Harness your expertise to shape robust cybersecurity strategies and safeguard critical assets. Your leadership will be pivotal in enhancing our resilience against evolving global cyber threats. As a Cybersecurity Risk Intelligence Vice President in our Cybersecurity Risk Intelligence and Advisory team, you will play a critical in safeguarding the firms digital assets and infrastructure and enhancing our resilience … and mitigating risks, you will inform and influence control measures across the organization. Your expertise in synthesizing large volumes of data will enable you to produce clear and concise risk narratives tailored for diverse audiences, translating complex technology messages into actionable business insights. Your work will significantly impact the firm's operations, fiscal management, public image, employee morale, and … client relationships. Job Responsibilities: Analyze and synthesize large volumes of data to identify key cybersecurity risks, trends, and potential technology failures. Develop clear, concise risk narratives that effectively communicate complex issues and risks, including technology failures, to both technical and non-technical audiences tailoring publications to meet the needs of different audiences. Translate technical cybersecurity messages and technology failure More ❯
Harness your expertise to shape robust cybersecurity strategies and safeguard critical assets. Your leadership will be pivotal in enhancing our resilience against evolving global cyber threats. As a Cybersecurity Risk Intelligence Vice President in our Cybersecurity Risk Intelligence and Advisory team, you will play a critical role in safeguarding the firm's digital assets and infrastructure and enhancing … and mitigating risks, you will inform and influence control measures across the organization. Your expertise in synthesizing large volumes of data will enable you to produce clear and concise risk narratives tailored for diverse audiences, translating complex technology messages into actionable business insights. Your work will significantly impact the firm's operations, fiscal management, public image, employee morale, and … client relationships. Job Responsibilities: Analyze and synthesize large volumes of data to identify key cybersecurity risks, trends, and potential technology failures. Develop clear, concise risk narratives that effectively communicate complex issues and risks, including technology failures, to both technical and non-technical audiences, tailoring publications to meet the needs of different audiences. Translate technical cybersecurity messages and technology failure More ❯
ago Be among the first 25 applicants Get AI-powered advice on this job and more exclusive features. Direct message the job poster from Morgan McKinley Associate Director- Credit, Risk and Quant Finance at Morgan McKinley The Risk IT division manages and mitigates risks within financial markets, focusing on Market Risk, Credit Risk, and Market Data. … Market Risk involves assessing and managing risks due to adverse price movements. Credit Risk focuses on evaluating and mitigating risks from borrower defaults. Market Data ensures the accuracy and timeliness of data for riskanalysis and decision-making. Job Purpose: The Head of Credit Risk IT leads the development, implementation, and management of technology solutions … for credit risk management. This role oversees credit risk models, ensures data integrity, and provides strategic direction to enhance credit risk processes. Collaboration with cross-functional teams, compliance with regulations, and driving innovation are key aspects of this role. Key Responsibilities: Strategic Leadership: o Develop and execute the Credit Risk IT technology strategy. o Provide visionary More ❯
Potters Bar, Hertfordshire, South East, United Kingdom
Canada Life Group (UK) Ltd (The)
providing our customers with expertise on financial and tax planning, offering home finance and annuities propositions, and providing collective fund solutions to third party customers. Job Profile The IT Risk & Controls Analyst plays a key part in providing assurance and insight to the management of technology risks, controls and any related governance activities. The role collaborates closely with Engineering … teams to ensure that all technology risks are managed effectively and in compliance with standards, providing 1st line risk management expertise. The role also plays a key part in planning and facilitating annual audits (which have an impact on financial reporting), leading activities from a UK IT perspective and working with all parties providing strategic guidance, technical knowledge, quality … Access Management (IAM) team to assist in the improvement and operation of the joiners, movers, leavers (JML) process, ensuring it is followed appropriately within the company. Provide 1st line risk management knowledge, guidance and support to all IT teams, acting as an SME in that field, helping teams manage technology risk. Collecting and analysing data on control effectiveness and More ❯
Emersons Green, Bristol, Avon, England, United Kingdom
Gregory Martin International Limited
