Risk Analysis Job Vacancies

401 to 425 of 580 Risk Analysis Jobs

Head of Quantitative Risk Analytics

City of London, England, United Kingdom
JR United Kingdom
Social network you want to login/join with: Head of Quantitative Risk Analytics, london (city of london) col-narrow-left Client: Cornwallis Elt Location: london (city of london), United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 2 Posted: 07.06.2025 Expiry Date: 22.07.2025 col-wide Job Description: Head of Quantitative Risk Analytics – Quantitative Finance, Counterparty Credit Risk, Model Development, Model Validation, Risk Analysis, Python, R, SQL, Numerix, - City of London, Permanent A senior Quantitative Specialist is sought after by a Global Investment Bank to take ownership of their European Counterparty Credit Risk (CRR) modelling function, as part of the wider Risk Analytics group. In this … will be responsible for managing the end-to-end modelling lifecycle, being responsible for methodology, model design and development, through to implementation and validation, helping support local Counterparty Credit Risk Management. This will be a multi-functional role, with responsibility for building and maintaining the modelling infrastructure and ecosystem, as well as undertaking quantitative research to keep models up More ❯
Posted:

Head of Quantitative Risk Analytics

London, England, United Kingdom
JR United Kingdom
Social network you want to login/join with: Head of Quantitative Risk Analytics, london col-narrow-left Client: Cornwallis Elt Location: london, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 2 Posted: 07.06.2025 Expiry Date: 22.07.2025 col-wide Job Description: Head of Quantitative Risk Analytics – Quantitative Finance, Counterparty Credit Risk, Model Development, Model Validation, Risk Analysis, Python, R, SQL, Numerix, - City of London, Permanent A senior Quantitative Specialist is sought after by a Global Investment Bank to take ownership of their European Counterparty Credit Risk (CRR) modelling function, as part of the wider Risk Analytics group. In this role, you will be responsible for managing … the end-to-end modelling lifecycle, being responsible for methodology, model design and development, through to implementation and validation, helping support local Counterparty Credit Risk Management. This will be a multi-functional role, with responsibility for building and maintaining the modelling infrastructure and ecosystem, as well as undertaking quantitative research to keep models up to date ensuring the business More ❯
Posted:

Counterparty Credit Risk Officer

London, United Kingdom
Natixis NY Branch
Within the UK Risk Department, the Counterparty Credit Risk (CCR) Analyst will monitor and explain exposures under normal and stressed conditions, and contribute to enhancing the local risk framework, liaising with all the stakeholders particularly Global Market, Risk Departments, Legal, BO and IT, locally but also worldwide Main Responsibilities: Perform counterparty risk analysis on … perform first level investigation to identify potential issues and raise them to proper teams Participate in estimating and recommending appropriate trading limits taking into account notably transactions specificities, global risk assessment and risk appetite/mandate Contribute to reviewing the Counterparty Risk policies and procedures Take part in enhancements projects, act for continuous improvements, when appropriate build … POC tools Contribute to the preparation of risk committees, and reports for regulators and audit Required Skills/Qualifications/Experience Required Skills: At least 2 years of experience related to risk monitoring/management Good knowledge on financial instruments derivatives and repo, and on market and/or counterparty risk Familiar with sensitivities, VaR, stress tests More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Technical Risk Specialist

Douglas, Isle of Man, United Kingdom
Orchard Recruitment Ltd
Our leading Douglas-based Finance Sector Client is expanding its Technology, Operations and Financial Risk Team as they progress an ambitious transformation programme. They are now seeking a Technical Risk Specialist to join and play a leading role. This is an important role at the heart of their Risk Strategy. It is fundamental to providing constructive oversight … change projects are directed and controlled. This includes decision making around the Group's IT strategy, how it achieves its aims, and ensuring that all activities undertaken are within risk appetite and comply with legal, ethical and regulatory requirements, with the overall goal of ensuring that the Group is protected from internal and external risk as far as … possible. The Technical Risk Specialist will be responsible for: Providing strategic and tactical direction and consultation on IT risks and compliance for key strategic projects Constructively overseeing, challenging and validating risk assessments, providing Line 2 opinion to key governance bodies Developing processes and procedures for overseeing, challenging and validating IT risk governance, including control effectiveness reviews, Line More ❯
Employment Type: Permanent
Salary: £55000 - £70000/annum Plus benefits package
Posted:

