research projects. Proficiency in oral and written communication is highly desirable, particularly the ability to communicate complex ideas simply and effectively. Prior experience in the visualisation and communication of risk e.g. via animations, video, infographics or other means would be desirable (but not essential). Responsibilities About the Day to Day Responsibilities of the Role Provide day to day … contact to assigned Verisk clients for all support needs. Provide presentations and training sessions to clients to help clients understand and use Verisk's software and models. Perform sophisticated risk analyses using Verisk's cutting-edge technology for insurers, brokers, and other financial intermediaries in the internationally expanding business of catastrophe risk management for perils such as earthquake … workflow needs potentially using coding in SQL, R and other languages. Includes the Analyze Re API suite for bespoke reinsurance modelling requirements. Monitor emerging risks and trends in catastrophe risk management. Qualifications Requirements: Strong analytical and quantitative skills, a solid understanding of probability concepts, excellent problem-solving skills and a commitment to client services. Proficiency in catastrophe software is More ❯
Emersons Green, Bristol, Avon, England, United Kingdom
Gregory Martin International Limited
global, defence, energy, space, maritime, and intelligence & communications programmes. As a Cost Consultant you will be delivering technical consulting projects within the defence sector. You will be providing detailed analysis of data and costs to assist your client’s industry make better decisions. This may be working in customer teams to support procurement decisions with analytical thinking and outcomes … modelling of operational performance and sustainment, or historical analysis to support learning lessons from previous operations. Responsibilities for Senior Cost Engineer Consultant will include: Provide detailed analysis to support key decisions within the project teams. Identifying and bidding for and winning future work within your client’s industry. Building new relationships and maintaining the relationships with current customers. … Using and developing problem structuring methods and a variety of tools and techniques, including novel approaches where required. Working organically in customer teams to deliver rapid turn-around analysis or using one of the company’s offices as a team hub from which to plan and deliver tasks. Essential Requirements re role of Senior Cost Consultant/Cost Engineer More ❯
global, defence, energy, space, maritime, and intelligence & communications programmes. As a Cost Consultant you will be delivering technical consulting projects within the defence sector. You will be providing detailed analysis of data and costs to assist your client’s industry make better decisions. This may be working in customer teams to support procurement decisions with analytical thinking and outcomes … modelling of operational performance and sustainment, or historical analysis to support learning lessons from previous operations. Responsibilities for Senior/Principal Cost Engineer Consultant will include: Provide detailed analysis to support key decisions within the project teams. Identifying and bidding for and winning future work within your client’s industry. Building new relationships and maintaining the relationships with … customers. Using and developing problem structuring methods and a variety of tools and techniques, including novel approaches where required. Working organically in customer teams to deliver rapid turn-around analysis or using one of the company’s offices as a team hub from which to plan and deliver tasks. Essential Requirements re role of Senior Consultant: Proven experience in More ❯
you will be needed to travel to a business office when necessary to meet stakeholders etc. The main duties include but are not limited to: Pre-Contract Governance, Pricing & Risk Lead review and negotiation of commercial contracts. Conduct risk assessments and pricing analysis to inform decision-making. Ensure contracts align with business objectives and compliance standards. Post … activities post-award to ensure operational readiness. Interpret contractual obligations and manage in-life pricing and performance. Oversee compliance and collaborate across internal teams to optimise delivery. Transformation & Performance Analysis Contribute to business transformation initiatives. Lead performance reviews and commercial analysis. Deliver insights that support strategic decisions and continuous improvement. Additional Responsibilities: Develop and implement commercial strategies and governance … frameworks. Lead tender processes and evaluate bids. Conduct contract riskanalysis and cost modelling. Draft, review, and negotiate contractual agreements. Manage contract mobilisation and stakeholder alignment. Drive business development and identify growth opportunities. Oversee cost management and financial reporting. Lead change management and transformation projects. Engage with stakeholders across legal, finance, operations, and supply chain. Develop pricing strategies More ❯
