined OLAs and meet More ❯
push the boundaries? We are seeking a person who is decisive, collaborative and calm under pressure, detail-oriented and analytical, to help us implement and run a new IT risk management framework. This is a multi-faceted role supporting both a Technology Transformation Programme as well as helping to ensure current operational technology and applications are reliable and resilient. … other experiences as we are creating a new diverse and dynamic team to build innovative ways of building and assessing operationally resilient technology services. Principal Accountabilities: - Business Impact Assessments & Risk Identification: Develop asset management strategies, lead business impact and vulnerability assessments, conduct threat modelling, and maintain risk identification frameworks. - RiskAssessment & Evaluation: Ensure compliance with governance … policies, provide expertise on operational resilience, and support risk assessments for internal operations and third-party vendors. - Crisis & Incident Management: Lead the design and implementation of IT Disaster Recovery and Business Continuity plans, conduct simulations, and manage the Crisis and Major Incident Management Framework. - Risk Governance & Compliance: Support governance service administration, optimise processes for efficiency, and assist with More ❯
skills Experience of developing, testing and evaluation clinical software systems Experience of having delivered clinical/nursing IT projects, leading significant change, delivering tangible and sustained improvements Experience of riskassessment and risk management Desirable Experience of preparing reports for consideration and operational or strategic level Skills and Ability Essential Demonstrates knowledge and ability to advise the More ❯
Security Architect to lead cyber security design and assurance for national-scale Position, Navigation, and Timing (PNT) programmes; requiring expertise in enterprise security architecture frameworks, cloud and IT technologies, risk mitigation, and relevant certifications such as CISSP or CISM, while collaborating with senior stakeholders and ensuring alignment with NPL’s security strategy and compliance with government and industry standards. … responsible for the overall cyber security design, development and delivery across strategic PNT programmes. The role will be responsible for delivering assurance relating to activities of high complexity and risk, making decisions that will enable NPL to achieve its goals within its risk appetite. The Principal Enterprise Security Architect will lead the Cyber Security pillar within the PNT … will be report into the head of NPL’s Cyber Security Team, part of the NPL CIO function helping to provide all of NPL with day-to-day information risk consultancy, advice, and guidance. It will also support with prioritisation of risk mitigation activities, tracking of risk tolerance and reporting while supporting the design and implementation of More ❯
and Takepayments. Our software platform and APIs enable our partners to offer flexible financing products, in their desired branding, to their merchant base. With YouLend's AI-driven credit riskassessment solutions, more merchants and SMEs than ever can receive fast, flexible and affordable funding. We operate in 9+ geographies across the UK, EU and the US. As … the Head of Regulatory Compliance with preparing updates to YouLend's Senior Management Team where necessary and embedding a governance framework that facilitates this. Horizon scanning - Through the identification, assessment, and ongoing monitoring of current and future regulatory risks, including gap analysis of new regulatory initiatives and guidance from the Youlend's regulators Advisory - Act as a trusted advisor … queries, audits, and ongoing communications with YouLend's Regulators. Regulatory Reporting - Lead regulatory reporting processes to ensure timely and accurate submissions to the FCA and other relevant authorities. Enterprise Risk Management - Support with the uplift of YouLend's Enterprise Risk Framework, working with risk owners across the business to develop and mature the identification, assessment and More ❯
programmes working with the outsourced cyber security supplier and provide general cyber security advice and guidance to the Group IT functions. They will also support the overall cyber security risk position pulling together an overall IT Security threat and risk profile. You will Serve as a cyber security specialist and co-ordinate and manage the third party security … consulting service helping IT programme and project teams to implement secure by design approaches, perform risk assessments and threat models to derive control objectives and to comply with enterprise and IT security policies, requirements, industry regulations, and best practices. Collate joined up IT security risk position for the Group and provide updates on risks, threats and overall security … status to IT management and stakeholders. Work closely with enterprise and solution architects and security specialists to assure that adequate security controls are in place throughout critical and high risk systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements. Deliver and report on assurance reviews via the outsourced provider of designs and More ❯
