coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
Key Infrastructure (PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security riskanalysis • A Master's Degree in Computer Science or IT Engineering is desired and may be substituted for 6 years of experience • Knowledge of Federal, NSA, IC, and More ❯
Mean Nothing Without Context): Monitoring our SIEM platform like a hawk with insomnia Responding to EDR alerts and sifting through digital noise to find the signal Triage, incident response, riskanalysis - the full SOC works Digging into vulnerabilities and tracking them until they’re dead or fixed Being the person who knows when something just "looks off" Working … You’ve poked at firewalls, cloud environments, and know what an IDS should and shouldn't be doing You can explain why “it’s probably fine” is a terrible risk assessment Relevant certs? CompTIA Security+, Microsoft, ITIL, whatever makes sense - good to have, not everything The Not-So-Fine Print: You’ll need to travel now and again (we More ❯
manner. Being a designated point of contact for all matters relating to the ICAV, particularly co-ordinating responses to questions raised by Group functions such as Legal and Compliance, Risk and Finance, and the Head of Investments as well as third party entities such as the investment manager, ICAV Management company, depositary and ICAV Board. Monitoring and reporting on … implementing optimal solutions and meeting time challenged deadlines. Proven multi-asset product control experience, as well being able to demonstrate effective oversight and challenge with regard to portfolio composition, riskanalysis and financial performance monitoring. Proven experience of identifying and implementing steps designed to improve efficiency, automation and processes with respect to a fund governance and control framework. More ❯
the security of our products. They will also provide security consultation to Product Managers, to ensure that security is embedded in product development and strategy, to ensure that security analysis is conducted on any changes or new requirements. Key Responsibilities Identify security vulnerabilities from a wide pool of technological solutions Perform riskanalysis to triage and manage More ❯
and monthly reports to inform the Company of progress against budget and programme, listing any cost variations, updated payment schedules and focusing on recording risks and opportunities with relevant risk mitigation plans. Ensure key quality gates are completed by the required date and maintained throughout the project lifecycle. Maintain good control over the cost development of the contract and … regulations; Dematic, Customer, Principal Contractor as appropriate. Management and coordination of all personnel on site including sub-contractors. Production of RAMS, issue Health and Safety Policy, issue hazard and riskanalysis, compliance with CDM and any other regulations with office support. Assist during the selling stage, usually when the contract is close to being awarded. Assist in the More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Agoda
impact. Harnessing our innovative technologies and strong partnerships, we aim to make travel easy and rewarding for everyone. Get to Know our Team: The Security Department oversees security, governance, risk management, and compliance, and security operations for all Agoda. We are vigilant in ensuring there is no breach or vulnerability threatening our company or endangering our employees to keep … findings from multiple tools and work with hundreds of teams to get them remediated within the right SLA Conduct security assessments through code reviews, vulnerability assessments, penetration testing and riskanalysis Research on the negative effects of a vulnerability, from minimizing the impact to altering security controls for future prevention Identify potential threats so that the organization can More ❯
London, England, United Kingdom Hybrid / WFH Options
Capgemini
of the time. Your role Solution Architects shape and define solution architectures for our clients. These architectures are used to define project plans, manage detailed design, inform technical riskanalysis and support estimation. We work with a client from the earliest stages of a project through to delivery and ‘go live’. We provide technical leadership and support More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
The Medical Protection Society
security. A solid understanding of the cyber security risks linked to different technologies and how to manage them effectively. Working knowledge of security domains, auditing standards and frameworks, and riskanalysis frameworks including ISO 27001, Cyber Essentials, etc Good verbal communication skills, including the ability to present information and communicate clearly with both technical and non-technical team More ❯
operational scenarios, characterizing various ATM environments to ensure effective resource use for impactful change and maximum return. Business Impact: Apply deep understanding of how technical contributions affect business outcomes. RiskAnalysis and Action: Prioritize tasks, analyze risks, and take necessary actions to resolve product and system issues effectively. Customer Impact: Use advanced technical knowledge to assess the impact More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Medical Protection Society
