Main Responsibilities Security Implementation and Management Deploy and optimise security solutions to safeguard IT services and infrastructure. Lead security assessments including vulnerability testing and riskanalysis to identify and mitigate potential threats. Design and enforce security controls based on identified requirements and gaps in existing structures. Threat Detection … policies to maintain system security standards. Compliance and Audit Support Ensure adherence to compliance standards including ISO27001, NIST, and GDPR through regular audits and risk assessments. Support audit processes by providing necessary documentation and evidence of compliance. Security Awareness and Training Conduct regular training sessions to cultivate a security More ❯
road-maps Manage efforts across multiple sub-teams in the areas of: Systems Engineering, Flight Test Planning and Execution, and Pre/Post-Mission Analysis Manage the planning, coordination, scheduling, and execution of MACH-TB flight test events Coordinate closely with the MACH-TB program manager for the assignment … capture required flight test events, test objectives, evaluation criteria, key performance parameters, milestones, launch locations, test resources, and planned timelines) Manage program and mission riskanalysis and development of risk mitigation plans Identify and resolve program and stakeholder scheduling issues to meet test execution objectives Coordinate and More ❯
areas on relevant IQ/OQ/PQ protocol issues. Lead site wide activities aimed at maintaining Part 11 Compliance. Assess the need for risk mitigation techniques based on product classification, potential defect types, defect frequency, severity, patient risk, process capability, process controls, etc. Determine effectiveness of these … in good order all relevant sections of Device Design History File and DMR as directed. Develop and utilize DFMEA/PFMEA and other QA riskanalysis techniques to minimize potential risk during development/implementation activity. Work with Production and Technical Support to develop and implement appropriate … skills/knowledge/experience: Good technical understanding of manufacturing equipment and processes is required. In-depth knowledge and experience of product/process Risk Management (FDA and ISO standards). Technical training and experience using Statistics, Lean and Six Sigma Methodologies is required including Measurement System AnalysisMore ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
Tata Consultancy Services
areas on relevant IQ/OQ/PQ protocol issues. Lead site wide activities aimed at maintaining Part 11 Compliance. Assess the need for risk mitigation techniques based on product classification, potential defect types, defect frequency, severity, patient risk, process capability, process controls, etc. Determine effectiveness of these … in good order all relevant sections of Device Design History File and DMR as directed. Develop and utilize DFMEA/PFMEA and other QA riskanalysis techniques to minimize potential risk during development/implementation activity. Work with Production and Technical Support to develop and implement appropriate … skills/knowledge/experience: Good technical understanding of manufacturing equipment and processes is required. In-depth knowledge and experience of product/process Risk Management (FDA and ISO standards). Technical training and experience using Statistics, Lean and Six Sigma Methodologies is required including Measurement System AnalysisMore ❯
london (city of london), south east england, United Kingdom
Crone Corkill
based Security Analyst to the team. Collaborating closely with the Security team in the US, you'll be responsible for incident response, vulnerability management, riskanalysis and detection, with a particular focus on Europe and APAC. This is a brand new hire for a mid-level Analyst who … respond to incidents, breaches and suspicious activity Investigate incidents, discover root cause and implement measures to prevent them happening again Analyse, propose and implement risk, vulnerability and threat solutions Install Security measures and use Security software to protect the business' infrastructure, firewalls, systems and data encryption programmes Analyse and More ❯
delivery of facility requirements needed to deliver technology readiness projects including the facilities to support the end product verification and validation activities Undertaking technical riskanalysis and developing risk mitigation plans in support of equipment delivery into the SSNA platform Supporting the development and resilience planning for …/electrical machine design) e.g. MSc(Eng)/MPhil(Eng)/PhD/EngD Knowledge of permanent magnet rotating machines Knowledge of Power System Analysis of AC and DC systems and modelling of Generation and control: Generators, AVRs, Govenors/Speed controllers Knowledge of the interface requirements of power More ❯
operations. Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Contribute to the production and review of assurance artefacts, including security cases, risk … OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, riskanalysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems … stakeholder engagement skills, with the ability to liaise confidently across engineering, programme delivery, assurance, and regulatory audiences. Ability to produce high-quality documentation, including risk assessments, technical guidance, assurance artefacts, and audit-ready deliverables. Familiarity with UK cybersecurity regulations and sector guidance, including the NIS Regulations, CNI expectations, and More ❯