Cybersecurity Analyst - Omaha, NE; Must have an active Secret C with Security Clearance

Omaha, Nebraska, United States
Synertex LLC
Upon Award Join Synertex and bring your expertise to a mission that matters. We're looking for a Cybersecurity Analyst with a background in cybersecurity compliance, threat hunting, and risk analysis to support critical defense and Air Force initiatives. If you're passionate about protecting cyber environments and ensuring mission readiness and thrive in a collaborative, high-impact … applicable Security Technical Implementation Guides (STIGs) Schedule and implement STIGs across systems Monitor and execute quarterly revalidation schedules Track and respond to emerging changes to applicable STIGs Conduct cybersecurity risk analysis and threat hunting Brief 557 WW leadership on Cybersecurity updates Prepare and conduct biweekly Cybersecurity Update meetings Meet with stakeholders to facilitate Cybersecurity collaboration Monitor cybersecurity risk … years of demonstrated experience in Air Force or industry standards for Cyber Security Experience with Endpoint Security Knowledge of Assured Compliance Assessment Solution (ACAS) Skills in Threat Hunting and Risk Analysis Experience with Intrusion Detection Systems Proficiency with DISA STIGs Join a mission-driven team advancing U.S. Air Force cybersecurity resilience and cloud modernization. Apply today and become More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Credit Portfolio Assistant – Fluent Mandarin

Slough, England, United Kingdom
JR United Kingdom
Minimise the Bank’s credit-related losses by monitoring and analysing the loan portfolio and identifying early warning signals. To achieve the objectives at the portfolio levels while considering risk tolerance, return expectations, and market conditions. Ensure timely delivery and accuracy of internal and external report. Produce reports both in Chinese and English. Assist the Head/Deputy Head … the credit portfolio to identify important message/early warning signals of distress or deteriorating credit quality by tracking and analysing the repayment patterns, financial covenants, internal rating, country risk, large exposure, and other changes related to credit risk. Credit risk control reporting and analysis: prepare regular reports/MI pack to the Management, committees, Head Office … regulators and other relevant stakeholders, providing updates and analysis on credit risk exposure, risk appetite metrics, and other indicators to reflect the effectiveness of risk management strategies. Credit risk control: including limit reservations for derivatives and money market, and etc. Credit Risk Analysis: Evaluate the credit risk impact to the Bank’s More ❯
Posted:

Cost Analyst is in Chantilly requires CI Poly with Security Clearance

Chantilly, Virginia, United States
StellarPeak Corp
Python and/or R for regression and classification data is preferred here • SQL database query skills are beneficial • Natural Language Processing (NLP) for text search/matching and analysis, since a lot of the contract data and deliverables are text-based • Another useful skillset is importing/exporting data to Excel using Python or R, as well as … years' experience with a Bachelor's Degree • Apply principles, theories and methods of cost estimation to complex Government acquisitions • Develop cost estimating relationships through the application of advanced statistical analysis techniques • Ability to collect and normalize data and design cost estimating methods and models • Develop life-cycle cost estimates using a variety of methods (e.g. parametric, analogy, etc) • Experience … leading life-cycle cost estimates for major system acquisitions • Ability to identify key cost and technical risk areas, and translate the risk areas into program cost impacts • Proficient with the application of Monte Carlo simulation techniques • TS/SCI clearance Desired: • Master's Degree in Engineering, Physics, Operations Research, Cost Analysis, Mathematics, Finance, Economics, Business Administration or More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Specialist