global, defence, energy, space, maritime, and intelligence & communications programmes. As a Cost Consultant you will be delivering technical consulting projects within the defence sector. You will be providing detailed analysis of data and costs to assist your client’s industry make better decisions. This may be working in customer teams to support procurement decisions with analytical thinking and outcomes … modelling of operational performance and sustainment, or historical analysis to support learning lessons from previous operations. Responsibilities for Senior Cost Engineer Consultant will include: Provide detailed analysis to support key decisions within the project teams. Identifying and bidding for and winning future work within your client’s industry. Building new relationships and maintaining the relationships with current customers. … Using and developing problem structuring methods and a variety of tools and techniques, including novel approaches where required. Working organically in customer teams to deliver rapid turn-around analysis or using one of the company’s offices as a team hub from which to plan and deliver tasks. Essential Requirements re role of Senior Cost Consultant/Cost Engineer More ❯
global, defence, energy, space, maritime, and intelligence & communications programmes. As a Cost Consultant you will be delivering technical consulting projects within the defence sector. You will be providing detailed analysis of data and costs to assist your client’s industry make better decisions. This may be working in customer teams to support procurement decisions with analytical thinking and outcomes … modelling of operational performance and sustainment, or historical analysis to support learning lessons from previous operations. Responsibilities for Senior/Principal Cost Engineer Consultant will include: Provide detailed analysis to support key decisions within the project teams. Identifying and bidding for and winning future work within your client’s industry. Building new relationships and maintaining the relationships with … customers. Using and developing problem structuring methods and a variety of tools and techniques, including novel approaches where required. Working organically in customer teams to deliver rapid turn-around analysis or using one of the company’s offices as a team hub from which to plan and deliver tasks. Essential Requirements re role of Senior Consultant: Proven experience in More ❯
London, England, United Kingdom Hybrid / WFH Options
HM Revenue & Customs
and experience — talk with your recruiter to learn more. Base pay range Hybrid working from Stratford or Croydon Office. About You As a Senior Data Analyst in HMRC’s Risk and Intelligence Service (RIS), you will play a pivotal role in the UK government’s digital transformation journey. You will harness advanced analytical techniques and emerging technologies to help … shape HMRC’s strategic approach to risk and compliance, ensuring the right tax is paid and safeguarding public funds. You’ll be part of the Government Digital and Data community, a collective of over 28,000 professionals transforming lives through technology. Your work will have real-world impact, enabling data-driven decisions that support citizens and contribute to a … fairer and more efficient tax system. We are looking for someone with a passion for analysis, an understanding of data’s potential, and the leadership to deliver in a fast-paced, collaborative environment. This is your opportunity to join a forward-thinking, expert community and make a lasting difference. About the role HMRC's Risk and Intelligence Service More ❯
Strategic Resources European Recruitment Consultants Ltd
deliberate attacks. Threat Origins: Threats can originate from the internet, corporate networks, maintenance activities, software upgrades, and unauthorized access, potentially leading to major health, safety, or environmental incidents. Business Risk: Disruption to business, with cybersecurity as a potential cause, is identified as one of the top two risks for the client. MAIN ACTIVITIES: Implement Critical Requirements: Ensure compliance with … resolve cybersecurity incidents, anomalies, and threats promptly. Cyber Security Road Map: Assist in delivering key activities and act as a delegate for the Lead Cyber Security Engineer during absences. RiskAnalysis: Participate in asset cyber riskanalysis and develop procedures and documentation for cybersecurity management. Compliance: Ensure stakeholders comply with client cybersecurity requirements and carry out More ❯
resolve cybersecurity incidents, anomalies, and threats promptly. Cyber Security Road Map: Assist in delivering key activities and act as a delegate for the Lead Cyber Security Engineer during absences. RiskAnalysis: Participate in asset cyber riskanalysis and develop procedures and documentation for cybersecurity management. Compliance: Ensure stakeholders comply with company cybersecurity requirements and carry out More ❯
National Association of Mutual Insurance Companies
