Risk Analysis Job Vacancies

101 to 125 of 713 Risk Analysis Jobs

Information Systems Security Engineer- Multiple Levels with Security Clearance

Annapolis Junction, Maryland, United States
BlueHalo
points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Key responsibilities will include: Validate and verify system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate IA and security systems and system components including those for networking, computing, and enclave environments to include … and implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the program life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Review certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its … following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security More ❯
Employment Type: Permanent
Salary: USD 263,000 Annual
Posted:

Delegated Authorizing Official Representative 3 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration … Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Responsible for assisting in identifying the overall security requirements for the protection of data, to ensure the implementation of appropriate information security controls, and perform and analyze the security risk assessment, risk analysis, risk management process, security control assessments, and awareness activities for systems and networking operations. Provide assistance to ensure Cybersecurity functions are included in the configuration management process. Interact with customers, Information Technology (IT) staff, and high-level corporate officers in defining and achieving required Cybersecurity objectives for the organization. Contribute to building security architecture. Assist with More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information System Security Manager 2 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration … Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture … security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security SW, HW, and FW. Manage changes to systems and assess the More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information System Security Manager 3 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration … Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture … security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security SW, HW, and FW. Manage changes to systems and assess the More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Quantitative Analyst, Global Quantitative Research

London, England, United Kingdom
ICE
derivatives pricing and theory is preferred. Responsibilities Drive clearing house margin, stress and collateral management models R&D. Define business requirements and specifications for model upgrades and enhancements. Perform risk analysis and develop risk solutions for various products across all asset classes. Develop and support in-house quantitative R&D platform and analytics tools Contribute strongly to … hands-on” and ad-hoc requests for development and solutions in time-critical situations. Document and present risk models and risk reports for clearing members, regulators, risk committees and boards. Interact with risk departments to provide support for existing clearing house quantitative models. Interact with technology groups for production implementation design. Knowledge and Experience PhD or … of a team. Excellent oral and written communication skills. Capable to articulate complex concepts to senior management on a regular basis. Strong mathematical knowledge of financial derivatives pricing and risk management models preferred. #J-18808-Ljbffr More ❯
Posted:

Senior Cybersecurity Analyst - EVAP Team with Security Clearance

Washington, Washington DC, United States
Paradyme Management
Oversight: Performs daily operations of EVAP allowing EVAP, Red and Blue Teams to perform timely and effective vulnerability assessments Provide hands-on support for complex scans, troubleshooting, and result analysis Align scanning activities with organizational priorities for maximum impact Tool and Infrastructure Management: Maintain and enhance the FBI's enterprise vulnerability scanning tools and infrastructure Ensure tools are secure … to date, and effectively utilized across the organization Comprehensive Vulnerability Assessments: Participate in technical execution of enterprise-wide assessments across networks, systems, and ICS infrastructure Analyze vulnerabilities to assess risk and recommend remediation strategies Ensure assessments cover diverse technologies including OS, databases, applications, and network devices Collaboration and Cross-Team Coordination: Provide technical support during incident response efforts and … Red, Blue, and SOC teams to share insights and support remediation Manage task assignments and workload distribution Collaborate with IT system owners to integrate scan results into the Governance, Risk, and Compliance (GRC) platform Training and Policy Implementation: Assist with the development and deliver training on vulnerability scanning tools and best practices Create, maintain and refresh Standard Operation Procedures More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Application Security Engineer/Director - Generative AI (Remote)

London, England, United Kingdom
Hybrid / WFH Options
AltFi Ltd
with decisions driven by balancing security risks faced by the business along with customer or market requirements Perform threat modeling, secure code reviews, and secure design reviews for high-risk applications, evaluate new technology stacks and frameworks Perform vulnerability research, serve as technical security/risk advisor for new technology/applications developed by S&P Ratings Determine … engineering roles Demonstrated subject matter expertise in Application Security, Web services security, GenAI/LLM security Programming expertise – Java, Python, Agile SDLC processes Experience with threat modeling, design reviews, risk analysis and control design Experience architecting and leading security for Cloud native applications In depth knowledge of network security, authentication and authorization Advanced understanding of vulnerability exploitation chaining … and vulnerability remediation Demonstrated expertise in product/application security architecture – Service oriented architecture (SOA), Network security, application security, web services, Angular, JavaScript Security audit, Vulnerability assessment and packet analysis skills TCP/IP stack knowledge, Encryption expertise, TLS, DTLS, ECC, PKI/Certificates Identity & Access Management: AD/LDAP Preferred Qualifications: Experience with AI technologies and services (e.g. More ❯
Posted:

Personal Data Management and Information Security Officer European Bank for Reconstruction and [...]