Brussel, Belgium
HeadMind Partners
Secure, and Value our clients' digital strategies. Within a community of more than 1500 experts, you will develop a recognized and technical expertise to support the security and digital risk management of our clients in various sectors. The ideal candidate has a first understanding of cybersecurity standards and certifications. Objectives of this role Take the lead in day-to … systems for remaining ahead of cybercriminals Maintain documentation of security guidelines, procedures, standards, and controls Maintain knowledge of current cybercrime tactics Responsibilities Collect data on current security measures for risk analysis, and write systems status reports regularly Monitor constantly for attacks and run appropriate defensive protocols if a breach occurs Conduct testing to identify vulnerabilities, and collaborate with … . Ability to work successfully in both individual and team settings You have a first overview of the fundamentals of cybersecurity in terms of audit methodologies and/or risk analysis methodologies. More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Project Manager

Derby, Derbyshire, United Kingdom
Hybrid / WFH Options
Alexander Mann Solutions - Contingency
insights in a change/transformation environment and presenting to stakeholders. As a Project Manager, your primary responsibilities will include: Supporting the Integrated Project Team with the generation and analysis Project data, and by performing analysis such as critical path, schedule risk analysis and Earned Value variance root cause analysis. Liaising with other internal areas. Presenting … data and insight analytics to stakeholders. Supporting Senior Project Managers on the project. Ensuring contractual and programme baseline control management is adopted. Monthly collation and analysis of finance data such as schedule derived Estimates To Complete. Breakdown Structures to ensure effective cost and schedule reporting. Support to the Programme Risk & Opportunity Management Process with risk identification, documentation … and risk analysis, including the tracking of mitigation and capture plans within the IMS as required. To be successful as a Project Manager, you will need to meet the following criteria: Strong MS Excel skills, using pivot tables and V-Lookups. Have experience with programme management and delivery. Able to gather, analyse and present data and insights. Experience More ❯
Employment Type: Contract
Posted:

Project Lead

Derby, Derbyshire, East Midlands, United Kingdom
Hybrid / WFH Options
AMS CWS
insights in a change/transformation environment and presenting to stakeholders. As a Project Lead, your primary responsibilities will include: Supporting the Integrated Project Team with the generation and analysis Project data, and by performing analysis such as critical path, schedule risk analysis and Earned Value variance root cause analysis. Liaising with other internal areas. Presenting … data and insight analytics to stakeholders. Supporting Senior Project Managers on the project. Ensuring contractual and programme baseline control management is adopted. Monthly collation and analysis of finance data such as schedule derived Estimates To Complete. Breakdown Structures to ensure effective cost and schedule reporting. Support to the Programme Risk & Opportunity Management Process with risk identification, documentation … and risk analysis, including the tracking of mitigation and capture plans within the IMS as required. To be successful as a Project Lead, you will need to meet the following criteria: Strong MS Excel skills, using pivot tables and V-Lookups. Have experience with programme management and delivery. Able to gather, analyse and present data and insights. Experience More ❯
Employment Type: Contract, Work From Home
Posted:

Cyber Security Consultant

Crawley, England, United Kingdom
Thales
Our technologies and services help banks exchange funds, enable cross-border movement, make energy smarter, and more. Over 30,000 organizations trust us for identity verification, access control, data analysis, and encryption. We offer opportunities for employees to develop their careers, with flexible working arrangements to support personal well-being and lifestyle. Role Overview Are you a seasoned cyber … digital security, supporting banks, governments, and industries worldwide. Our Cyber Security Consultants deploy and implement data security solutions in customer environments, evaluating security configurations, and advising on cybersecurity and risk management. This role is highly technical and customer-facing, involving installation, configuration, and support of our security products, primarily focusing on IT security, encryption, and key management. Key Responsibilities … Conduct cybersecurity audits and consulting (architecture reviews, best practices, compliance) Perform risk assessments and define cybersecurity governance strategies and policies Advise on security enhancements and perform security risk analysis Assist in integrating security standards and executing cybersecurity projects Analyze client needs to recommend appropriate security solutions Ensure compliance with regulations (PCI DSS, NIST, ISO 27000, Privacy) Develop More ❯
Posted:

