Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard's environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … it made me realize how much I enjoyed the challenge of solving complex problems related to cybersecurity. The decision to pursue a PG diploma in IT Infrastructure and System Security at CDAC ACTS Pune was another significant moment in my journey. I wanted to specialize in an area that I found both challenging and rewarding. This program was intense … Qualys, an Enterprise Cyber Risk & Security Platform . It was a significant achievement for me, especially since it's rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the Vulnerability Management team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is More ❯
m currently supporting a forward-thinking organisation that's undergoing a major digital and tech transformation. They're looking for a Security Operations Analyst to join their growing InfoSec team and play a key role in protecting systems, data, and people from the latest cyber threats. This is a fantastic opportunity for someone passionate about cybersecurity to gain real … Scripting and automation Strong foundational IT and networking knowledge Familiarity with patching solutions and email security tools A proactive mindset and good communication skills A genuine passion for InfoSec and making a difference Details: Salary: up to £40,000 Up to 10% bonus Strong pension Location: Leeds - 2x a month in the office If this sounds of interest email More ❯
Ready to utilise your skills and experience in Azure Cloud, Data, and Security best practices? Are you passionate about designing, implementing, and managing data loss prevention strategies and technologies? Join our clients team as a Senior DLP Architect and make an impact that matters. You will be working with some of their clietns that include some of the biggest … support business change processes. Provide end-user support for DLP policies and procedures. Contribute to the development and enhancement of DLP processes. Configure and deploy Zscaler components, including web security, DLP, cloud application security, and SSL inspection. Establish and maintain a robust CI/CD pipeline for deploying Zscaler updates and configurations. Configure role-based access control using … role privileges for admins. Skills/Must have: Expertise in the implementation and configuration of DLP technologies, particularly Microsoft Purview and Zscaler. Experience with Zscaler components such as web security, DLP, cloud application security, and SSL inspection. Good understanding of informationsecurity fundamentals. Excellent communication and interpersonal skills. Azure security certification is a plus. Benefits More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Capital One (Europe) plc
technology risk. Cybersecurity Risk professionals at Capital One are trusted expert advisers who shape decisions, challenge activities to ensure they meet our standards, and generally oversee technology, cybersecurity, and informationsecurity risk across the business and the central technology organisation. Cybersecurity is a strategic priority at Capital One, with heavy engagement from the Board, the Chief Executive Officer … strategic decision-making for Cyber and Technology leadership Take the lead in evaluating and recommending standardized risk sloping & scoring methods across Tech and Cyber domains, including Vulnerability Management, Data Security, and Network Security across the enterprise Serve as a point of contact for ISO Assurance Team service offerings and assist with onboarding junior team members. Standardize the review … risk reduction activities in order to allow teams to focus on the areas of the greatest impact Work cross-functionally with Advisory, Assessment, and Risk Operations functions within the InformationSecurity Office to measure cybersecurity and technology risk Act as a key contributor to the InformationSecurity Office leadership team on senior leader initiatives, providing insights More ❯
while managing multiple projects. A natural self-starter - analyzing complex issues, identifying opportunities, and developing actionable plans. • Familiarity with Open Banking practices, regulations, and standards is strongly preferred. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
London, England, United Kingdom Hybrid / WFH Options
itecopeople
Governance, Risk and Compliance Manager. (GRC Manager) About the Role: The GRC Manager is a senior role within the InformationSecurity team, responsible for maintaining and improving governance and risk frameworks for IT Services. You will define risk and governance processes, including how process owners are identified and the activities to ensure that the process is governed effectively … to ensure that IT systems and information assets are adequately protected. You will be responsible for identifying, evaluating and reporting on governance and compliance risks and issues in a manner that meets the clients regulatory and legal requirements. The GRC Manager works proactively with the various departments, business units and suppliers to implement practices that meet the clients defined … policies and standards for information risk management, governance and compliance. About You: You will have a significant level of specialist expertise in IT Governance, Risk and Compliance, with proven responsibility for, and experience of, executing a robust risk and governance process and frameworks in a complex environment. You will be successful at delivering high quality, robust, resilient, responsive and More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
