research and make recommendations on products, services, protocols, and standards in support of all infrastructure procurement and development efforts Assist with the planning and deployment of infrastructure and cloud security measures Develop, implement, and maintain policies, procedures, and associated training plans for cloud administration Ensure services conform to the agreed compliance requirements set forth by current and planned accreditations … to continuously optimise systems and processes, using stakeholder feedback, taking account of technological improvements and new design patterns with cloud technologies Key Working Relationships Internal: Economists/Business Analysts Information Technology/Infrastructure Architects CIO/Head of IT Marketing & Business Development External: As Required Skills, Knowledge & Expertise Required: 6+ years of experience in IT Support and Operations Excellent … communication skills. You will have a natural ability to build rapport with stakeholders at all levels to influence decisions Proven experience in IT infrastructure, Cloud and Security systems planning and development following best practices and informationsecurity Significant experience with Microsoft Azure, Intune, PIM and storage accounts Experience in evaluation and decision making Working technical knowledge of More ❯
community, IOA has more than 1,300 associates located in over 60 offices in the U. S. and United Kingdom. In California, dba IOA Insurance Services. (#0E67768) For more information, visit www.ioausa.com. Job Description Position Title: Lead Data Engineer/Architect Department: Enterprise Systems Reports To : Director, Data Analytics Supervises : N/A Classification: Full Time, Permanent Job Summary … performance and data organization. Data Quality and Governance: Support the Director of Data and Analytics in ensuring data accuracy, integrity, and compliance with data regulations and best practices. Data Security: Work with the InformationSecurity Cloud Engineering Team to review and make modifications where needed to support robust data security measures and access controls. Team Leadership … and high-performing team. Essential Qualifications And Skills 3+ years’ experience in a lead data engineering or lead data architecture role Bachelor’s degree in computer science, statistics, informatics, information systems, or another quantitative field Advanced working SQL knowledge and experience working with relational databases, ETL pipelines ,architectures, and data sets Experience with scripting languages such as R and More ❯
The IT Security Operations Center's mission is to preserve the confidentiality, integrity, and availability of our assets by identifying operational and security risks and collaborating with business, functional, and customer stakeholders to develop plans that manage risk to acceptable levels. We are currently seeking a Sr. Cyber Incident Response Analyst to join our team. About the Role … Monitor for and investigate suspicious or malicious activity and alerts Review Change Management requests for security relevance and impact Daily review of system, application logs, and custom monitoring tools Malware and Advanced Persistent Threat (APT) analysis and remediation Incident Response and Investigations Availability for rotating on-call shifts (up to 2 - 3 times per year) About You Bachelor's … degree preferred or equivalent related field experience Professional Certifications preferred, including SANS GIAC or CISSP Microsoft, Linux, Networking or related certifications a plus. Experience in Information Technology Extensive experience in informationsecurity incident response and operations management Extensive experience of OS, application, and network security weaknesses, vulnerabilities, and remediation Experience researching, analyzing, and resolving complex problems More ❯
London, England, United Kingdom Hybrid / WFH Options
Coalfire
make a difference. Position Summary This is a great opportunity to grow your career and lead enterprise engagements as a Senior Consultant! In this position you will assess the security and compliance of client firms against regulatory and industry requirements and standards, and against security best practice frameworks. You will have a strong understanding of framework requirements, perform … timelines and deliverables. As a Senior Consultant, you will regularly interact with peers and clients as both an auditor and assessor, depending on the engagement. This role will audit information systems with confidence and accuracy to ensure the integrity and effectiveness of security measures. You will test technical controls, policies and procedures, laws, regulations, and industry best practices. … Travel 25-50%. Ability to be successful when working remotely. What You'll Bring Current PCI-QSA certification preferred (will consider former QSA). One of the following InformationSecurity certifications required: CISSP, CISM or ISO 27001 Lead Implementer. One of the following Audit certifications required: CISA, GSNA, CIA, IRCA ISMS Auditor or higher, or ISO More ❯
