Winchester, Hampshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
make and action we take, guiding us to deliver impact how and where it matters most. Connect to your opportunity As a Technology Controls - Risk & Compliance Senior Consultant, you will be responsible for driving the day-to-day Technology Controls activities to effectively identify regulatory, legal, privacy and other … compliance risk exposures. This position plays a crucial role in ensuring quality, data protection and security matters related to our innovative audit products and solutions, environments, and frameworks, throughout the software development lifecycle (SDLC). This exciting and challenging role invites you to drive quality as part of the … SDLC process and ideate ways to creatively solve challenges around legal, risk, regulatory and privacy matters. This role will utilize established risk and control frameworks to ensure that development, hosting, deployment and other risk decisions around our audit products and solutions comply with existing firm policies, professional More ❯
Herndon, Virginia, United States Hybrid / WFH Options
VTG
you do? System Security Management: Oversee the implementation and management of system security measures in compliance with National Industrial Security Program Operating Manual (NISPOM), Risk Management Framework (RMF), Intelligence Community Directives (ICDs), and other applicable regulations. Maintain the security posture of classified systems by ensuring compliance with Assessment and Authorization (A&A) requirements. RiskAssessment and Mitigation: Conduct regular risk assessments, vulnerability scans, and security audits to identify and mitigate potential threats. Develop, implement, and manage security policies and procedures to address identified risks. Monitoring and Incident Response: Monitor system activity and respond to … to prevent recurrence. Documentation and Reporting: Prepare and maintain security documentation, including System Security Plans (SSPs), Plan of Action and Milestones (POA&M), and risk assessments. Submit reports on system security status to senior leadership and government security officials as required. Compliance and Training: Ensure all personnel accessing SCIF More ❯
services. Led by Amar Kuchinad, Copper's Global CEO, the firm provides a comprehensive suite of custody, trading and settlement solutions that reduce counterparty risk and bring greater capital and operational efficiency to digital asset markets. At the heart of Copper's offering is Multi-Party Computation (MPC) technology … on top of this state-of-the-art custody, ClearLoop is the first solution in the market that overcomes a growing industry challenge; counterparty risk with exchanges. This solution underpins a full prime services offering, connecting global exchanges, and enabling customers to trade and settle directly from the safety … adherence to SLA timelines. Dashboards: Maintain SharePoint Dashboards for tracking/approving Conflicts of Interest, Gifts & Entertainment, Outside Business Interests, Marketing and Financial Promotions. RiskAssessment: Conduct risk assessments and monitor compliance risks, implementing measures to mitigate potential issues. Training and Education: Coordinate and conduct compliance training More ❯
services. Led by Amar Kuchinad, Copper's Global CEO, the firm provides a comprehensive suite of custody, trading and settlement solutions that reduce counterparty risk and bring greater capital and operational efficiency to digital asset markets. At the heart of Copper's offering is Multi-Party Computation (MPC) technology … on top of this state-of-the-art custody, ClearLoop is the first solution in the market that overcomes a growing industry challenge; counterparty risk with exchanges. This solution underpins a full prime services offering, connecting global exchanges, and enabling customers to trade and settle directly from the safety … adherence to SLA timelines. Dashboards: Maintain SharePoint Dashboards for tracking/approving Conflicts of Interest, Gifts & Entertainment, Outside Business Interests, Marketing and Financial Promotions RiskAssessment: Conduct risk assessments and monitor compliance risks, implementing measures to mitigate potential issues. Training and Education: Coordinate and conduct compliance training More ❯
Norfolk, Virginia, United States Hybrid / WFH Options
Watershed Security, LLC
identified threats and vulnerabilities. Reviews and approves test and evaluation activities to validate those threats and vulnerabilities are mitigated. Performs system security reviews and Assessment and Authorization (A&A). Conducts A&A process for IT systems and networks in accordance with the DoD Risk Management Framework process. … with DoD 8500.2. Assists with development and tracking of the POA&M in eMASS. Supports RMF Checkpoint meetings. Assists with the System Categorization and RiskAssessment Report and consults on the SLCM Strategy. Develops the Security Plan, Security Assessment Plan, Security Assessment Report, and Executive Summaries. More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
OFWAT
analytical skills, with the ability to correlate and identify trends, patterns, and outliers within large security datasets and telemetry. Knowledge and awareness of information riskassessment and risk management. Why You Should Join Us: Meaningful Impact:You will be joining a team with a sense of mission More ❯
Amherst, Massachusetts, United States Hybrid / WFH Options
University of Massachusetts Amherst