Hypercare Analyst

United Kingdom
Hybrid / WFH Options
Hard Rock Digital
will play a critical role in safeguarding and optimizing the performance of our highest-staking customer accounts. This position is responsible for the trading, continuous monitoring, and in-depth analysis of high-impact accounts, ensuring proactive management of individual customer behavior. By evaluating behavioral patterns, identifying significant changes, and providing actionable recommendations, this role will support the development of … opportunities. Provide ongoing evaluation of individual customer performance, highlighting any significant changes in staking patterns, frequency, or other relevant behaviors. Analyze and report on key account metrics, including profitability, risk exposure, and customer lifecycle trends. Trade high-stakes accounts with precision, ensuring profitability while managing exposure to risk. Collaborate with trading teams to adjust pricing or betting limits based … on customer profiles and behavioral insights. Work with stakeholders to develop tailored strategies for high-impact accounts based on analysis and business objectives. Deliver detailed reports on high-stakes customer performance, providing actionable insights for internal teams. Escalate concerns about suspicious behavior, unusual activity, or emerging trends that may pose a risk to the business. Present findings and More ❯
Posted:

Hypercare Analyst

London, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
will play a critical role in safeguarding and optimizing the performance of our highest-staking customer accounts. This position is responsible for the trading, continuous monitoring, and in-depth analysis of high-impact accounts, ensuring proactive management of individual customer behavior. By evaluating behavioral patterns, identifying significant changes, and providing actionable recommendations, this role will support the development of … opportunities. Provide ongoing evaluation of individual customer performance, highlighting any significant changes in staking patterns, frequency, or other relevant behaviors. Analyze and report on key account metrics, including profitability, risk exposure, and customer lifecycle trends. Trade high-stakes accounts with precision, ensuring profitability while managing exposure to risk. Collaborate with trading teams to adjust pricing or betting limits based … on customer profiles and behavioral insights. Work with stakeholders to develop tailored strategies for high-impact accounts based on analysis and business objectives. Deliver detailed reports on high-stakes customer performance, providing actionable insights for internal teams. Escalate concerns about suspicious behavior, unusual activity, or emerging trends that may pose a risk to the business. Present findings and More ❯
Posted:

All Source Analyst with Security Clearance

Arlington, Virginia, United States
K2 Group, Inc
tactics, and capabilities of adversarial organizations to develop threat characterization. Identify information requirements, develop assessment strategies and collection plans, identify information sources, and develop and conduct Open Source research, analysis, and fusion of relevant information to emulate adversarial planning capabilities. Characterize systems and conduct nodal analysis, identify essential functions/tasks and critical assets necessary to perform them … other environmental characteristics on course of action development. Support field assessments from an adversary perspective. Synthesize findings to support vulnerability identification, course of action development, protection studies, trend analyses, risk analysis, and mitigation strategies. Develop a comprehensive understanding of the implications of vulnerabilities discovered by the other specialists and fuse those findings with the systems analysis and … to the national and military missions they support. Prepare activity reports including out briefs, Senior Leader briefs, Interim progress reports and briefs, white papers, After Action Reviews, Final Reports, Risk Analysis reports, and other documents necessary to convey assessment findings to customers, partners, and other stakeholders. Required Experience: 10 years demonstrated expertise performing information/data collection, analysis More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Information Assurance Analyst with Security Clearance

Nebraska, United States
K2 Group, Inc
This role is critical to ensuring cybersecurity compliance, implementing DISA Security Technical Implementation Guides (STIGs), and helping transition to a cloud environment while mitigating cybersecurity risks. Duties: Conduct testing, analysis, and implementation of applicable DISA STIGs. Track and execute quarterly revalidation schedules for STIGs. Monitor for emerging STIG updates and initiate timely application. Support cyber readiness through stakeholder engagement … and leadership briefings. Facilitate and prepare for biweekly Cybersecurity Update meetings. Provide ongoing cybersecurity risk/threat monitoring across the 557 WW cyber environment. Assist in planning and execution of the 557 WW's transition to a secure cloud infrastructure. Basic Qualifications: A minimum of 5 years of relevant experience in Air Force or industry standards for Cyber Security … System Architecture and Engineering (IASAE) Level II certification IAW DoDM 8140.03 and DAFMAN 17-1305 Knowledge of the following: Endpoint Security Assured Compliance Assessment Solution (ACAS) Threat Hunting and Risk Analysis Intrusion Detection System DISA STIG Security Clearance Requirements: Current Secret Clearance Benefits: K2 Group's benefit offerings include: Medical/Dental/Vision Insurance; FSA Medical & FSA More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Vice President, Auditor (AppTech)