and evaluate control effectiveness, identify gaps, and recommend enhancements to strengthen risk posture and regulatory compliance Required qualifications, capabilities, and skills Experience or equivalent expertise in technology risk management, informationsecurity, or related field, emphasizing risk identification, assessment, and mitigation Familiarity with risk management frameworks, industry standards, and financial industry regulatory requirements Proficient knowledge and expertise in data … security, risk assessment & reporting, control evaluation, design, and governance, with a proven record of implementing effective risk mitigation strategies Knowledge of security controls, and vulnerability management in public cloud environments Knowledge of IT control policies related to the Public Cloud Strong interpersonal skills and a proven ability to work effectively with diverse teams to achieve common goals Demonstrated … and skills CISM, CRISC, CISSP, Cloud or similar industry-recognized risk and risk certifications are preferred Ability to prioritize and work in a global environment, partnering with global cloud-security product management teams to enhance cloud-security products Experience in managing and securing cloud environments, including AWS, Azure, or Google Cloud Platform Proven track record of implementing cloud More ❯
London, England, United Kingdom Hybrid / WFH Options
MUFG Americas
that empower you to own your career. Join MUFG, where being inspired is expected and making a meaningful impact is rewarded. OVERVIEW OF THE DEPARTMENT/SECTION IT Risk, Security & Control department covers cyber security strategy maintenance and tactical planning and operations to provide IT Security protection, governance, risk management and reporting. This includes promoting the global … InformationSecurity Standards and Procedures (ISSP) requirements and local security requirements. The department deploys, supports and monitors security solutions such as virus protection, vulnerability management, compliance monitoring and threat/incident management activities to reduce risk. NUMBER OF DIRECT REPORTS 1-2 MAIN PURPOSE OF THE ROLE To manage the technical delivery of various cybersecurity projects … high degree of difficulty. Experience in managing cybersecurity technology projects such as implementation of DLP, Cyber infrastructure replacement, Cloud monitoring tools etc. Demonstrable proficiency in a wide range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as Identity and Access Management, Threat Intelligence, Risk Evaluation, SecurityMore ❯
Staines-upon-Thames, Middlesex, England, United Kingdom
Bupa UK
Procurement, Commercial, Legal, Data Privacy, and the wider business. How you’ll help us make health happen: Execute the delivery of external assurance activities end to end including supplier informationsecurity due diligence reviews and evidence reviews as part of supplier onboarding and ongoing processes aligned to defined OLAs and operational expectations. Support Procurement teams as their informationsecurity subject matter expert for supplier assurance activities including presentations and calls with suppliers for clarification or review of materials. Report to Assurance Manager of BGIUK Technology External Assurance function including delivery, prioritisation of individual workload and quality review of the deliverables. Work with Procurement for supplier assurance requests to ensure documents required for due diligence are provided … training & awareness. Key Skills/Qualifications needed for this role: Experienced in IT external assurance, IT risk and control assessment, or related fields. Proven experience in carrying out IT security control assessments with skills in cyber and informationsecurity risks with ability to evaluate effectiveness of IT controls. Excellent communication and influencing skills to drive discussions with More ❯
changes are carefully evaluated, approved, and properly communicated to affected stakeholders. • Ensure that all incidents, changes, and requests are tracked and properly documented for reporting purposes. User Management and Security: Initially required to establish a working Security group for the business and subsequently to own the implementation and processes within ITSM. Oversee user account management processes for systems … like Microsoft O365, ensuring proper account provisioning, modification, and deactivation. Ensure that security protocols such as Zero Trust are enforced and that sensitive information is handled in accordance with company policies and compliance requirements. Facilitate regular reviews of access controls, permissions, and security posture. System Maintenance and Performance Optimisation: • Manage the scheduling and execution of preventive maintenance … management certification. A minimum of 5+ years of experience in IT support or service operations management. Good understanding of IT infrastructure, systems, and applications, as well as experience with security frameworks (e.g., Zero Trust). Strong understanding of cybersecurity principles (e.g., Cyber Essentials, CompTIA Security+). Ability to manage complex technical issues while maintaining a focus on customer service More ❯