INTEC SELECT LIMITED
global and UK strategies, and recognize system limitations Hybrid Work Environment: This role offers a blend of working from their London HQ and remote locations Essential Skills and Experience: InformationSecurity: Strong understanding of security best practices in all aspects of informationsecurity, with attention to detail and a commitment to thorough documentation. Cloud Hosting More ❯
strengths, views, and experiences. We believe that our differences enable us to be a better team - one that makes better decisions, drives innovation, and delivers better business results Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: • Abide by Mastercard's security policies and practices; • Ensure the confidentiality and integrity of the information being accessed; • Report any suspected informationsecurity violation or breach, and • Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
thrive in fast-paced environments, enjoy solving complex user experience & design challenges, and want to help shape the future of Open Finance, we want to hear from you! Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
no one dies from skin cancer. London based - Hybrid (3 days a week in the office) The role The Quality Systems Manager ensures the effectiveness of our quality and informationsecurity systems, supporting compliance with global medical device regulations. They lead audit preparation, certification efforts, and continuous system improvements. This role also supports the integration of AI-specific … forefront of a cutting-edge AI product that's revolutionising medical diagnostics and transforming patient care. Key Responsibilities Oversee and develop our medical device Quality Management System (QMS) and InformationSecurity Management System (ISMS), ensuring compliance with ISO 13485, MDSAP, US FDA QSR, EU MDR and ISO 27001. Implement and secure certification for an Artificial Intelligence Management System … will be. Skin Analytics manufactures medical devices and complies with ISO standards 13485 and 27001. As part of your employment, you will be assigned Quality Management System (QMS) and InformationSecurity Management System (ISMS). We require that our employees agree to complete their assigned training and diligently follow all company quality management and informationsecurityMore ❯
ability to work with and influence cross-functional teams without formal authority • Bachelor's degree in finance, business management, economics, or related field. Master's degree a plus Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
Security Risk Analyst - Artificial Intelligence (AI) - Machine Learning (ML) Our client, a global insurance organisation, is looking to recruit the services of an experienced Senior Risk Analyst with deep expertise in Artificial Intelligence (AI), Machine Learning (ML), and Large Language Models (LLMs) to join our client's Security Risk Management team. This role plays a pivotal part in … Collaborate with stakeholders across IT, Data Privacy, Innovation, and Business to identify and mitigate risks. Translate complex technical risks into business-friendly language for executive audiences. Improve and evolve security risk assessment methodologies for advanced AI systems. Develop threat models and propose compensatory controls. Present findings to internal governance groups and help shape AI risk frameworks. Required Skills & Experience … communication skills, up to C-level. Strong analytical and reporting abilities. Familiarity with risk management frameworks (ISO 3100X, NIST 800 series, ENISA, EBIOS, OCTAVE, FAIR). Preferred: Background in informationsecurity and security frameworks (eg, MITRE ATT&CK, ISO 2700X). Experience working in multinational environments. Knowledge of AI governance or ethics is a plus. Please apply More ❯
business and E.ON Digital Technology controlling functions, and supporting the MTP process of the Energy Markets (Digital Technology) function Acting as single point of contact for group wide architecture, informationsecurity and technology initiatives (e.g. CERT, EAM) Enabling the informationsecurity and data protection processes in E.ON Energy Markets Profile: Academic degree in Information Technology More ❯
business and E.ON Digital Technology controlling functions, and supporting the MTP process of the Energy Markets (Digital Technology) function Acting as single point of contact for group wide architecture, informationsecurity and technology initiatives (e.g. CERT, EAM) Enabling the informationsecurity and data protection processes in E.ON Energy Markets Profile: Academic degree in Information Technology More ❯