you will be needed to travel to a business office when necessary to meet stakeholders etc. The main duties include but are not limited to: Pre-Contract Governance, Pricing & Risk Lead review and negotiation of commercial contracts. Conduct risk assessments and pricing analysis to inform decision-making. Ensure contracts align with business objectives and compliance standards. Post … activities post-award to ensure operational readiness. Interpret contractual obligations and manage in-life pricing and performance. Oversee compliance and collaborate across internal teams to optimise delivery. Transformation & Performance Analysis Contribute to business transformation initiatives. Lead performance reviews and commercial analysis. Deliver insights that support strategic decisions and continuous improvement. Additional Responsibilities: Develop and implement commercial strategies and governance … frameworks. Lead tender processes and evaluate bids. Conduct contract riskanalysis and cost modelling. Draft, review, and negotiate contractual agreements. Manage contract mobilisation and stakeholder alignment. Drive business development and identify growth opportunities. Oversee cost management and financial reporting. Lead change management and transformation projects. Engage with stakeholders across legal, finance, operations, and supply chain. Develop pricing strategies More ❯
computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Supports the building of security architectures. Responsibilities • Designs, develops, implements and/or integrates IA and security systems and system components including those for …/risks throughout the program life cycle. • Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. • Contributes to the security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations. Applies system security engineering expertise in one or more of the following to: system security … design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security testing. Qualifications Three More ❯
computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. RESPONSIBILITIES Participate as a security … IA architectures, systems, or system components Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures Support security planning, assessment, riskanalysis, and risk management Identify overall security requirements for the proper handling of Government data Provide security planning, assessment, riskanalysis, and risk management More ❯
Overview: Seeking high-level IT Professionals to provide cyber security and security engineering services for the National Military Command Center (NMCC) customer including system security engineering, cybersecurity risk assessments, and security architecture support. The ISSE shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established cybersecurity standards and regulations and … the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments • Support security planning, assessment, riskanalysis, and risk management • Experience with Risk Management Framework (RMF), NIST SP 800-53, Security Technical Implementation Guides (STIGs) and Security Content Automation Protocol (SCAP) Compliance … Checker. • Prepare and review program documentation to include Risk Assessment Reports, Accreditation Packages, and security policy guides • Continuous Monitoring - Plan of Action & Milestones (POAMs) - Working with engineers to resolve formal security findings from the security assessment and/or the scans, and maintain the POAM. • Knowledge of SIPR and JWICS Assessment & Authorization (A&A) process. • Document the various security More ❯
architectures, systems, or system components Identify overall security requirements for the proper handling of government data Interact with the customer and other project team members Support security planning, assessment, riskanalysis, and risk management Requirements Bachelor's degree in computer science, information assurance, information security system engineering, or a related discipline from an accredited college or university More ❯
performing team that truly makes a difference, then come join us! Program Review: Provides technical support to a diverse set of corporate goals across the organization by conducting technical risk assessments and providing technical risk mitigation guidance on the use of various enabling technologies. About the Role: The Cyber Security Project Engineer provides expertise in technical riskanalysis of enterprise and mission systems, IT systems and networks, mobile and wireless networks, cloud-based computing, network management platforms, communication protocols, scripting or programming products, configuration scripts, and IT hardware and software products in support of the organizations technical risk assessment activities. The Engineer also requires software development to maintain an online infrastructure, evaluating and extracting … web development, and software coding. Required Qualifications: Demonstrated experience analyzing IT systems for cyber security vulnerabilities. Demonstrated experience developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and vulnerability analysis using both open-source and commercial tools, such as Nmap, Wireshark, Metasploit, Canvas, Kismet, or BackTrack. Demonstrated experience analyzing IT network configurations of More ❯
existing Customer applications operate in compliance with applicable documents. Planned activities shall be coordinated with all stakeholders and approved by the Customer. The Candidate shall also conduct Technical CI Risk Assessments of devices and systems by following the Customer's current riskanalysis process. In making their requirements determination, the Candidate shall consider the following: a. Use … recovery. e. Monitor each application to provide status awareness and include a resolution plan for the application in the event of its failure. f. Comply with the Customer's Risk Management (i.e., cyber security) Framework to ensure that the program addresses and mitigates vulnerabilities and risks identified throughout the lifecycle of the project. g. Comply with the Customer's … CI Risk Assessment process to conduct riskanalysis of devices, transport systems and backend systems, and draft risk assessment reports documenting risks associated with the defined categories. The Candidate team shall: a. Provide operations and maintenance of applications in the cloud infrastructure. b. Implement changes to current applications and data pipelines based on Customer requirements. c. More ❯