Manchester, Lancashire, United Kingdom
NACBA
for institutions, corporations, and high-net-worth individuals. Description: An exciting opportunity has arisen for an Application Technology Auditor to join our team, focusing on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead audit engagements as an Auditor-in-Charge, executing the audit lifecycle in accordance with internal policies, methodologies, and standards. The role involves … controls and processes, including interface testing (ODBC, FTP, NDM, MQ), application controls (Segregation of Duties, validation, calculations), and output controls (C&A). Understand business processes through flowcharting, workpapers, analysis, and discussions with stakeholders. Apply knowledge of audits, financial controls, regulations, and technology to identify risks and educate the audit team. Query stakeholders to understand processes and controls. Perform … research and utilize statistical sampling and risk analysis skills. Engage in continuous monitoring activities, applying knowledge of financial institutions and regulations. Analyze business processes and issues, and communicate findings effectively. Build relationships with team members and clients, explaining audit processes and findings clearly. Identify and escalate potential issues promptly. Explain complex technical issues to non-technical audiences and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Personnel Security Specialist-FBI Support Services (Senior level with Security Clearance

Washington, Washington DC, United States
ISN Corporation
hostile intelligence individuals, organizations, or persons of known or suspected questionable character, or fragments of information which furnish reason to sustain suspicion that the subject could be a security risk and/or significant target for coercion. Conducts critical analysis of incoming material/correspondence outlining possible serious and/or very sensitive security concerns relating to the … correspondence to appropriate FO(s) for initiation of an investigation. Provides detailed outlines of background of individual case and information developed from extensive initial research and of the subsequent analysis of same. Defines security vulnerabilities, set forth specific recommendations for the initiation of investigations, recommend leads which are to be addressed and followed, and advise of any restricting regulations … may hamper the investigation. Coordinates with FBI Divisions on foreign nexus/concerns to exploit intelligence for the purpose of making adjudicative determination recommendations. Provides an in-depth, high-risk analysis of high risk (potentially serious or high impact) investigations so that the Government lead can make a security and suitability determination. Evaluates reports of investigations, personnel More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Software Developer Backend (m/f/d)

Duisburg, Nordrhein-Westfalen, Germany
Hybrid / WFH Options
TARGOBANK AG
training as an IT specialist Experience in conceptual design of software and tuning options with practice of database modelling Experience with complex SQL queries as well as database performance analysis and optimization Confident handling of database management systems, preferably DB2 and the associated database languages and tools Knowledge of the structures in TWS/OPC for setting up automated … batch processes Prooved experience in IT project management, i.e. IT process risk analysis, requirements analysis + business client communication Analytical and strategic thinking Systematic, methodical and solution-oriented approach Good English language skills, preferably also some French language skills, good German is an advantage Collaboration with international colleagues on challenging IT projects Analyze and expand existing software … training as an IT specialist Experience in conceptual design of software and tuning options with practice of database modelling Experience with complex SQL queries as well as database performance analysis and optimization Confident handling of database management systems, preferably DB2 and the associated database languages and tools Knowledge of the structures in TWS/OPC for setting up automated More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Threat Hunt Analyst with Security Clearance