technological challenges in our world. Job Summary The Senior Information Security Analyst is a strategic and senior-level analyst with a primary focus on riskassessment, security governance, and project-based security initiatives. This role is responsible for evaluating and mitigating security risks, leading compliance initiatives, and driving … of the University's mission. Essential Functions Collaborates with campus business units to manage information security risks and meet relevant compliance requirements, including conducting risk assessments, analyzing security threats, and advising on risk mitigation strategies aligned with institutional goals. Provides expert guidance and leadership on security-related projects. … updates to policies, standards, procedures, solutions and governance frameworks to address information security, compliance and privacy risks. Works with internal and external partners on risk management, information security and privacy related topics. Other Functions Performs other duties as assigned. Minimum Qualifications (Knowledge, Skills, Abilities, Education, Experience, Certifications, Licensure) Bachelor More ❯
Chicago, Illinois, United States Hybrid / WFH Options
LaSalle Network
systems comply with relevant regulations and security standards. Develop measures to protect data privacy and ensure the security of data pipelines and analytics infrastructure Riskassessment: Assist cybersecurity risk assessments and mitigation efforts, and participate in incident management and response planning activities Junior DevSecOps Engineer Requirements: Bachelor … field Relevant certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM) 4+ years' experience in information security and risk management In-depth knowledge of IT security frameworks and regulations such as ISO 27001, NIST, and GDPR Evaluate and manage the security risks associated More ❯
industry and business imperative focus including business-related IT and OT challenges and cybersecurity, business applications, systems, and business process integration solutions. Experience with riskassessment, especially cyber risk is preferred. The Team Business Value Consulting is a strategic, consultative team and is a critical member of More ❯
industry and business imperative focus including business-related IT and OT challenges and cybersecurity, business applications, systems, and business process integration solutions. Experience with riskassessment, especially cyber risk is preferred. The Team Business Value Consulting is a strategic, consultative team and is a critical member of More ❯
You will be joining a strong and mission driven team, working to build a customer facing product that fundamentally changes the way insurers evaluate risk, enabling them to move from highly manual workflows to digital risk flows. Cytora's Risk Stream is a serverless and cloud native … LLM), you will play a critical role in developing our core Large Language Model (LLM) service. Our LLM service underpins our Generative AI powered risk digitization platform, providing a unified interface for internal services to leverage the power of LLMs at scale, regardless of the underlying foundational model. You … will be responsible for building, deploying, and optimizing LLM-powered solutions that directly impact our customer's ability to understand and process risk in commercial insurance. What you will be doing Problem Solving & Collaboration: Engage deeply with domain experts and product managers to understand and define key business problems More ❯
Smyrna, Georgia, United States Hybrid / WFH Options
Crest Security Assurance
Vulnerability Management Analyst Provide support to increase the Cybersecurity Center's ability to manage the cybersecurity risk to systems, assets, data, and agency capabilities through active identification of system/application weaknesses that require remediation and/or mitigation, enabling DoD to focus and prioritize its risk and … Post Analysis/Process Improvement • Provide metrics tracking the following with regards to performance and mission success: mean time to patch; POA&M and Risk Acceptance staffing; and non-compliance trending. • Support the riskassessment process, Information Security Continuous Monitoring (ISCM) program and Agency overall risk management strategy by providing vulnerability scan information to the Risk Management Group, or relevant entity, in support of assessing and authorizing the environments; • Conduct testing of IS software patches, updates, upgrades, and hardware device configurations. Provide information system baseline scan reports. • Provide enterprise, discovery, and compliance Vulnerability Scan More ❯
information security issues for mergers & acquisitions activities related to PayPal, as directed. Governance and documentation of information security risks Localise the information security risks assessment process developed by the global information security team, and perform on-going riskassessment, reporting, and remediation in cooperation with regional or … global information security teams. Confirm, advise, and elaborate on Enterprise Risk Management assessments that touch on areas relevant to information security, business continuity, and continuity of operations. Verify that the controls in place to detect and prevent the emergence of IT security related risks are properly documented and monitored … Science, Technology Management, or other analytical degree); Master’s Degree or Ph.D. (or equivalent) preferred 15-20 years’ minimum experience in an IT security, risk management, or similar function. At least 5 years of this experience should involve executive-level communication and leading remote teams. Recent substantive interaction with More ❯