Oversight Performs daily operations of EVAP allowing EVAP, Red and Blue Teams to perform timely and effective vulnerability assessments Provide hands-on support for complex scans, troubleshooting, and result analysis Align scanning activities with organizational priorities for maximum impact Tool and Infrastructure Management Maintain and enhance the FBI's enterprise vulnerability scanning tools and infrastructure Ensure tools are secure … and effectively utilized across the organization Comprehensive Vulnerability Assessments Participate in technical execution of enterprise-wide assessments across networks, systems, and ICS infrastructure Assist in analyzing vulnerabilities to assess risk and recommend remediation strategies Ensure assessments cover diverse technologies including operating systems, databases, applications, and network devices Collaboration and Cross-Team Coordination Assist with providing technical support during incident … years of Cybersecurity experience, with experience administrating and engineering IT Infrastructure Expertise in vulnerability assessment tools, scanning methodologies, and enterprise infrastructure Strong understanding of vulnerability management lifecycle, riskanalysis, and remediation strategies Excellent communication skills with the ability to translate technical findings into actionable insights Preferred Certifications: Advanced knowledge of Microsoft Certification(s) Ability to assist with the More ❯
standard certifications, regulatory licensing for SDS. Liaise with all areas of the business to ensure cyber security standards are being adhered to. Manage internal and external security assessments and riskanalysis’. Perform ongoing audit testing of controls. Implementation of automation control assurance monitoring. Work with the Technical Compliance team with regards to regulatory audits and compliance. Make … procedures (SOPs). Support Cyber Security and the business to implement and maintain ISO27001 certification. Carry out annual review of policies and standards. Participate in the TRA process (Threat Risk Assessment) for new projects and applications. Assist in closing out audit items and continuous monitoring of risk assessment plans. We are looking for skills and experience in - Experience More ❯
have experience working with large datasets, developing insightful reports and dashboards using Tableau, Power BI, and Matplotlib, and supporting fraud detection, anti-money laundering (AML), and other financial crime risk initiatives. Job Title: Data Analyst – FinCrime (Banking Domain) Location: Gurgaon, Bangalore, Chennai - India Experience: 7+ Years Job Type: Full-time, Permanent Job Summary We are looking for a Data … have experience working with large datasets, developing insightful reports and dashboards using Tableau, Power BI, and Matplotlib, and supporting fraud detection, anti-money laundering (AML), and other financial crime risk initiatives. Key Responsibilities Design and develop BI dashboards and reports using Tableau, Power BI, and Matplotlib to support FinCrime investigations and decision-making. Analyze and interpret large financial datasets … to identify suspicious activities, fraud patterns, and potential financial crime risks. Collaborate with compliance, risk management, and fraud prevention teams to improve data-driven insights for FinCrime monitoring. Extract, transform, and analyze structured and unstructured data from banking systems and external sources. Support the development of machine learning models for fraud detection and AML monitoring. Conduct data profiling, data More ❯
Nessus and Trellix ePO (HBSS/ESS) across Windows and Red Hat Linux environments. Responsibilities include applying DISA STIGs, conducting vulnerability assessments, implementing system hardening measures, and supporting the Risk Management Framework (RMF) process. The ideal candidate has experience with tool administration, system architecture, Tier 3 troubleshooting, and security documentation. A strong understanding of IA integration and secure systems … o Build IA into systems deployed to operational environments, validating and verifying system security requirements, and establishing system security designs for stand-alone systems. o Support security planning, assessment, riskanalysis, and risk management. • Security Tool Troubleshooting & Support: o Provide Tier 3 troubleshooting support for cybersecurity tools such as ACAS and HBSS/ESS. • RMF Support & Documentation … o Support the documentation of security control implementations and gathering of artifacts to support Risk Management Framework (RMF) and ICD 503 Security Accreditation. o Assist with RMF related tasks as needed. Education, Experience and Qualifications: • Security+ certification. • 5+ years of hands-on experience administering and maintaining Tenable Nessus, Trellix ePO (HBSS/ESS), and related security tools in a More ❯
Key Infrastructure (PKI), network and enterprise security architecture •2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security riskanalysis •A Master's Degree in Computer Science or IT Engineering is desired and may be substituted for 6 years of experience •Knowledge of Federal, NSA, IC, and More ❯
s cybersecurity operations. You'll be working on-site, helping to manage the security posture of sensitive information systems. The focus will be on Authorization to Operate (ATO) processes, risk assessments, and network/system security. Key Responsibilities (Summarized for Candidate Call) Work with system owners to manage and renew ATOs Assess security controls, identify risks, and resolve vulnerabilities … and track remediation (POA&Ms) Apply NIST 800-53 rev 5, FISMA, and FIPS 199 to ensure compliance Develop and implement security standards, policies, and procedures Perform system-level riskanalysis throughout the entire system development life cycle , Lead change control and configuration management for security systems Stay up-to-date with encryption, authentication, and cybersecurity tools Required More ❯