security. A solid understanding of the cyber security risks linked to different technologies and how to manage them effectively. Working knowledge of security domains, auditing standards and frameworks, and riskanalysis frameworks including ISO 27001, Cyber Essentials, etc Good verbal communication skills, including the ability to present information and communicate clearly with both technical and non-technical team More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
and £50,000 plus benefits depending on experience. Key Responsibilities * Develop, implement and maintain comprehensive IT security processes and procedures in support of achieving ISO 27001. * Conduct security audits, risk assessments and compliance reporting to identify vulnerabilities and recommend corrective actions. * Collaborate with various departments to ensure comprehensive security awareness and adherence to established policies. * Proactively monitor and analyse … to ensure clear understanding across the organisation. * Stay up-to-date with the latest security trends, technologies, and regulations to continuously improve our security practices. * Conduct vulnerability assessments and risk analysis. * Conduct Security Audits and Assessments: Perform regular security assessments to ensure compliance with industry standards. * Create and maintain security policies to ensure data confidentiality, integrity, and availability. * Communicate … security risks and recommendations to management. * Support incident response. Critical Skills for Success * Experience in IT security compliance or a related field. * Proven experience with security audits, risk assessments, and compliance reporting. * Proficiency in using security tools and technologies. * Strong analytical and problem-solving skills. * Excellent communication and collaboration abilities. Interested?! Send your up-to-date CV to Emma More ❯
Counterparty Risk Analyst | Financial Services | London | Hybrid Our client, a leading player in the Investment Banking industry, is seeking an experienced Risk Analyst to join their Risk Systems Operations team. This role focuses on supporting market and counterparty risk applications and ensuring smooth production services. Key Details: Location: London (50% onsite) Work Pattern: Hybrid – 2 to … days per week in the office Industry: Investment Banking Contract Type: Contract Key Responsibilities: Provide second and third-line support for risk applications Perform data and functional analysis to resolve system issues Deliver riskanalysis and support stress testing Collaborate with stakeholders across IT and business teams Drive process improvements and contribute to agile delivery Requirements … Strong experience in Data Analysis within financial services Expertise in market or counterparty risk Technical skills with SQL and Python Data Visualisation skills with PowerBI, other Automation and Metrics knowledge handy. Proficiency with tools like Jira, Confluence, Excel, and SharePoint Familiarity with Agile, DevOps, and Site Reliability Engineering Excellent communication and stakeholder management skills More ❯
Counterparty Risk Analyst | Financial Services | London | Hybrid Our client, a leading player in the Investment Banking industry, is seeking an experienced Risk Analyst to join their Risk Systems Operations team. This role focuses on supporting market and counterparty risk applications and ensuring smooth production services. Key Details: Location: London (50% onsite) Work Pattern: Hybrid – 2 to … days per week in the office Industry: Investment Banking Contract Type: Contract Key Responsibilities: Provide second and third-line support for risk applications Perform data and functional analysis to resolve system issues Deliver riskanalysis and support stress testing Collaborate with stakeholders across IT and business teams Drive process improvements and contribute to agile delivery Requirements … Strong experience in Data Analysis within financial services Expertise in market or counterparty risk Technical skills with SQL and Python Data Visualisation skills with PowerBI, other Automation and Metrics knowledge handy. Proficiency with tools like Jira, Confluence, Excel, and SharePoint Familiarity with Agile, DevOps, and Site Reliability Engineering Excellent communication and stakeholder management skills More ❯
