risk assessment experience. Person Specification: Previous experience in the UK Financial Services or similar highly regulated industry. Knowledge/experience of PCI-DSS and dataprivacy regulations like GDPR. Understanding of best practices for large financial organizations. CISM, CISSP certification preferred. Apply Now more »
Southampton, Hampshire, South East, United Kingdom Hybrid / WFH Options
Recruitment Revolution
Team. Application notice... We take your privacy seriously. As you might expect you may be contacted by email, text or telephone. Your data is processed by our talent partner Recruitment Revolution on the basis of their legitimate interests in fulfilling the recruitment process. Please refer to their … DataPrivacy Policy & Notice on their website for further details. more »
teams to develop integration strategies and designs that aligns with the Enterprise Architecture and enables seamless communication between the clients systems of record and data sources. Develop an integration blueprint for the project that aligns to the Enterprise Integration strategy and roadmap to drive consistent, reusable patterns. Work with … other enterprise architects (e.g. business, data, security architects, etc.) to analyse enterprise business context (business strategy and trends) and requirements across the enterprise architecture viewpoints (such as business, information, and solution) to derive the future-state technology architecture. Takes full responsibility for ensuring that architectures balance functional and non … functional (e.g. integration mapping, security and dataprivacy, etc.) requirements across the client. Collaborates with business analysts and business owners to validate requirements. Establishes principles, standards, and strategy for integration services in line with the Enterprise strategy and ensures that they are applied correctly and consistently across more »
and implemented by a Sales focused Cloud Architect with an ability to secure UK eDV security clearance. With Machine Learning techniques, Encryption and Big Data tools, this firm have solved a critical privacy issue that will benefit National Security and Intelligence clients across the world and is … equally impactful for other sectors, allowing private access to Neural Networks and Data sets for knowledge growth. If you are interested in delivering impactful product presentations and able to highlight mission-critical benefits of a software product, you will be highly valued in this role. You'll need to … selling of B2B software Demonstrable experience working with Privacy technologies such as homomorphic encryption, SMPC, Federated Learning, TEE. Any prior experience with Data management or tooling hugely beneficia (Data Lakes, Snowflake or Databricks). Experience working closely with engineering teams (particularly those working on Machine Learning more »
the evolving world of cloud, digital and platforms. Role purpose/summary Design and develop API services that enable seamless integration with our party data model data platform. Implement robust and scalable API solutions that adhere to industry best practices and standards. Ensure the security, reliability, and performance … of the API services, including handling data validation, authentication, authorization, and error handling. Optimize API performance and scalability to meet the growing demands of our data platform. Key Skills/requirements Strong experience in designing and implementing API services for data platforms. Proficiency in popular API technologies … such as RESTful APIs, GraphQL, or gRPC. Solid understanding of data models and database concepts. Familiarity with data integration processes and tools. Strong programming skills in one or more languages commonly used for API development (e.g., Python, Java) Experience with API documentation tools and standards (e.g., OpenAPI/ more »
architect scalable, reliable, and cost-effective contact center solutions that meet business objectives and align with industry best practices. Define system architecture, integration points, data flows, and technical specifications for contact center components including IVR, ACD, CRM, workforce management, reporting, and analytics. Technology Evaluation and Selection: Evaluate and recommend … guidelines such as PCI DSS, GDPR, HIPAA, and SOC 2. Define security controls, encryption methods, access policies, and audit trails to protect sensitive customer data and ensure data privacy. Documentation and Knowledge Sharing: Document solution architecture, design decisions, configurations, and technical specifications. Provide guidance, training, and knowledge transfer more »