City of London, London, United Kingdom Hybrid / WFH Options
IPS Group
resilience framework that meets DORA standards and other recognised guidelines (e.g. ISO 22301, ISO 27001, NIST). Draft internal controls, policies, training content, and riskassessment methodologies. Contribute to core DORA workstreams such as ICT risk management, scenario-based testing, and oversight of third-party providers. Stakeholder … and support a smooth transition into standard business processes. Training & Culture Develop and deliver resilience-focused training across various teams. Promote best practices in risk and continuity planning. Embed a culture of awareness, accountability, and continuous improvement. What Were Looking For: A degree in Risk Management, Cyber Security … Solid understanding of UK and EU regulatory frameworks, with hands-on experience relating to DORA. Demonstrable experience conducting regulatory gap analyses, resilience testing, and risk assessments. Strong organisational skills and the ability to manage competing priorities in a deadline-driven environment. Excellent interpersonal and stakeholder management skills, particularly in More ❯
resilience framework that meets DORA standards and other recognised guidelines (e.g. ISO 22301, ISO 27001, NIST). Draft internal controls, policies, training content, and riskassessment methodologies. Contribute to core DORA workstreams such as ICT risk management, scenario-based testing, and oversight of third-party providers. Stakeholder … and support a smooth transition into standard business processes. Training & Culture Develop and deliver resilience-focused training across various teams. Promote best practices in risk and continuity planning. Embed a culture of awareness, accountability, and continuous improvement. What We’re Looking For: A degree in Risk Management, Cyber … Solid understanding of UK and EU regulatory frameworks, with hands-on experience relating to DORA. Demonstrable experience conducting regulatory gap analyses, resilience testing, and risk assessments. Strong organisational skills and the ability to manage competing priorities in a deadline-driven environment. Excellent interpersonal and stakeholder management skills, particularly in More ❯
london, south east england, united kingdom Hybrid / WFH Options
IPS Group
resilience framework that meets DORA standards and other recognised guidelines (e.g. ISO 22301, ISO 27001, NIST). Draft internal controls, policies, training content, and riskassessment methodologies. Contribute to core DORA workstreams such as ICT risk management, scenario-based testing, and oversight of third-party providers. Stakeholder … and support a smooth transition into standard business processes. Training & Culture Develop and deliver resilience-focused training across various teams. Promote best practices in risk and continuity planning. Embed a culture of awareness, accountability, and continuous improvement. What We’re Looking For: A degree in Risk Management, Cyber … Solid understanding of UK and EU regulatory frameworks, with hands-on experience relating to DORA. Demonstrable experience conducting regulatory gap analyses, resilience testing, and risk assessments. Strong organisational skills and the ability to manage competing priorities in a deadline-driven environment. Excellent interpersonal and stakeholder management skills, particularly in More ❯
Dundee, Scotland, United Kingdom Hybrid / WFH Options
Net Talent
technologies. Key Responsibilities: Physical Security Protection: Design and implement measures to safeguard OT assets. Fraud Prevention: Develop strategies and technologies aimed at preventing fraud. RiskAssessment: Perform comprehensive risk assessments and vulnerability analyses for OT systems. Regulatory Compliance: Ensure all security initiatives align with industry standards and More ❯
dundee, north east scotland, united kingdom Hybrid / WFH Options
Net Talent
technologies. Key Responsibilities: Physical Security Protection: Design and implement measures to safeguard OT assets. Fraud Prevention: Develop strategies and technologies aimed at preventing fraud. RiskAssessment: Perform comprehensive risk assessments and vulnerability analyses for OT systems. Regulatory Compliance: Ensure all security initiatives align with industry standards and More ❯
include to: Implementing solutions to challenges and problems Develop and improve infrastructure plans, services, policies, procedures and processes Identify and take action to mitigate risk, ensuring effective controls are in place Driving redress to increase the effectiveness of our services; identify and implement continuous improvement Contribute to the design … individual job expectations through effective coaching, performance management and monitoring Ensure that you and your team fully understand and comply with the organisation’s Risk Management Policies as they relate to your area of responsibility and demonstrate in your day to day work that you put customers at the … Line manage and coach all direct reports, including all aspects of performance management, development, conduct, sickness management, appraisals, employee administration and recruitment As nominated Risk Champion for your function, work alongside the Risk function in developing and maintaining a risk management agenda, acting both to ensure the More ❯
Salford, Manchester, United Kingdom Hybrid / WFH Options
Inspire People