themselves and each other. We have a culture of empowering exceptional people to become the best version of themselves. The Role This is a key role within the Trading Risk and Operations team, you will be involved in business-critical key risk projects and be responsible for implementing and reporting risk metrics associated with the firm's … providing valuable insight into market activities to allow the firm to make optimal investment decisions. Further responsibilities include: On-going review and monitoring of the company and trading desks risk frameworks. Producing ad-hoc riskanalysis for the team, desks, and senior management. Liaising with Trading and Tech teams, supporting daily market activities. Validating the accuracy and … effectiveness of data sources used to produce various risk reports. Building and maintaining risk infrastructures, and ensuring documentation and controls are updated accordingly Investigating when required abnormal data points by requesting further information from the Trading desks (e.g. hedging strategies), Tech team (e.g. data workflow), Exchange (e.g. Initial margin models), Clearers (e.g. Haircut Model), and other financial counterparties. More ❯
Description/Key Responsibilities: Provides System Engineering and Technical Assistance (SETA) program support services for PM Tactical Network's portfolio of tactical communications systems. Provide direct Program Analyst and Risk Management support for the multiple long-term and new start programs and support additional programs as requested. Serve as a program office acquisition strategy/life cycle subject matter … 5000.02, DoDI 5000.80, DODI 5000.85) o Army Modification Program (AR 750-10) o Army Operation of the Adaptive Acquisition Framework (AR 70-1) Support in the areas of program analysis to include day-to-day program analysis and management for multiple programs. Serve as an acquisition milestone subject matter expert providing guidance to multiple ACAT … and resolutions. Participate and assist program leadership with managing efforts of large cross-functional teams to meet program milestone decision reviews. Assist new start programs with the development of risk management plans, processes, and initial risk identification. Track, manage and advise programs on the documentation required in the Adaptive Acquisition Framework Document Identification Tool (AAFDID) to support Milestone More ❯
is provided by Cornwallis Elt. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more. Base pay range Head of Quantitative Risk Analytics – Quantitative Finance, Counterparty Credit Risk, Model Development, Model Validation, RiskAnalysis, Python, R, SQL, Numerix, - City of London, Permanent A senior Quantitative Specialist is sought … after by a Global Investment Bank to take ownership of their European Counterparty Credit Risk (CRR) modelling function, as part of the wider Risk Analytics group. In this role, you will be responsible for managing the end-to-end modelling lifecycle, being responsible for methodology, model design and development, through to implementation and validation, helping support local Counterparty … Credit Risk Management. This will be a multi-functional role, with responsibility for building and maintaining the modelling infrastructure and ecosystem, as well as undertaking quantitative research to keep models up to date ensuring the business have access to accurate analytics. You will work closely with the business and other quantitative specialists for a cohesive model development process, including More ❯
performance along project lifecycle in one predictable way with clear awareness and reliable insight on cost, time and quality. In line with this the PMO is looking for an: Risk and Opportunity Manager About the job The role of Risk and Opportunity Manager is highly dynamic. In this position you are allocated to our largest and most complex … projects to provide practical support and guidance in a risk manager role. As Risk and Opportunity Manager you will be pivotal in managing and mitigating risks throughout the project lifecycle. You will lead the end-to-end riskanalysis, ensuring that both technical and financial risks are identified, prioritized, and mitigated effectively. Your expertise will help … cultivate a culture of safety and environmental responsibility, with a focus on maintaining clear communication and proactive risk management with all stakeholders. The main tasks and responsibilities are: Leading risk identification workshops with stakeholders to assess risks, their implications, likelihood, and ownership across various project stages Perform Risk Manager role in our largest and most complex projects More ❯
Potters Bar, Hertfordshire, England, United Kingdom
Canada Life
The IT Risk & Controls Analyst plays a key part in providing assurance and insight to the management of technology risks, controls and any related governance activities. The role collaborates closely with Engineering teams to ensure that all technology risks are managed effectively and in compliance with standards, providing 1st line risk management expertise. The role also plays a … Access Management (IAM) team to assist in the improvement and operation of the joiners, movers, leavers (JML) process, ensuring it is followed appropriately within the company. Provide 1st line risk management knowledge, guidance and support to all IT teams, acting as an SME in that field, helping teams manage technology risk. Collecting and analysing data on control effectiveness and … assess the impact on risk posture including: IT Risk Register Open actions resulting from audits Open security exceptions Risk and control effectiveness Act as a point of contact and SME to ensure the Risk Controls Framework is effectively rolled out across all teams, working and collaborating closely with the Engineering teams to develop and implement riskMore ❯