programmes working with the outsourced cyber security supplier and provide general cyber security advice and guidance to the Group IT functions. They will also support the overall cyber security risk position pulling together an overall IT Security threat and risk profile. You will Serve as a cyber security specialist and co-ordinate and manage the third party security … consulting service helping IT programme and project teams to implement secure by design approaches, perform risk assessments and threat models to derive control objectives and to comply with enterprise and IT security policies, requirements, industry regulations, and best practices. Collate joined up IT security risk position for the Group and provide updates on risks, threats and overall security … status to IT management and stakeholders. Work closely with enterprise and solution architects and security specialists to assure that adequate security controls are in place throughout critical and high risk systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements. Deliver and report on assurance reviews via the outsourced provider of designs and More ❯
of client's processes and procedures, support regulatory or audit reviews, advising on TM technology, optimisation, and remediation programmes Define and lead on TM model optimisation, industry monitoring typology riskassessment methodology and overall control framework in building an effective Transaction Monitoring programme Leading and developing strong relationships with project stakeholders Supporting with planning, status update and support … during projects Strong team ethos and ability to work efficiently and accurately under pressure and minimal supervisions What you will need: At least ten years experience in financial crime risk and compliance within the Financial Services industry 5-10 years of experience in either strategic and/or management consulting with a focus on financial crime compliance and risk Experience developing and applying corporate governance, compliance control and risk management frameworks Degree level education Financial crime risk or compliance related professional qualifications e.g. ICA Diploma Other role requirements: Keeping abreast of legislation, regulation, guidance and technologies relating to financial crime risk and compliance Commercial business awareness and financial acumen and understanding We offer the opportunity More ❯
in moving to the beautiful county of Derbyshire, we can provide a generous relocation package of up to £8,000 and the key duties are: Provide psychiatric assessments, including assessment of risk to self and others. Manage patients under the care of the CAMHS Crisis and Liaison pathway including riskassessment and management. Liaison with community More ❯
insights, and identify opportunities to integrate improvements and new features into the user flow and product roadmap. Advocate for user needs while balancing business requirements and technical feasibility. Innovation & Risk Management: Drive innovation by identifying emerging technologies and trends that may affect the product landscape. Proactively manage product risks, ensuring that potential roadblocks are identified and mitigated early in … and innovative approach to overcoming product challenges and seizing new opportunities. Data-Driven Decision Making: Comfortable with data analysis and making decisions based on KPIs, metrics, and performance analytics. Risk Management: Experience in riskassessment and mitigation strategies, ensuring smooth product delivery and minimizing potential disruptions. About S&P Global Ratings S&P Global Ratings is the … securities. We offer an independent view of the market built on a unique combination of broad perspective and local insight. We provide our opinions and research about relative credit risk; market participants gain independent information to help support the growth of transparent, liquid debt markets worldwide. S&P Global Ratings is a division of S&P Global (NYSE: SPGI More ❯
pay will be based on your skills and experience talk with your recruiter to learn more. Base pay range Direct message the job poster from InterQuest Group Recruitment Consultant- Risk, Regulation and Compliance About the Role An exciting opportunity has opened up for an experienced Underwriter to join a dynamic and fast-scaling Electronic Money Institution (EMI) based in … London. Operating at the forefront of digital payments, this organization is committed to delivering secure, scalable, and compliant payment solutions for a diverse client base. As part of the Risk & Compliance function, youll play a key role in shaping the underwriting strategy, supporting client onboarding, and driving sustainable business growth. What Youll Be Doing This role is based onsite … in London and will involve building and evolving the underwriting framework to support business expansion. Youll lead efforts to assess financial crime risk, creditworthiness, operational robustness, and reputational factors of prospective and existing clients. Collaborating across compliance, sales, onboarding, and operations teams, your goal will be to ensure thorough riskassessment and smooth onboarding processes. Key Responsibilities More ❯
City of London, London, United Kingdom Hybrid / WFH Options
IPS Group