engagement for all projects ensuring that the department's security design standards are adhered to. This challenging role incorporates aspects of security architecture, cyber risk management and cyber security policy. As a Principal Security Architect, you will also provide an 'out-reach' to advise on security requirements and solutions … for exploiting emerging technologies and support the development of architectures, patterns and approaches to support their safe use in accordance with the department's risk appetites. At all times your goal is to help ensure delivery of systems that meet the desired business outcomes with security decisions and controls … being proportionate to the risk appetite. You will build effective partnerships with diverse teams across multiple locations and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (National Cyber Security More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Inspire People
engagement for all projects ensuring that the department's security design standards are adhered to. This challenging role incorporates aspects of security architecture, cyber risk management and cyber security policy. As a Principal Security Architect, you will also provide an 'out-reach' to advise on security requirements and solutions … for exploiting emerging technologies and support the development of architectures, patterns and approaches to support their safe use in accordance with the department's risk appetites. At all times your goal is to help ensure delivery of systems that meet the desired business outcomes with security decisions and controls … being proportionate to the risk appetite. You will build effective partnerships with diverse teams across multiple locations and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (National Cyber Security More ❯
Antrim, County Antrim, United Kingdom Hybrid / WFH Options
Inspire People
engagement for all projects ensuring that the department's security design standards are adhered to. This challenging role incorporates aspects of security architecture, cyber risk management and cyber security policy. As a Principal Security Architect, you will also provide an 'out-reach' to advise on security requirements and solutions … for exploiting emerging technologies and support the development of architectures, patterns and approaches to support their safe use in accordance with the department's risk appetites. At all times your goal is to help ensure delivery of systems that meet the desired business outcomes with security decisions and controls … being proportionate to the risk appetite. You will build effective partnerships with diverse teams across multiple locations and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (National Cyber Security More ❯
Darlington, County Durham, United Kingdom Hybrid / WFH Options
Inspire People
engagement for all projects ensuring that the department's security design standards are adhered to. This challenging role incorporates aspects of security architecture, cyber risk management and cyber security policy. As a Principal Security Architect, you will also provide an 'out-reach' to advise on security requirements and solutions … for exploiting emerging technologies and support the development of architectures, patterns and approaches to support their safe use in accordance with the department's risk appetites. At all times your goal is to help ensure delivery of systems that meet the desired business outcomes with security decisions and controls … being proportionate to the risk appetite. You will build effective partnerships with diverse teams across multiple locations and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (National Cyber Security More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Inspire People
engagement for all projects ensuring that the department's security design standards are adhered to. This challenging role incorporates aspects of security architecture, cyber risk management and cyber security policy. As a Principal Security Architect, you will also provide an 'out-reach' to advise on security requirements and solutions … for exploiting emerging technologies and support the development of architectures, patterns and approaches to support their safe use in accordance with the department's risk appetites. At all times your goal is to help ensure delivery of systems that meet the desired business outcomes with security decisions and controls … being proportionate to the risk appetite. You will build effective partnerships with diverse teams across multiple locations and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (National Cyber Security More ❯
Belfast, County Antrim, Northern Ireland, United Kingdom Hybrid / WFH Options
Inspire People
engagement for all projects ensuring that the department's security design standards are adhered to. This challenging role incorporates aspects of security architecture, cyber risk management and cyber security policy. As a Principal Security Architect, you will also provide an 'out-reach' to advise on security requirements and solutions … for exploiting emerging technologies and support the development of architectures, patterns and approaches to support their safe use in accordance with the department's risk appetites. At all times your goal is to help ensure delivery of systems that meet the desired business outcomes with security decisions and controls … being proportionate to the risk appetite. You will build effective partnerships with diverse teams across multiple locations and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (National Cyber Security More ❯