team. Description: An exciting opportunity has arisen for an Application Technology Auditor to join our growing team primarily focussed on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead, as an Auditor-in-Charge, and execute the audit delivery lifecycle as a team member on audit … controls (SoD, edit/check validation, calculations, etc.), and output controls (C&A). Demonstrates understanding of businesses, processes, including applications, through flowcharting, workpapers, analysis, issue identification and discussions with project leaders and auditees on projects of varying complexity. Has strong understanding of audit, businesses, financial controls, regulations, or … understand the underlying processes and procedures necessary to evaluate the risks and controls. Performs research independently and has adequate knowledge of statistical sampling and riskanalysis to perform research with technical accuracy. Engages in Continuous Monitoring activities. Uses knowledge of financial institutions and all applicable regulatory requirements. Demonstrates More ❯
investors, and traders, helping them navigate the complexities of energy transition and market volatility. With their expertise spanning asset valuation, portfolio optimisation, and market analysis, with a strong focus on LNG, flexible power generation, and energy storage. Our client has evolved rapidly since 2011 to become one of Europe … the company. Collaborate closely with our power and gas/LNG consulting teams, providing technical support to strengthen client delivery in investment value and riskanalysis projects. Drive innovation and resource efficiency, contributing to the continuous development of their consulting offering and analytical capabilities as the company grows. … RESTful API design UI/UX design for data tools (e.g., streamlining internal workflows and dashboards) Experience with energy systems modelling/optimisation, quantitative risk modelling, or stochastic simulation Experience working in consulting, trading, or investment analysis environments Strong communication and collaborative skills for cross-functional project delivery More ❯
investors, and traders, helping them navigate the complexities of energy transition and market volatility. With their expertise spanning asset valuation, portfolio optimisation, and market analysis, with a strong focus on LNG, flexible power generation, and energy storage. Our client has evolved rapidly since 2011 to become one of Europe … the company. Collaborate closely with our power and gas/LNG consulting teams, providing technical support to strengthen client delivery in investment value and riskanalysis projects. Drive innovation and resource efficiency, contributing to the continuous development of their consulting offering and analytical capabilities as the company grows. … RESTful API design UI/UX design for data tools (e.g., streamlining internal workflows and dashboards) Experience with energy systems modelling/optimisation, quantitative risk modelling, or stochastic simulation Experience working in consulting, trading, or investment analysis environments Strong communication and collaborative skills for cross-functional project delivery More ❯
to be solved and in turn business outcomes. GSK standards are adhered to with handling, processing, security & privacy of data, compliant with internal security, risk management policies and practices, external regulatory and statutory requirements e.g., GxP, Sarbanes Oxley and that Tech continuity plans are in place for all business … Government Pricing, Gross to Net, Trade/Channel or Master Data Management Experience with microservices architectures, application performance tuning and monitoring, conducting cost benefit, riskanalysis etc. Experience designing event driven systems leveraging message broker, event bus and streaming technologies like Azure Event Hub, Kafka, Confluent connectors, etc. More ❯
Hands-on experience with security monitoring and incident response technologies such as SIEM, IDS and EDR. Experience with vulnerability assessment including practical assessments for risk analysis. A strong working knowledge of at least one major operating system (Windows, Linux, or MacOS). An understanding of how identity, network, and More ❯
Warrington, Cheshire, United Kingdom Hybrid / WFH Options
Amentum
Promptly responding to all security incidents and providing thorough post-event analyses. And to a lesser extent: Conducting security assessments through vulnerability testing and risk analysis. Generate reports for both technical and non-technical staff and stakeholders. Undertake review of security controls and their configurations, recommending and implementing enhancements More ❯
Teams: Work closely with product owners, operations teams, and security engineers to document and uphold security artefacts in alignment with policies and best practises. RiskAnalysis and Mitigation: Assess risks associated with processes, software, and hardware artefacts, implementing robust security measures. Staying Ahead of Trends: Keep abreast of … audiences. Direction & Decision Making: Provide guidance to security product owners, defining the direction for security technology solutions. Key Technologies You'll Work With: Governance, Risk, and Compliance (GRC) Endpoint Protection (e.g., Sentinel One, Microsoft Defender) Identity Access Management (e.g., Ping, SailPoint) Network Security Solutions (e.g., Akamai, F5) Cloud Security More ❯
Teams: Work closely with product owners, operations teams, and security engineers to document and uphold security artefacts in alignment with policies and best practises. RiskAnalysis and Mitigation: Assess risks associated with processes, software, and hardware artefacts, implementing robust security measures. Staying Ahead of Trends: Keep abreast of … audiences. Direction & Decision Making: Provide guidance to security product owners, defining the direction for security technology solutions. Key Technologies You'll Work With: Governance, Risk, and Compliance (GRC) Endpoint Protection (e.g., Sentinel One, Microsoft Defender) Identity Access Management (e.g., Ping, SailPoint) Network Security Solutions (e.g., Akamai, F5) Cloud Security More ❯