Ashburn, Virginia, United States
Gray Tier LLC
threat hypotheses • Proactively and iteratively search through systems and networks to detect advanced threats • Analyze host, network, and application logs in addition to malware and code • Prepare and report risk analysis and threat findings to appropriate stakeholders • Create, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows … CBP personnel must have a current or be able to favorably pass a 5 year background investigation (BI). • Experience in the areas of incident detection and response, malware analysis, or computer forensics. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Assurance Analyst - Omaha, NE; Must have an active with Security Clearance

Omaha, Nebraska, United States
Synertex LLC
artifacts for each step in the RMF process Support development and transition of cybersecurity policies for cloud environments Assist in the development of Tactics, Techniques, and Procedures that include risk analysis and threat hunting Support the enforcement of a Wing-wide cybersecurity program Assist with the development and maintenance of IT compliance checklists and processes REQUIREMENTS Active Secret … security clearance 5+ years of demonstrated experience with Air Force Information Assurance and system accreditation Knowledge of AFI Series 33 Experience with Risk Management Framework Proficiency with eMASS accreditation system Familiarity with all specified DISA STIGs Information Assurance Technical Level II certified IAW DoDM 8140.03 and DAFMAN 17-1305 Join a mission-driven team advancing U.S. Air Force cybersecurity More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Application Security Architect

Stevenage, England, United Kingdom
JR United Kingdom
including threat modeling, secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through analysis, code review, and testing. Collaborate to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Qualifications: Proven experience in application … security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies like STRIDE and risk analysis. Hands-on experience with SAST/DAST/IAST tools such as Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern architectures. Relevant certifications like CSSLP, OSWE, GWAPT More ❯
Posted:

Application Security Architect

Stoke-on-Trent, England, United Kingdom
JR United Kingdom
including threat modeling, secure coding, design reviews, and architecture assessments. Lead DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual review, and testing. Collaborate to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Requirements: Proven experience in application … security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methods like STRIDE and architectural risk analysis. Hands-on experience with SAST/DAST/IAST tools such as Snyk, SonarQube, Burp Suite, Veracode. Strong understanding of cloud platforms and modern development architectures. Relevant certifications such as CSSLP More ❯
Posted:

Software Developer with Security Clearance

Lexington, Massachusetts, United States
Hybrid / WFH Options
Encode
Lexington, MA Job Description: The Software Engineer will be responsible for full lifecycle application development, including designing, coding, and debugging applications in various software languages. The role includes software analysis, requirements analysis, code review, system risk analysis, and software reliability analysis. The candidate will engage in object-oriented design and analysis (OOA/OOD), software … the team to provide solutions - Software Documentation Background & Responsibilities: The Software Engineer will support the research and development of large-scale open architecture distributed/cloud-based data processing, analysis, and Artificial Intelligence (AI) projects utilizing agile development methodology. The candidate will collaborate with technical staff to implement software architecture, perform coding, integration, and testing. Responsibilities include: - Supporting the More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Data Modeller

Manchester, Lancashire, United Kingdom
Square One Resources
pivotal role in shaping data-driven strategies by building robust models, dashboards, and analytical frameworks that inform executive-level decisions. You'll collaborate closely with senior stakeholders across finance, risk, and technology, translating complex data into actionable insights. Job Responsibilities/Objectives Develop and maintain advanced data models to support strategic planning, risk analysis, and financial forecasting. … the following: Experience in consulting, banking, corporate strategy, or a similar analytical role. Proven ability to work with senior stakeholders and communicate complex ideas clearly. Experience in finance or risk analytics is a plus. Advanced Excel (including VBA) Power BI and Power Query SQL for data extraction and manipulation Python (preferred but not required) If you are interested in More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Architect

Belgium
XPLUS
role and a proven track record of at least 10 years in IT within a large organization: Understanding of the enterprise's business and organizational needs Experience in security risk assessments, risk analysis, audits, mitigation plan development Experience in IT architecture methodologies and structured security architecture methodologies Experience in authentication, identity management, cryptography, security protocols and similar More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:
Risk Analysis
10th Percentile
£41,750
25th Percentile
£45,000
Median
£62,500
75th Percentile
£77,500
90th Percentile
£117,250