Risk Quant Engineer Man Group plc London, United Kingdom Apply now Posted 1 day ago Hybrid Job Permanent Competitive Man Group is a global alternative investment management firm focused on pursuing outperformance for sophisticated clients via our Systematic, Discretionary and Solutions offerings. Powered by talent and advanced technology, our single and multi-manager investment strategies are underpinned by deep … and is a constituent of the FTSE 250 Index. Further information can be found at www.man.com * As at 31 March 2025 The Role As a quant engineer within the Risk Engineering team you will work with Investment Risk Managers and other Engineers to deliver novel solutions to investment teams and executives within Man Group. Your team's work … enables daily riskanalysis and ongoing risk research while supporting and refining the existing processes. You will collaborate with other risk engineering teams providing risk data, analytics and visualisation primitives. This is a highly collaborative role, requiring linking together data & analytics from varied sources into a uniform, actionable, high level risk-focused view. We More ❯
secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern development architectures. Relevant More ❯
considered and informed recommendations to IT Security Manager. Examine security systems and web applications. Monitor security access across the organisation. Assist with conducting security assessments through vulnerability testing and riskanalysis within good time and to a high standard. Assist with performing both internal and external security audits. Analyse security logs from various systems for breaches and make … the IT Security teams in a timely manner. Conduct technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation. Knowledge, skills and experience Essential skills: BSc in Cyber Security, Computer Science, or equivalent practical experience. Demonstrable technical knowledge of hybrid estate. Relevant experience of reviewing technical security More ❯
Outsourced Professional Administration Limited (OPAL)
regular updates around deviation to what has been agreed for a project/CR and identifying risks as early as possible Production of Project reporting as required Security/Risk Support and work in accordance with OPAL’s ISO27001, DPA, Consumer Duty and other internal policies and procedures. Competencies required upon recruitment – Experience within the Financial Services industry - Minimum … customer satisfaction is proving difficult. Commitment – Displays willingness, enthusiasm and flexibility to task completion. Quality – Pays attention to detail, completes tasks in a timely manner, consistently produces quality outputs Risk - adverse to risk taking and understands RiskAnalysis to avoid undue to risk to the business. Security Awareness – Understands basic principals of DPA and other More ❯
backed financing. The ideal candidate will have a strong quantitative background, excellent programming skills, and a deep understanding of structured products. What will you do as a Quantitative Strategist? RiskAnalysis: Understand the mechanics of structured products and apply this knowledge to model development and risk analysis. Quantitative Techniques: Apply advanced mathematical and statistical techniques to solve … risks. Data Management: Work with AWS and databases to manage and analyse large datasets. Communication: Communicate complex quantitative concepts and solutions effectively to stakeholders, including traders, portfolio managers, and risk managers. Collaboration: Collaborate with other teams, including technology, risk management, and trading, to integrate quantitative models into broader business processes. What qualifications or skills should you possess in More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Goodman Masson
audits, and helping to strengthen third-party security compliance. Key Responsibilities: Monitor security systems and investigate incidents Operate firewalls, EDR, SIEM tools, and encryption software Support vulnerability testing and riskanalysis Assist with third-party vendor assessments and internal audits Contribute to the ongoing improvement of security processes What We’re Looking For: Experience in IT security or More ❯
London, England, United Kingdom Hybrid / WFH Options
Goodman Masson
audits, and helping to strengthen third-party security compliance. Key Responsibilities: Monitor security systems and investigate incidents Operate firewalls, EDR, SIEM tools, and encryption software Support vulnerability testing and riskanalysis Assist with third-party vendor assessments and internal audits Contribute to the ongoing improvement of security processes What We’re Looking For: Experience in IT security or More ❯
system design, deployment, and ongoing operations. Define cybersecurity requirements within the client’s environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Contribute to the production and review of assurance artefacts, including security cases, risk registers, control implementation evidence, and … depth understanding of operational technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, riskanalysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems within large engineering or infrastructure … safety standards. Strong communication and stakeholder engagement skills, with the ability to liaise confidently across engineering, programme delivery, assurance, and regulatory audiences. Ability to produce high-quality documentation, including risk assessments, technical guidance, assurance artefacts, and audit-ready deliverables. Familiarity with UK cybersecurity regulations and sector guidance, including the NIS Regulations, CNI expectations, and industry-specific frameworks. Capable of More ❯