Assist in establishing a comprehensive resilience framework that meets DORA standards and other recognised guidelines (e.g. ISO 22301, ISO 27001, NIST). Draft internal controls, policies, training content, and riskassessment methodologies. Contribute to core DORA workstreams such as ICT risk management, scenario-based testing, and oversight of third-party providers. Stakeholder Engagement Coordinate workshops and sessions … operational leads. Monitor implementation progress and support a smooth transition into standard business processes. Training & Culture Develop and deliver resilience-focused training across various teams. Promote best practices in risk and continuity planning. Embed a culture of awareness, accountability, and continuous improvement. What Were Looking For: A degree in Risk Management, Cyber Security, Information Technology, or a related … resilience, cybersecurity, or regulatory roles. Solid understanding of UK and EU regulatory frameworks, with hands-on experience relating to DORA. Demonstrable experience conducting regulatory gap analyses, resilience testing, and risk assessments. Strong organisational skills and the ability to manage competing priorities in a deadline-driven environment. Excellent interpersonal and stakeholder management skills, particularly in regulated settings. Desirable Attributes: Relevant More ❯
cross functional teams to ensure alignment with Supplier Management finance and legal. Develop and implement supplier performance metrics and governance framework to ensure quality compliance and services continuity Supplier Assessment and Rationalization. Work with Risk Owners across Marex and design and operate a proportionate DD and riskassessment process for inherited suppliers. Identify redundancies and opportunities … management processes Track and report on realized synergies and costs savings following supplier integration Drive continuous improvement initiatives to enhance supplier value and reduce total cost of ownership. Strategic Risk Initiatives. Work with the Head of Supplier Management & key business partners on a number of key supplier risk governance initiatives. Skills and Experience Possess knowledge and practical experience … in Suppliers Risk systems and associated framework implementation Demonstrable procurement track record of delivering significant firm value from identification of opportunities through to successful execution. Proven ability to build strong stakeholder relationships across a range of different business teams, be able to successfully influence in a collaborative manner. Possess strong project management skills with a background in delivering clear More ❯
Verisk Analytics is a multinational data and analytics riskassessment company and a leading source of information about insurance risk. To serve our clients, we draw upon our vast experience in data management and predictive modelling to offer decision analytics to the insurance industry through underwriting to claims management in personal lines, commercial lines, and the London market. … In underwriting we create sophisticated risk models to assist insurers with risk selection and accurate pricing. Our range of models is broad spanning residential and commercial property perils, motor insurance, SME business covers, travel, pet and health insurance. To feed our risk models we source many diverse datasets covering high resolution weather data, property attributes, business activities … and manage cases more effectively. Role Purpose Verisk are looking for a Data Scientist to support the development of various data science models to support the development of our risk management products. The International Analytics Team is a dynamic and exciting place to work: our projects are extremely varied and include developing supervised machine learning models, unsupervisedclustering type models More ❯
Once For All is a high-growth, cloud-based, SaaS subscription business. Our technology helps our customers to manage their supply chain governance, risk management and compliance. We work across public and private sector and have over 250k customers across the UK across 20 different sectors including construction, transport, retail, hospitality education, facility and property management, manufacturing, local and … controls to protect the organization's digital assets. They work closely with the CISO,Legal, Compliance, technical and business teams to ensure proactive protection against cyber threats, regulatory compliance,risk management and response to security incidents. The role will build relationships with departments to ensure identification and continuous progression of security threats in ourfast-paced SaaS technology business. This … endpoint security compliance. • Develop and deliver security awareness training programs for employees, including social engineeringsimulations and best practices. • Maintain detailed records of incidents, access violations, and remediation actions. • Perform risk assessments, policy reviews and development, and continuous improvement of security operations. Cybersecurity Management: • Supervise technological security measures including SIEM, DLP, IDS/IPS, Firewall, WAF, cryptological mechanisms, EDR • Analyse More ❯
threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong capability in … riskassessment, vulnerability management, and data informed decision-making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e., Python) to More ❯