and evaluate control effectiveness, identify gaps, and recommend enhancements to strengthen risk posture and regulatory compliance Required qualifications, capabilities, and skills Experience or equivalent expertise in technology risk management, informationsecurity, or related field, emphasizing risk identification, assessment, and mitigation Familiarity with risk management frameworks, industry standards, and financial industry regulatory requirements Proficient knowledge and expertise in data … security, risk assessment & reporting, control evaluation, design, and governance, with a proven record of implementing effective risk mitigation strategies Knowledge of security controls, and vulnerability management in public cloud environments Knowledge of IT control policies related to the Public Cloud Strong interpersonal skills and a proven ability to work effectively with diverse teams to achieve common goals Demonstrated … and skills CISM, CRISC, CISSP, Cloud or similar industry-recognized risk and risk certifications are preferred Ability to prioritize and work in a global environment, partnering with global cloud-security product management teams to enhance cloud-security products Experience in managing and securing cloud environments, including AWS, Azure, or Google Cloud Platform Proven track record of implementing cloud More ❯
London, England, United Kingdom Hybrid / WFH Options
Sportradar
or Munich WORK TYPE : Hybrid remote and onsite (3 days office, 2 days remote) Job Description : The Senior Incident Response Specialist will serve as a senior member of the Security Operations Center within the InformationSecurity team, leading incident response and proactive threat hunts. This position requires a hands-on, expert-level professional responsible for proactively detecting … improve SOC detection and response efficiency. Desired Experience : Applying the results of previous incidents and threat hunting activities to creating new detection use cases. Hands-on experience with AWS security services, such as GuardDuty, Security Hub, CloudTrail, and IAM configurations. Familiarity with securing web applications, including common vulnerabilities (e.g. OWASP Top 10) and mitigation techniques. Proficiency in scripting … languages like PowerShell and Python. Experience working within agile or continuous improvement environments. Desired Qualifications : Strong analytical skills, with the ability to handle high-pressure situations and manage complex security incidents from start to finish. Effective communication skills, with the ability to produce clear, concise documentation and interact effectively with both technical and non-technical stakeholders. Certifications in relevant More ❯
governance matters associated with complex contractual arrangements in the public sector and regulated industries. Work collaboratively with customer support and sales teams to scale and automate customer compliance and security requests, including by developing and maintaining up-to-date compliance documentation reflecting Cohere’s practices. Partner closely with informationsecurity to manage third-party audits and certification … attainment (e.g. SOC 2 Type 2, ISO 27001, HIPAA). Work collaboratively with Cohere’s informationsecurity, product, engineering, and AI risk management teams to design and implement robust and cross-functional regulatory compliance strategies. Advise and provide insights on emerging legal and regulatory trends to key teams, including the Public Sector and Government Affairs and Public Policy … identifying and mitigating legal risks. Proven ability and experience managing compliance programs. Proven ability and experience working effectively with business and technical teams, including go-to-market, customer support, informationsecurity, and product teams. Experience navigating corporate governance matters for global expansion and export control compliance will be considered an asset. Experience advising on and managing contracting and More ❯
execute innovative compliance testing programs • Manage deep-dive investigations into technology processes • Conduct regular risk assessments and provide recommendations • Prepare and present reports to senior leadership on IT and security risk posture and attack surface • Develop and implement innovative IT risk monitoring solutions • Partner with first and second line of defence stakeholders, including risk managers and security leads … to effectively address ICT and security risks • Leverage data analytics to revolutionize compliance assurance • Drive continuous improvement in our Assurance Program • Stay up to date with emerging threats, regulations and their impact on IT assurance BASIC QUALIFICATIONS - Experience in compliance, audit or risk management - Bachelor's degree or equivalent - Proven experience in developing and executing compliance or audit testing … frameworks - 7+ years of progressive experience within financial services in informationsecurity, cybersecurity, operational resilience and/or privacy risk - Analytical mindset with a talent for problem-solving - Excellence in stakeholder management and communication - Ability to thrive in a fast-paced, innovative environment PREFERRED QUALIFICATIONS - Master's degree or equivalent - Highly value payments systems experience - Second line risk More ❯