Go, or Kotlin/Java Solid understanding of cloud and hybrid infrastructure security Experience securing both Windows and Linux environments Expertise in threat modeling, riskanalysis, and security tooling Excellent communication and leadership skills More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Newcastle University
Develop and implement financial management and reporting processes, including budgets and spend profiles. Contribute to strategic planning and performance indicators, supporting data management and risk analysis. Embed Equality, Diversity & Inclusion in all activities, including recruitment and cohort activities. Maintain contact with DLA students and PIs to ensure objectives are More ❯
safety-critical systems.Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms.Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards.Provide expertise on OT protocols, SCADA systems, field devices, and network architecture relevant to the … technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures.Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, riskanalysis, defence-in-depth, and zero-trust architectures.Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems within … including evidence preparation, control mapping, and client/regulator interaction.Understanding supply chain security considerations, including software and hardware assurance, secure procurement, and third-party risk management. Experience Experience in cybersecurity roles, focused on operational technology (OT), control systems, or industrial environments.Proven track record in delivering cybersecurity outcomes within complex More ❯
systems. Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Provide expertise on OT protocols, SCADA systems, field devices, and network architecture relevant to … OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, riskanalysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems … evidence preparation, control mapping, and client/regulator interaction. Understanding supply chain security considerations, including software and hardware assurance, secure procurement, and third-party risk management. Experience Experience in cybersecurity roles, focused on operational technology (OT), control systems, or industrial environments. Proven track record in delivering cybersecurity outcomes within More ❯
systems. Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Provide expertise on OT protocols, SCADA systems, field devices, and network architecture relevant to … OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, riskanalysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems … evidence preparation, control mapping, and client/regulator interaction. Understanding supply chain security considerations, including software and hardware assurance, secure procurement, and third-party risk management. Experience Experience in cybersecurity roles, focused on operational technology (OT), control systems, or industrial environments. Proven track record in delivering cybersecurity outcomes within More ❯
systems. Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Provide expertise on OT protocols, SCADA systems, field devices, and network architecture relevant to … OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, riskanalysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems … evidence preparation, control mapping, and client/regulator interaction. Understanding supply chain security considerations, including software and hardware assurance, secure procurement, and third-party risk management. Experience Experience in cybersecurity roles, focused on operational technology (OT), control systems, or industrial environments. Proven track record in delivering cybersecurity outcomes within More ❯
application for this opportunity. What you'll be doing: Working in security assurance you will be engaged in the business supplier lifecycle, undertaking business riskanalysis, assisting audit and assurance activities within BAE Systems and the Supply Chain Liaising with customers and partners across the business and stakeholder More ❯
Southampton, Hampshire, South East, United Kingdom Hybrid / WFH Options
CCR RECRUITMENT SERVICES LTD
with the company pricing policy and that they are not fulfilled without an appropriate variation on a purchase order from the customer. Complete full riskanalysis to manage any potential risks and avoid any delays Produce the necessary risk assessments and method statements to ensure that that More ❯
Develop and implement financial business strategies and plans. Oversee the preparation of financial reports and statements. Ensure compliance with financial regulations and standards. Conduct riskanalysis and financial forecasting. Participate in decision-making processes regarding company investments. The Successful Applicant A successful Commercial Finance Business Partner should have More ❯
best practices relating to IT/Operational Technology and adapting and tailoring where required to ensure a secure and compliant estate commensurate to the risk Advising and supporting engineers in the secure operation, ensuring that the business IT/Operational Technology estate is both protected and enabled to deliver … maintenance and updates are applied appropriately to ensure that the capability is safe and secure throughout the IT/Operational Technology lifecycle Undertaking ongoing riskanalysis and assurance accreditation roles specific to the domain Manage the application of appropriate security controls in line with best practices and security More ❯