London, England, United Kingdom
GeoPolist
ensure that the Bank maintains high standards of security, privacy, and compliance, contributing to our mission of promoting sustainable development across our regions of operation. About the Department Operational Risk Management (ORM) is part of the Bank’s Risk Management group and forms the second line of defence. ORM is responsible for independently identifying, assessing, and supporting the … data subject requests and support the Personal Data Review Panel on personal data-related complaints. Advise on IT and business projects with respect to InfoSec and privacy risks. Maintain risk registers, provide ongoing risk analysis, and contribute to risk mitigation plans. Support completion and review of Privacy Impact Assessments (PIAs) and Data Protection Impact Assessments (DPIAs … . Manage BAU activities, including: Social engineering exercises. Supplier assurance assessments. Risk assessments for business processes and technologies. Research emerging threats and evaluate applicability to the Bank’s operations. Monitor changes in regulations and best practices, document and propose updates, agree on changes with the Head of Information Security, and implement project plans. Work extensively with IT, particularly the More ❯
Posted:

Military Strategist & Requirements Analyst SME with Security Clearance

Maryland, United States
Gemini Industries Inc
days. Responsibilities: The Military Strategies & Requirements Analyst SME supports the Secretary of the Secretary of the Air Force, Office of Competition (SAF/OC), Office of Commercial and Economic Analysis (OCEA)'s Strategic Initiatives Division. This role requires advanced proficiency in multiple skill areas, including: military studies, strategic planning, risk management, joint operations, requirements generation, commercial market research … writing, and portfolio management. The position serves as the military strategy focal point for China-focused analytical teams, integrating operational military planning with commercial sector analysis and strategic competition dynamics. The most common duties of the Military Strategies & Requirements Analyst entail conducting a substantial amount of capability analysis, commercial technology surveys, military requirements assessment, market research and historical … joint operations, force design, and requirements generation to inform long-term strategic direction. Per PWS section 1.3.10.11, Consulting Support, specific responsibilities include but are not limited to: • Provide Research Analysis, Market Analysis, and Portfolio Analysis with focus on military applications and strategic competition implications. • Conduct assessments and formulation of strategies, comparisons of different industries, trends, and assessment More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer 6 with Security Clearance

Chantilly, Virginia, United States
M.C. Dean
secure reliable and uninterrupted availability of the Sponsor's developed and deployed systems and networks. Provide core security engineering principles are implemented into assigned programs information systems architecture. Perform analysis and evaluation to design, implement, test and field secure systems, networks, and architectures. Work closely with the architects, engineers, and developers in the identification and implementation of appropriate information … and implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the program life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Review assessment and accreditation (A&A) documentation, provide feedback on completeness and compliance of its … to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Controls Assessor with Security Clearance

Arlington, Virginia, United States
TEKsystems c/o Allegis Group
The system-level continuous monitoring strategy must conform to all applicable published DoD enterprise-level or DoD Component-level continuous monitoring strategies. Determine and document in the SAR a risk level for every noncompliant security control in the system baseline. Determine and document in the SAR an aggregate level of risk to the system and identify the key … drivers for the assessment. The SCA's risk assessment considers threats, vulnerabilities, and potential impacts as well as existing and planned risk mitigation. Develop the continuous monitoring plan specific to the information system Schedule and coordinate assessments of security controls and potential vulnerabilities. Ensure that assessments cover all required aspects, including confidentiality, integrity, and availability (CIA). Ensure … to the CISO (Chief Information Security Officer) and AO (Authorizing Official) for security authorization decisions (e.g., whether the system should be authorized to operate). Ensure compliance with relevant risk management frameworks (e.g., RMF, FISMA, NIST SP 800-53). Review and assess changes (e.g., system modifications, patches, or environment changes) that might affect security controls or system authorization. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Architect (m/f/d)

Wideopen, Tyne And Wear, United Kingdom
Voith GmbH Group
e.g. EU CRA) is one of your tasks. Develop cyber security concepts and architectures with the development teams to fulfill the respective security target levels supports, including threat and risk analysis (TARA). Drive the implementation of cyber security measures over the whole lifecycle of Voith Hydro products, and initiate penetration tests for high-risk areas for … in cyber security, information security, computer science, information technology or similar once. Ideally, you have already had work experience in a comparable position. Experience with cyber security audit and risk management processes, standards and assessments. Knowledge and experience in information security as well as experience in secure software development lifecycle. Working with international cyber security standards (e.g. IEC More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Security & Compliance Specialist, Payments Security Compliance

London, United Kingdom
Amazon
This candidate will be an innovative and forward thinking individual who possess in-depth knowledge and will be identifying Information Security compliance risks, drive Security Governance, Security Assurance and Risk Management efforts, manage regional regulatory compliance and contribute to emerging regulations and technology standards globally, partnering with Security Experts of Global Amazon Information Security teams. Your work directly impacts … external regulatory audits - Review Implementation of Security best practices and standards, drive continuous improvements - Influence Security Control Assessment Automation efforts, for security and compliance at scale. - Skilled in security risk analysis and making complex business/risk trade-off recommendations and decisions - Maintaining C-level relationships with peers, stakeholders, boardrooms, and/or customers, often becoming the … Also, create and maintain a trusted relationship with regulators and industry forums About the team The objective of Payments Security Compliance (PSC) is to oversee & manage Information Security Governance, Risk and Compliance (IS-GRC) for the Payments entities globally as part of Amazon's WW SRC team. The tenets for Payments Security Compliance team (Unless you know better ones More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead Software Developer