Operational Analysis Consultant/Operations Analyst – MOD, Defence Salary: £40,000 to £65,000 plus many benefits Location: Portsmouth, Hampshire/Bristol/Corsham, Wiltshire/Hybrid role As an Operational Analysis Consultant, you will be providing the evidence to help the UK MOD and industry make better decisions. Our client is looking for consultants with a range … skills, able to work independently or in small teams. They offer competitive salaries and packages, and the opportunity for rapid advancement for the right candidate. Essential requirements for Operational Analysis Consultant: Operational Analysis to support business decision making, policy development, and/or research, including both ‘soft’ and ‘hard’ techniques (problem structuring and modelling). Development and use … Defence industry. Strong background in MS Office, especially Excel, PowerPoint, Word. Experience in one or more of the following technical disciplines: Process and conceptual mapping (e.g. influence diagrams), Benefits analysis, Business Case Approvals Wargaming, Simulation (System Dynamics or Discrete Event Simulation), Designing and facilitating workshops (including MJPs), Historical Analysis, Knowledge of data manipulation and analysis languages (VBA More ❯
Operational Analysis Consultant/Operations Analyst – MOD, Defence Salary: £40,000 to £65,000 plus many benefits Location: Portsmouth, Hampshire/Bristol/Corsham, Wiltshire/Hybrid role As an Operational Analysis Consultant, you will be providing the evidence to help the UK MOD and industry make better decisions. Our client is looking for consultants with a range … skills, able to work independently or in small teams. They offer competitive salaries and packages, and the opportunity for rapid advancement for the right candidate. Essential requirements for Operational Analysis Consultant: Operational Analysis to support business decision making, policy development, and/or research, including both ‘soft’ and ‘hard’ techniques (problem structuring and modelling). Development and use … Defence industry. Strong background in MS Office, especially Excel, PowerPoint, Word. Experience in one or more of the following technical disciplines: Process and conceptual mapping (e.g. influence diagrams), Benefits analysis, Business Case Approvals Wargaming, Simulation (System Dynamics or Discrete Event Simulation), Designing and facilitating workshops (including MJPs), Historical Analysis, Knowledge of data manipulation and analysis languages (VBA More ❯
Operational Analysis Consultant/Operations Analyst – MOD, Defence Salary: £40,000 to £65,000 plus many benefits Location: Portsmouth, Hampshire/Bristol/Corsham, Wiltshire/Hybrid role As an Operational Analysis Consultant, you will be providing the evidence to help the UK MOD and industry make better decisions. Our client is looking for consultants with a range … skills, able to work independently or in small teams. They offer competitive salaries and packages, and the opportunity for rapid advancement for the right candidate. Essential requirements for Operational Analysis Consultant: Operational Analysis to support business decision making, policy development, and/or research, including both ‘soft’ and ‘hard’ techniques (problem structuring and modelling). Development and use … Defence industry. Strong background in MS Office, especially Excel, PowerPoint, Word. Experience in one or more of the following technical disciplines: Process and conceptual mapping (e.g. influence diagrams), Benefits analysis, Business Case Approvals Wargaming, Simulation (System Dynamics or Discrete Event Simulation), Designing and facilitating workshops (including MJPs), Historical Analysis, Knowledge of data manipulation and analysis languages (VBA More ❯
arena. Our client is passionate about innovation using leading-edge technologies to create scalable and user-centric digital solutions. Responsibilities: Focus on the delivery of 1st line security controls analysis while undertaking deep riskanalysis to identify trends and gaps. Produce and present risk reports to the senior management team, ensuring accuracy with factual information. Translate … non-technical stakeholders such as decision makers. Ensure the reports are framed in a way which reflects all compensatory controls in place. Criteria: Proven experience in technical security controls analysis across various platforms such as networks, cloud, legacy systems, and web-based applications. Proven experience in scoping and planning security testing through interpretation of architecture diagrams. Ability to prioritize … appropriate security controls to mitigate cyber security risks. Evidence of working with key stakeholders such as product owners and SMEs (Subject Matter Experts), enabling them to make well-informed risk-based decisions. A deep understanding of threats and cyber attacks using local and strategic threat information in decision-making and planning. Proven experience in MI and risk-related More ❯