through a worldwide client-focused team. ÂDescription: An exciting opportunity has arisen for an Application Technology Auditor to join our growing team primarily focussed on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead, as an Auditor-in-Charge, and execute the audit delivery lifecycle as a team member on audit assignments in accordance with Internal … FTP, NDM, MQ, etc.), application controls (SoD, edit/check validation, calculations, etc.), and output controls (C&A). Demonstrates understanding of businesses, processes, including applications, through flowcharting, workpapers, analysis, issue identification and discussions with project leaders and auditees on projects of varying complexity. Has strong understanding of audit, businesses, financial controls, regulations, or technology and actively seeks to … and colleagues in Audit to understand the underlying processes and procedures necessary to evaluate the risks and controls. Performs research independently and has adequate knowledge of statistical sampling and riskanalysis to perform research with technical accuracy. Engages in Continuous Monitoring activities. Uses knowledge of financial institutions and all applicable regulatory requirements. Demonstrates skills through advanced analysisMore ❯
through a worldwide client-focused team. Description: An exciting opportunity has arisen for an Application Technology Auditor to join our growing team primarily focussed on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead, as an Auditor-in-Charge, and execute the audit delivery lifecycle as a team member on audit assignments in accordance with Internal … FTP, NDM, MQ, etc.), application controls (SoD, edit/check validation, calculations, etc.), and output controls (C&A). Demonstrates understanding of businesses, processes, including applications, through flowcharting, workpapers, analysis, issue identification and discussions with project leaders and auditees on projects of varying complexity. Has strong understanding of audit, businesses, financial controls, regulations, or technology and actively seeks to … and colleagues in Audit to understand the underlying processes and procedures necessary to evaluate the risks and controls. Performs research independently and has adequate knowledge of statistical sampling and riskanalysis to perform research with technical accuracy. Engages in Continuous Monitoring activities. Uses knowledge of financial institutions and all applicable regulatory requirements. Demonstrates skills through advanced analysisMore ❯
through a worldwide client-focused team. Description: An exciting opportunity has arisen for an Application Technology Auditor to join our growing team primarily focussed on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead, as an Auditor-in-Charge, and execute the audit delivery lifecycle as a team member on audit assignments in accordance with Internal … FTP, NDM, MQ, etc.), application controls (SoD, edit/check validation, calculations, etc.), and output controls (C&A). Demonstrates understanding of businesses, processes, including applications, through flowcharting, workpapers, analysis, issue identification and discussions with project leaders and auditees on projects of varying complexity. Has strong understanding of audit, businesses, financial controls, regulations, or technology and actively seeks to … and colleagues in Audit to understand the underlying processes and procedures necessary to evaluate the risks and controls. Performs research independently and has adequate knowledge of statistical sampling and riskanalysis to perform research with technical accuracy. Engages in Continuous Monitoring activities. Uses knowledge of financial institutions and all applicable regulatory requirements. Demonstrates skills through advanced analysisMore ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities via static/dynamic analysis, manual review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime … Proven experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies such as STRIDE and risk analysis. Experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant certifications such More ❯
threat modeling, secure coding, design reviews, and architecture assessments. Lead the integration of DevSecOps practices into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual review, and testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. … Requirements: Proven experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies like STRIDE and risk analysis. Hands-on experience with SAST/DAST/IAST tools such as Snyk, SonarQube, Burp Suite, Veracode, etc. Strong understanding of cloud platforms and modern architectures. Relevant certifications More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and … experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime … experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST, DAST, IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant certifications such More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant More ❯
including threat modeling, secure coding, design reviews, and architecture assessments. Lead DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and … experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies like STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime … Proven experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies like STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. More ❯