make a difference. Position Summary This is a great opportunity to grow your career and lead enterprise engagements as a Senior Consultant! In this position you will assess the security and compliance of client firms against regulatory and industry requirements and standards, and against security best practice frameworks. You will have a strong understanding of framework requirements, perform … timelines and deliverables. As a Senior Consultant, you will regularly interact with peers and clients as both an auditor and assessor, depending on the engagement. This role will audit information systems with confidence and accuracy to ensure the integrity and effectiveness of security measures. You will test technical controls, policies and procedures, laws, regulations, and industry best practices. … sales. Travel 25-50%. Ability to be successful when working remotely. What You'll Bring Current PCI-QSA certification preferred (will consider former QSA) One of the following InformationSecurity certifications required: CISSP, CISM or ISO 27001 Lead Implementer. One of the following Audit certifications required: CISA, GSNA, CIA, IRCA ISMS Auditor or higher, or ISO More ❯
execute innovative compliance testing programs. Manage deep-dive investigations into technology processes. Conduct regular risk assessments and provide recommendations. Prepare and present reports to senior leadership on IT and security risk posture and attack surface. Develop and implement innovative IT risk monitoring solutions. Partner with first and second line of defence stakeholders, including risk managers and security leads … to effectively address ICT and security risks. Leverage data analytics to revolutionize compliance assurance. Drive continuous improvement in our Assurance Program. Stay up to date with emerging threats, regulations and their impact on IT assurance. BASIC QUALIFICATIONS Experience in compliance, audit or risk management. Bachelor's degree or equivalent. Proven experience in developing and executing compliance or audit testing … frameworks. 7+ years of progressive experience within financial services in informationsecurity, cybersecurity, operational resilience and/or privacy risk. Analytical mindset with a talent for problem-solving. Excellence in stakeholder management and communication. Ability to thrive in a fast-paced, innovative environment. PREFERRED QUALIFICATIONS Master's degree or equivalent. Highly valued payments systems experience. Second line risk More ❯
the Insider Risk Investigator will lead and support efforts to enhance and expand Experian's global Insider Risk Management Program. This role is responsible for conducting thorough and objective security investigations involving data theft, espionage, misuse, sabotage, unintentional incidents, and workplace violence. The investigator must be detail-oriented, multi-task effectively, analyze and evaluate disparate data sets, and establish … Primary Responsibilities Analyze and interpret data from both technical and non-technical sources to detect, assess, and respond to insider risk and data loss incidents. Lead and conduct thorough security investigations by developing strategies, interviewing relevant parties, collaborating with cross-functional teams, and producing objective, well-documented case summaries. Create and maintain executive-level documentation, including standard operating procedures … refine, and maintain insider threat indicators and use case scenarios to enhance detection capabilities. Design and deliver insider risk awareness initiatives, highlighting emerging trends and fostering a culture of security, accountability, and vigilance. Identify and implement improvements to detection and response processes based on lessons learned and evolving threat landscapes. Collaborate with internal partners on threat detection and response More ❯
execute innovative compliance testing programs • Manage deep-dive investigations into technology processes • Conduct regular risk assessments and provide recommendations • Prepare and present reports to senior leadership on IT and security risk posture and attack surface • Develop and implement innovative IT risk monitoring solutions • Partner with first and second line of defence stakeholders, including risk managers and security leads … to effectively address ICT and security risks • Leverage data analytics to revolutionize compliance assurance • Drive continuous improvement in our Assurance Program • Stay up to date with emerging threats, regulations and their impact on IT assurance BASIC QUALIFICATIONS - Experience in compliance, audit or risk management - Bachelor's degree or equivalent - Proven experience in developing and executing compliance or audit testing … frameworks - 7+ years of progressive experience within financial services in informationsecurity, cybersecurity, operational resilience and/or privacy risk - Analytical mindset with a talent for problem-solving - Excellence in stakeholder management and communication - Ability to thrive in a fast-paced, innovative environment PREFERRED QUALIFICATIONS - Master's degree or equivalent - Highly value payments systems experience - Second line risk More ❯
