assess application-related risks Facilitate the risk evaluation process , including formatting, data collection, and impact assessments Perform control assessments to determine control effectiveness Use defined risk methodologies (eg FAIR, ISO31000) to rate risks and update internal risk registers Propose, document, and follow through on remediation plans and action items Monitor risk remediation efforts and ensure timely updates … experience in Risk Management and/or Information Security Proven experience conducting application-level security risk assessments Strong understanding of: Secure software and network architecture Risk management frameworks (eg ISO 3100X, NIST 800-30/37/39, ENISA, EBIOS, OCTAVE, FAIR) OWASP Top 10, encryption, data classification, and secure data flows Ability to read and interpret HLDs/… environments with cross-functional collaboration Strong attention to detail with advanced analytical and reporting capabilities Preferred Qualifications Industry certifications (eg CISSP, CISM, CRISC ) Experience working with Mitre ATT&CK, ISO 27001 , or similar InfoSec frameworks Exposure to enterprise-grade risk management tools and reporting platforms More ❯
City of London, London, United Kingdom Hybrid / WFH Options
WNTD
assess application-related risks Facilitate the risk evaluation process , including formatting, data collection, and impact assessments Perform control assessments to determine control effectiveness Use defined risk methodologies (eg FAIR, ISO31000) to rate risks and update internal risk registers Propose, document, and follow through on remediation plans and action items Monitor risk remediation efforts and ensure timely updates … experience in Risk Management and/or Information Security Proven experience conducting application-level security risk assessments Strong understanding of: Secure software and network architecture Risk management frameworks (eg ISO 3100X, NIST 800-30/37/39, ENISA, EBIOS, OCTAVE, FAIR) OWASP Top 10, encryption, data classification, and secure data flows Ability to read and interpret HLDs/… environments with cross-functional collaboration Strong attention to detail with advanced analytical and reporting capabilities Preferred Qualifications Industry certifications (eg CISSP, CISM, CRISC ) Experience working with Mitre ATT&CK, ISO 27001 , or similar InfoSec frameworks Exposure to enterprise-grade risk management tools and reporting platforms More ❯
easyJet operates as well as specific relevant regulations and standards such as NIS, GDPR, PCI DSS etc. • Knowledge of topic-specific framework & methodologies in areas such as Risk Management (ISO31000) IT management (e.g. COBIT) Information Security (NIST, ISF, ISO 27001), Service Delivery (e.g. ITIL) etc. What we can offer you Business Area Primary Location More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Pertemps
RMADS, Security Assurance Documents, Security Management Plans). Conduct penetration testing, vulnerability assessments, and remediation activities. The Person Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53). Experience with defence and government security standards (JSPs, Def Stan 05-138/139). More ❯
City Of Bristol, England, United Kingdom Hybrid / WFH Options
Matchtech
teams and senior management. Drive continuous improvement and knowledge sharing across teams. What We’re Looking For Technical Experience & Knowledge Experience with risk management frameworks and methodologies such as ISO/IEC 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53. Strong understanding of security standards and frameworks including OWASP, Secure by Design principles More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
design principles (e.g., threat modelling, secure-by-design). Perform security code reviews, provide guidance on secure libraries and frameworks. Standards & Compliance Ensure products meet regulatory and defence standards (ISO 27001/27005, NIST 800-30/53, JSP 440/604, Def Stan 05-series). Lead the creation and maintenance of security documentation (RMADS, Security Assurance Documents … evangelise best practices across teams. Qualifications & Experience Proven experience (5+ years) in product or application security within defence, government, or security-cleared environments. Deep knowledge of risk management frameworks (ISO 27001/2/5/31000, NIST 800-series) and Defence Standards (JSPs, Def Stan 05-138/139). Hands-on experience with security testing tools More ❯
and control testing platforms. Strong data analysis skills, including proficiency in Excel and visualization tools like Tableau or Power BI. Familiarity with risk management frameworks such as COSO, NIST, ISO31000, and control testing methodologies. Exceptional communication and interpersonal skills, capable of influencing stakeholders at all levels. Experience managing regulatory audits. Ability to collaborate with regional and global More ❯
400M+ downloads. 75M+ monthly users. A decade of building - and we're still accelerating. Flo is the world's health app on a mission to build a better future for female health. Backed by a $200M investment led by General More ❯
Westminster Abbey, England, United Kingdom Hybrid / WFH Options
Tetra Tech
aligned with the RIBA Plan of Work stages. Ability to engage with clients to establish clear security briefs and technology requirements. Understanding of the risk management process aligned to ISO 31000. Ability to manage and prioritise the workload of a project team including the delegation and quality assurance of tasks and deliverables. Experience of security philosophies and strategies such More ❯
aligned with the RIBA Plan of Work stages. Ability to engage with clients to establish clear security briefs and technology requirements. Understanding of the risk management process aligned to ISO 31000. Ability to manage and prioritise the workload of a project team including the delegation and quality assurance of tasks and deliverables. Experience of security philosophies and strategies such More ❯