business and E.ON Digital Technology controlling functions, and supporting the MTP process of the Energy Markets (Digital Technology) function Acting as single point of contact for group wide architecture, informationsecurity and technology initiatives (e.g. CERT, EAM) Enabling the informationsecurity and data protection processes in E.ON Energy Markets Profile: Academic degree in Information Technology More ❯
business and E.ON Digital Technology controlling functions, and supporting the MTP process of the Energy Markets (Digital Technology) function Acting as single point of contact for group wide architecture, informationsecurity and technology initiatives (e.g. CERT, EAM) Enabling the informationsecurity and data protection processes in E.ON Energy Markets Profile: Academic degree in Information Technology More ❯
business and E.ON Digital Technology controlling functions, and supporting the MTP process of the Energy Markets (Digital Technology) function Acting as single point of contact for group wide architecture, informationsecurity and technology initiatives (e.g. CERT, EAM) Enabling the informationsecurity and data protection processes in E.ON Energy Markets Profile: Academic degree in Information Technology More ❯
You will be joining the innovative InformationSecurity Cybertech Engineering team as a full stack software engineer in a global team responsible for developing web applications (Java/Angular), data engineering (Python) and solutions with third party products. You will be working in a collaborative and inclusive fast-paced environment that leverages agile approaches to deliver solutions quickly. … determine, and design the solution that is both robust and quick to market. The suite of applications developed and maintained by the team are used to enhance the firms informationsecurity threat detection, compliance, entitlement management architectures and audit assurance programs. You'll have the freedom to challenge the status quo, mentor fellow engineers, and contribute to our … quickly. Working directly with project leads, stakeholders, and engineers to understand the problem, determine, and design the solution that is both robust and quick to market. Enhancing the firms informationsecurity threat detection, compliance, entitlement management architectures, and audit assurance programs. Challenging the status quo, mentoring fellow engineers, and contributing to ongoing success while fostering personal and professional More ❯
and endpoint security. Develop scripts (e.g., PowerShell, Python) to automate repetitive tasks and streamline IT processes. Identify areas for improvement and implement IT solutions that enhance efficiency and productivity. Security & Compliance: Enforce IT security policies and ensure compliance with global standards (e.g., MFA, password policies, endpoint protection). Assist with local implementation of security audits, risk assessments … wireless LAN deployment and optimisation, with CCNA or CCNP certification. Proficient in managing Active Directory, Exchange Online, SharePoint, and Teams to maintain enterprise collaboration platforms effectively. Understanding of endpoint security technologies (e.g., antivirus software, patch management, MFA deployment), familiar with informationsecurity standards like ISO 27001, and capable of implementing account password policies, data backup, and other … process. First of all, we use Greenhouse, a web-based hiring platform, to assist in our recruiting process. As part of that process Greenhouse will be processing the personal information you've shared in accordance with Nothing instructions. When you apply for a job posted by us, the information we collect/you provide is used to determine More ❯
product counsel to our internal and client-facing teams responsible for technology products and services; (iii) analyzing, advising, and preparing for regulatory changes in artificial intelligence, data localization, cyber security, intellectual property, and technology more broadly; (v) advising our informationsecurity team and security operations center; and (vi) supporting our regional lawyers in their work involving … role may involve other aspects of our team’s work. You will work closely with the wider McKinsey Legal Department and other firm functions including our Technology Ecosystem, Cyber Security, Risk, and Compliance to structure, negotiate and execute arrangements regarding assets from inception to completion. There will be opportunities to work with and learn from experienced lawyers with backgrounds … counseling consultants on the application of McKinsey’s internal policies, as well as draft, review and negotiate complex contracts relating to asset deployment, software, artificial intelligence, data analytics, cyber security, and data usage. Negotiations will entail frequent interaction with McKinsey clients and consultants. Your Qualifications and Skills Law degree (e.g., LLB, JD), and licensure to practice law. 5+ years More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Ohio Society of CPAs