to include RIB and ETAP as part of the software group. This involves leading the existing team, driving the IDAM transformation program, and aligning with business objectives to integrate security and compliance seamlessly into business processes. The role includes developing the IDAM strategy, delivering a step change in how IDAM is approached, owning IDAM platforms, governance, and processes, and … fostering collaboration across HR, IT, R&D, Procurement, and Security teams to safeguard the organization's digital assets while enabling secure and effective user experiences. Key Responsibilities Develop and implement IDAM strategies, solutions, and policies to safeguard sensitive data and ensure compliance with business objectives and internal policies. Lead the team in managing user access provisioning, de-provisioning, authentication … Act as a subject-matter expert on all IDAM disciplines, including identity lifecycle, governance, access management (SSO, MFA), and identity verification. Collaborate across HR, IT, R&D, Procurement, and Security teams to align security requirements and drive the adoption of IDAM systems within the business. Evaluate and implement emerging IDAM technologies to enhance security, user experience, and More ❯
execute innovative compliance testing programs Manage deep-dive investigations into technology processes Conduct regular risk assessments and provide recommendations Prepare and present reports to senior leadership on IT and security risk posture and attack surface Develop and implement innovative IT risk monitoring solutions Partner with first and second line of defence stakeholders, including risk managers and security leads … to effectively address ICT and security risks Leverage data analytics to revolutionize compliance assurance Drive continuous improvement in our Assurance Program Stay up to date with emerging threats, regulations and their impact on IT assurance BASIC QUALIFICATIONS Experience in compliance, audit or risk management Bachelor's degree or equivalent Proven experience in developing and executing compliance or audit testing … frameworks 7+ years of progressive experience within financial services in informationsecurity, cybersecurity, operational resilience and/or privacy risk Analytical mindset with a talent for problem-solving Excellence in stakeholder management and communication Ability to thrive in a fast-paced, innovative environment PREFERRED QUALIFICATIONS Master's degree or equivalent Highly valued payments systems experience Second line risk More ❯
will be beneficial Process Automation, BPM and Digital Platforms, e.g. Pega Cloud technology (knowledge of any or all of Azure, AWS and Google would be beneficial) Experience of handling informationsecurity and privacy challenges Interest and awareness in emerging technologies Experience of vendor packages. An appreciation of Artificial Intelligence and Machine Learning Academic And Prior Experience A university … as possible. Join us in building a better working world. Apply now. Who We Are Please note: Prior to finalizing your application, you will be asked to provide personal information across several dimensions of diversity and inclusiveness. The information you provide is kept entirely confidential and will not be used to evaluate your candidacy. We collect this data … to help us analyse our recruitment process holistically and implement actions that promote diversity and inclusiveness. While optional, we encourage you to provide this information to hold us accountable towards our goal of building a better working world. We ask because it matters! UKFSConsulting2024 Tech Seniority level Seniority level Mid-Senior level Employment type Employment type Full-time Job More ❯
Drive adoption of common standards for data access, tagging, and classification in alignment with regulatory compliance, risk, sovereignty and privacy obligations. Ensure solutions adhere to internal governance standards, including informationsecurity, data privacy, compliance, and change control procedures Design and manage cloud-based data platforms to support both transactional and analytical workloads, ensuring optimized performance for structured, unstructured … product backlog based on business value, risk, and technical feasibility, coordinating agile delivery activities including sprint planning and user acceptance testing. Work in close partnership with the wealth technology, informationsecurity, corporate technology, infrastructure teams and business management teams to ensure architectural alignment, shared services integration, and holistic platform delivery. Track progress against goals across owned workstreams and … associated development, CI/CD and release control frameworks. Experience supporting data science and analytics teams with curated datasets, feature engineering, and model deployment infrastructure. Knowledge of regulatory and security requirements around data in financial services, including GDPR, data retention, encryption, and access control. Excellent communication and collaboration skills with a strong ability to translate technical concepts into business More ❯