Lead and continually look for ways to streamline and improve the programme and adapt to an ever-changing internal and external environment Ability to coordinate and monitor large-scale risk governance programme rollouts, ensuring milestones and KPIs are met across complex, global organisations. Able to shift perceptions of risk governance from compliance-driven to value-creating through education … their daily work. Anticipates resistance, manages ambiguity and adjusts strategies to sustain momentum in complex, evolving environments. Digital tooling and operationalisation Experience supporting the deployment and adoption of digital riskassessment and automation tools, ensuring ease of adoption through clear processes, user support and feedback loops. Skilled at building bridges between technical teams, process owners, and business leaders … processes across the company Operations Oversee all policies, standards and procedures needed across the group to comply with our privacy obligations Responsible for the continuous enhancement of the Privacy Risk and Control Framework e.g. NIST for Privacy Working with local legal advisers, to support countries' management teams in achieving the implementation of the Unilever privacy programme Direct line management More ❯
Lead and continually look for ways to streamline and improve the programme and adapt to an ever-changing internal and external environment Ability to coordinate and monitor large-scale risk governance programme rollouts, ensuring milestones and KPIs are met across complex, global organisations. Able to shift perceptions of risk governance from compliance-driven to value-creating through education … their daily work. Anticipates resistance, manages ambiguity and adjusts strategies to sustain momentum in complex, evolving environments. Digital tooling and operationalisation Experience supporting the deployment and adoption of digital riskassessment and automation tools, ensuring ease of adoption through clear processes, user support and feedback loops. Skilled at building bridges between technical teams, process owners, and business leaders … processes across the company Operations Oversee all policies, standards and procedures needed across the group to comply with our privacy obligations Responsible for the continuous enhancement of the Privacy Risk and Control Framework e.g. NIST for Privacy Working with local legal advisers, to support countries' management teams in achieving the implementation of the Unilever privacy programme Direct line management More ❯
security issues. Plan and coordinate external penetration tests to identify and address security weaknesses. Compile and deliver regular reports (monthly and quarterly) on the organisation's security status and risk landscape. Manage and maintain content on the security awareness platform, ensuring employees and key suppliers receive relevant, up-to-date cybersecurity training. Research emerging threats and technologies; propose security … Information Security, preferably in a senior or advanced analyst role. Proven experience in managing and auditing Information Security Management Systems (ISMS) aligned with ISO 27001 standards. Strong skills in riskassessment, vulnerability identification, and development of practical security solutions for complex IT environments. Experience with penetration testing and vulnerability assessments; certifications such as CEH (Certified Ethical Hacker) are More ❯
accounts and access. Implementation: Lead the deployment and configuration of PAM solutions, such as CyberArk, BeyondTrust, or other relevant technologies, ensuring they are properly integrated with existing IT infrastructure. RiskAssessment and Management: Conduct regular risk assessments related to privileged access, identifying potential security risks and vulnerabilities, and developing mitigation strategies. Governance and Compliance: Ensure that PAM More ❯
assets. Responsibilities include reviewing financial models and assumptions, covenanted deliverables (financial statements, ratios, operating reports, ESG reporting), and credit rating assessments. You will support waiver and consent processes, analyze risk profile changes, and prepare summaries for proposals. Flexibility across multiple workstreams such as portfolio reporting, ad hoc projects, and investor communications is essential. Candidate Profile Ideal candidates will have … years of experience with the following: Ability to interpret financial statements and cash flows Experience preparing financial analysis reports or memorandums Knowledge of debt characteristics and credit riskassessment in private debt markets Understanding of infrastructure assets is advantageous Strong communication skills, both written and verbal Experience with financial models Understanding of due diligence processes and verifying assumptions More ❯
background in cyber security to support our projects, including those in non-permissive environments. The successful candidate will also provide guidance on cyber, physical and human security, delivering comprehensive risk management strategies. We are particularly interested in individuals with experience working on UK or US government-funded projects and those with professional backgrounds in military, law enforcement, or intelligence. … to the unique needs of our global projects. Conduct regular vulnerability assessments and provide actionable recommendations to enhance digital security. Ensure secure communication protocols for teams operating in high-risk environments. Physical And Human Security Advise on physical security measures, including site risk assessments and travel safety protocols. Develop human security strategies to protect personnel and project participants … focusing on situational awareness and mitigation of threats. RiskAssessment And Crisis Management Conduct thorough risk assessments across physical, human, and cyber security domains. Develop crisis management plans and lead response efforts in the event of security incidents. Training And Capacity Building Deliver tailored training programs to staff and partners on best practices in cyber, physical, and More ❯