London, England, United Kingdom
Hybrid / WFH Options
WTW
Are you an experienced developer that can think on their feet and propose innovative solutions to challenging problems? If so, we have an exciting opportunity to join our Risk Technology team in the UK. Risk Technology is a cross-functional team of software development specialists, geospatial information specialists and catastrophe/financial model specialists who bring best-in … class analytics, thought leadership and expertise in designing, building and supporting industry standard risk analysis tools. This is an exceptional opportunity to play a key role in developing the change capabilities of a global financial services organisation, where the focus will be on practical delivery and reacting to the highest value business needs. You will be able to … directly relevant experience is not available, we will be looking for an ability to rapidly become effective in a new, unfamiliar environment The successful applicant will report to the Risk Technology Solutions Engineering Lead. The role offers hybrid working with travel to office expected on a regular cadence for meetings and workshops. Some occasional travel may be required as More ❯
Posted:

Information Systems Security Engineer with Security Clearance

Laurel, Maryland, United States
The Swift Group
recommendations on the system- level to resolve security requirements. Perform system or network designs that encompass multiple enclaves, to include those with differing data protection. Provide security planning, assessment, risk analysis, and risk management. Advocate and recommend system- level solutions to resolve security requirements. Monitors and suggests improvement to IA policy. Interact with customers, IT staff. And More ❯
Employment Type: Permanent
Salary: USD 290,004 Annual
Posted:

Compliance Program Manager with Security Clearance

Chantilly, Virginia, United States
CenCore LLC
in designing, building, securing, and maintaining AI ecosystems at the intersection of big technology and national security. CenCore Group strives to be the trusted and primary source for insight, analysis, and implementation of physical and digital security solutions associated with the development of artificial intelligence and machine learning in the NatSec space. We are seeking a qualified Construction Surveillance … CMMC, etc.). • Partner with FSO, ISSM/ISSO, and security teams to manage incident response, access control, and visitor control protocols. • Conduct periodic internal audits, assessments, and risk analyses of classified facility operations. • Collaborate with engineering, IT, and facility management teams to validate physical and cyber security postures. • Maintain documentation and provide reporting to internal leadership and government … compliance standards such as NISPOM, ICD 705, CMMC, FISMA, and insider threat policy. • Experience supporting classified data centers or secure IT infrastructure environments. • Proven ability to develop policy, perform risk assessments, and lead internal audit processes. • Strong interpersonal skills with the ability to communicate complex requirements to diverse teams. Preferred Qualifications: • Bachelor's degree in Security Management, Information Systems More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Principal SecOps Consultant

Daresbury, England, United Kingdom
Telefónica Tech
Improve SOC processes, including incident response, threat hunting, and vulnerability management. Demonstrate expert understanding of security concepts and apply them to a technical level, at the highest levels of risk and customer complexity. Influence and challenge clients to define clear outcomes and problem statements, from which to design appropriate solutions and opportunities. Effectively translate and accurately communicate security and … risk implications at the most senior client levels, across technical and non-technical stakeholders. Manage stakeholder expectations across high risk and complexity or under constrained timescales. Identify new technology opportunities and design the use of these to meet customer needs and pain points. Provide mentorship across delivery team members, operating as an escalation expert for both internal and … client facing issues. Designing, developing, and continuously improving vulnerability assessment, security testing, and risk analysis methods. Designing, developing, and continuously improving the security posture, effectiveness and efficiency of the company's products and services Providing developers with remediation guidance and advice Designing, developing, and continuously improving security operations Recommending and providing technical leadership for the implementation of security More ❯
Posted:

Senior Network Architect

United Kingdom
Dynamic Search Solutions
branch environments Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure More ❯
Posted:

Senior Network Architect

Chesterfield, England, United Kingdom
JR United Kingdom
branch environments Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure More ❯
Posted:

Senior Network Architect

Ipswich, England, United Kingdom
JR United Kingdom
branch environments Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure More ❯
Posted:

Senior Network Architect

Stevenage, England, United Kingdom
JR United Kingdom
branch environments Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure More ❯
Posted:

Senior Network Architect

Wakefield, England, United Kingdom
JR United Kingdom
branch environments Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure More ❯
Posted:

Senior Network Architect

Whitley Bay, England, United Kingdom
Dynamic Search Solutions
branch environments Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure More ❯
Posted:

Senior Network Architect

Swindon, England, United Kingdom
JR United Kingdom
branch environments Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure More ❯
Posted:

FX Automation Tester

Slough, England, United Kingdom
JR United Kingdom
Key Responsibilities: Develop and maintain comprehensive test plans, strategies, and roadmaps to ensure product quality.Collaborate with product managers, engineering managers, engineers, and stakeholders to define requirements and acceptance criteria.Lead risk analysis to prioritise testing efforts and identify key focus areas. Design, implement, and execute manual and automated test cases to validate functionality, performance, security, and scalability. Ensure complete More ❯
Posted:
Risk Analysis
10th Percentile
£41,750
25th Percentile
£45,000
Median
£62,500
75th Percentile
£77,500
90th Percentile
£117,250