governance model for managing Technology risks. Risk Identification, Assessment and Mitigation Lead the 2LoD oversight of Technology risks including identifying, assessing and monitoring risks related to technology infrastructure, cyber security, data, AI and resilience. Oversee and challenge the Technology risk and control environment, including both their Principal and Risk and Control Self-Assessment (RCSA) processes. Conduct independent assurance reviews … analysis support risk-based decision-making. Report emerging technology risks within risk governance as part of integrated risk reporting. Provide subject matter expertise on emerging technology risks, including cloud security, AI, operational resilience, and data privacy. Risk Culture and Awareness Take a lead role in embedding a strong risk culture across Technology functions. Drive risk maturity within Technology functions … and sharing best practice in clear easy to understand language. Deliver training programmes on technology, cyber, and resilience risks. Strategic challenge of Aztec's technology, data, AI and cyber security strategies, and be able to articulate and assess the associated risks. Lead 2LoD oversight on Technology related transformation initiatives including attendance at project SteerCo's to provide independent challenge More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Aztec
governance model for managing Technology risks. Risk Identification, Assessment and Mitigation Lead the 2LoD oversight of Technology risks including identifying, assessing and monitoring risks related to technology infrastructure, cyber security, data, AI and resilience. Oversee and challenge the Technology risk and control environment, including both their Principal and Risk and Control Self-Assessment (RCSA) processes. Conduct independent assurance reviews … to support risk-based decision-making. Report emerging technology risks within risk governance as part of integrated risk reporting. Provide subject matter expertise on emerging technology risks, including cloud security, AI, operational resilience, and data privacy. Risk Culture and Awareness Take a lead role in embedding a strong risk culture across Technology functions. Drive risk maturity within Technology functions … and sharing best practices in clear easy to understand language. Deliver training programmes on technology, cyber, and resilience risks. Strategic challenge of Aztec's technology, data, AI and cyber security strategies, and be able to articulate and assess the associated risks. Lead 2LoD oversight on Technology related transformation initiatives including attendance at project SteerCo's to provide independent challenge More ❯
mechanisms, and control frameworks. Drive engagement and training sessions to enhance risk awareness and best practices. Key Requirements: Proven experience as a Senior Project Manager in Cyber Risk Management , InformationSecurity, or a related field. Strong understanding of cyber risk frameworks (e.g., NIST, ISO 27001, CIS, FAIR). Experience working with risk categorization and governance processes. Demonstrated ability More ❯
will be beneficial Process Automation, BPM and Digital Platforms, e.g. Pega Cloud technology (knowledge of any or all of Azure, AWS and Google would be beneficial) Experience of handling informationsecurity and privacy challenges Interest and awareness in emerging technologies Experience of vendor packages. An appreciation of Artificial Intelligence and Machine Learning Academic and prior experience A university … as possible. Join us in building a better working world. Apply now. Who we are Please note: Prior to finalizing your application, you will be asked to provide personal information across several dimensions of diversity and inclusiveness. The information you provide is kept entirely confidential and will not be used to evaluate your candidacy. We collect this data … to help us analyse our recruitment process holistically and implement actions that promote diversity and inclusiveness. While optional, we encourage you to provide this information to hold us accountable towards our goal of building a better working world. We ask because it matters! UKFSConsulting2024 Tech #J-18808-Ljbffr More ❯
London, England, United Kingdom Hybrid / WFH Options
Control Risks
powered advice on this job and more exclusive features. Thanks to continued growth we now have a brand new role for a Director to join our Digital Risks (Cyber Security) practice in London. We are seeking a senior leader to drive the growth of Digital Risks in the United Kingdom, with a primary focus on cyber assurance, third-party … and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor's or master's degree in informationsecurity, Computer Science, Engineering, or a related field. Relevant certifications such as CREST, OSCP, CISSP, CISM, CISA, ISO 27001 Lead Auditor, SANS, or other recognized credentials in cybersecurity More ❯