Job Description: Job Title Information Technology (IT) Auditor - Investment Banking Location Birmingham Corporate Title Assistant Vice President The Group Audit (GA) function takes a proactive, risk-based and independent approach to assist the Bank's business and infrastructure functions to identify key control weaknesses. You will be joining the global GA Investment Banking Application & Innovation Technology team reporting into … the Principal Audit Manager responsible for covering the Bank's Technology and InformationSecurity risks and controls across Investment Banking and the Bank's Innovation activities covering emerging technologies such as artificial intelligence, robotic process automation and cloud computing. What we'll offer you A healthy, engaged and well-supported workforce are better equipped to do their best … respective support areas. Contribute to departmental projects and initiatives Your skills and experience Experience in auditing or practical working experience in software development, application lifecycle, vendor management and cyber security including IT general and automated application controls Ability to multi-task assignments, prioritize workloads with minimal supervision and work well within teams, building strong relationships Strong analytical and communication More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading informationsecurity company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … professionally. Dionach by Nomios holds impressive certifications, including CREST, CHECK, PCI QSA, and ISO 27001. With our focus on enhancing customers' security and fostering team development,be joining a company that prioritizes both your growth and the safety of our clients. We're in an exciting phase of expansion and are looking for self-motivated individuals ready to thrive … Tester - Application (CCT APP), Cyber Scheme Team Leader (CSTL) infrastructure (CSTL-INF) or Web Application (CSTL-Web App). Eligibility : Right to work in the UK and eligibility for security clearance. Key Attributes Analytical thinker with a proactive, detail-oriented approach. Excellent verbal and written communication skills Ability to work effectively under pressure Commitment to maintaining the highest ethical More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Capgemini
to transform and manage their business by harnessing the power of technology. We are looking for an individual who is passionate about cybersecurity and has experience driving and delivering security services within organisations. We are looking for someone with strong interpersonal and communication skills; someone who can build and maintain effective working relationships with various people (Capgemini, clients, 3rd … . We hope to find someone who enjoys working collaboratively, who is open to sharing knowledge and helping others. We are looking for an individual who enjoys being a security advocate, coaching and mentoring members of the team and able to give general security training in and around security incident and access management. We know unicorns don … Conduct vulnerability analysis and create impact assessments including risk assessment of vulnerability reports and impact risks to service Collate conclusions and recommendations and Identify and communicate current and emerging informationsecurity threats Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement and notify requirements to address security deficiencies Report audit findings, including corrective More ❯
student accomplishments and benefits to the community and state Identifying opportunities to connect college resources to student needs Required Qualifications An earned doctoral degree in computer science/engineering, information systems, or a related discipline. The candidate will need a minimum of seven to ten years full time experience and bring a substantial personal record in research and education. … Professor - this rank requires a doctoral degree in computer science, information systems, cybersecurity, computer engineering or related disciplines. At least five years at the rank of Associate Professor or comparable training, background, and experience are required. The candidate must have an active externally-funded research program and a strong record of competitive federal or state research funding. The candidate … the faculty ranks at Augusta University is only through the annual Promotion and Tenure process in which faculty may apply if eligible (typically five-year increments). For more information on ranks, please review the Augusta University Promotion and Tenure Website: College/Department Information Founded in 1828 and located in Augusta, Georgia, Augusta University is a public More ❯
RMS. To work with the Minerva delivery teams to ensure that the organisation is aligned with thevision ensuring maximisation of RMS to transform how the forces work together, share information and realise the benefits. To represent our client at specialist RMS system owner meetings, with engagement to evolve and develop the force relationship around product development. To coordinate developments … similar service management frameworks. Excellent communication, problem solving Stakeholder/Customer Engagement and customer service Demonstrable skills in managing complex workloads and performance delivery. GDPR, Data Protection awareness Cyber security awareness Please note: The post holder will be expected to maintain a high standard of informationsecurity and be vetted to Local Force Management Vetting (MV). More ❯