Social network you want to login/join with: Head of Quantitative Risk Analytics, london (city of london) col-narrow-left Client: Cornwallis Elt Location: london (city of london), United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 2 Posted: 07.06.2025 Expiry Date: 22.07.2025 col-wide Job Description: Head of Quantitative Risk Analytics – Quantitative Finance, Counterparty Credit Risk, Model Development, Model Validation, RiskAnalysis, Python, R, SQL, Numerix, - City of London, Permanent A senior Quantitative Specialist is sought after by a Global Investment Bank to take ownership of their European Counterparty Credit Risk (CRR) modelling function, as part of the wider Risk Analytics group. In this … will be responsible for managing the end-to-end modelling lifecycle, being responsible for methodology, model design and development, through to implementation and validation, helping support local Counterparty Credit Risk Management. This will be a multi-functional role, with responsibility for building and maintaining the modelling infrastructure and ecosystem, as well as undertaking quantitative research to keep models up More ❯
Social network you want to login/join with: Head of Quantitative Risk Analytics, london col-narrow-left Client: Cornwallis Elt Location: london, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 2 Posted: 07.06.2025 Expiry Date: 22.07.2025 col-wide Job Description: Head of Quantitative Risk Analytics – Quantitative Finance, Counterparty Credit Risk, Model Development, Model Validation, RiskAnalysis, Python, R, SQL, Numerix, - City of London, Permanent A senior Quantitative Specialist is sought after by a Global Investment Bank to take ownership of their European Counterparty Credit Risk (CRR) modelling function, as part of the wider Risk Analytics group. In this role, you will be responsible for managing … the end-to-end modelling lifecycle, being responsible for methodology, model design and development, through to implementation and validation, helping support local Counterparty Credit Risk Management. This will be a multi-functional role, with responsibility for building and maintaining the modelling infrastructure and ecosystem, as well as undertaking quantitative research to keep models up to date ensuring the business More ❯
Within the UK Risk Department, the Counterparty Credit Risk (CCR) Analyst will monitor and explain exposures under normal and stressed conditions, and contribute to enhancing the local risk framework, liaising with all the stakeholders particularly Global Market, Risk Departments, Legal, BO and IT, locally but also worldwide Main Responsibilities: Perform counterparty riskanalysis on … perform first level investigation to identify potential issues and raise them to proper teams Participate in estimating and recommending appropriate trading limits taking into account notably transactions specificities, global risk assessment and risk appetite/mandate Contribute to reviewing the Counterparty Risk policies and procedures Take part in enhancements projects, act for continuous improvements, when appropriate build … POC tools Contribute to the preparation of risk committees, and reports for regulators and audit Required Skills/Qualifications/Experience Required Skills: At least 2 years of experience related to risk monitoring/management Good knowledge on financial instruments derivatives and repo, and on market and/or counterparty risk Familiar with sensitivities, VaR, stress tests More ❯
Our leading Douglas-based Finance Sector Client is expanding its Technology, Operations and Financial Risk Team as they progress an ambitious transformation programme. They are now seeking a Technical Risk Specialist to join and play a leading role. This is an important role at the heart of their Risk Strategy. It is fundamental to providing constructive oversight … change projects are directed and controlled. This includes decision making around the Group's IT strategy, how it achieves its aims, and ensuring that all activities undertaken are within risk appetite and comply with legal, ethical and regulatory requirements, with the overall goal of ensuring that the Group is protected from internal and external risk as far as … possible. The Technical Risk Specialist will be responsible for: Providing strategic and tactical direction and consultation on IT risks and compliance for key strategic projects Constructively overseeing, challenging and validating risk assessments, providing Line 2 opinion to key governance bodies Developing processes and procedures for overseeing, challenging and validating IT risk governance, including control effectiveness reviews, Line More ❯
Employment Type: Permanent
Salary: £55000 - £70000/annum Plus benefits package
Upon Award Join Synertex and bring your expertise to a mission that matters. We're looking for a Cybersecurity Analyst with a background in cybersecurity compliance, threat hunting, and riskanalysis to support critical defense and Air Force initiatives. If you're passionate about protecting cyber environments and ensuring mission readiness and thrive in a collaborative, high-impact … applicable Security Technical Implementation Guides (STIGs) Schedule and implement STIGs across systems Monitor and execute quarterly revalidation schedules Track and respond to emerging changes to applicable STIGs Conduct cybersecurity riskanalysis and threat hunting Brief 557 WW leadership on Cybersecurity updates Prepare and conduct biweekly Cybersecurity Update meetings Meet with stakeholders to facilitate Cybersecurity collaboration Monitor cybersecurity risk … years of demonstrated experience in Air Force or industry standards for Cyber Security Experience with Endpoint Security Knowledge of Assured Compliance Assessment Solution (ACAS) Skills in Threat Hunting and RiskAnalysis Experience with Intrusion Detection Systems Proficiency with DISA STIGs Join a mission-driven team advancing U.S. Air Force cybersecurity resilience and cloud modernization. Apply today and become More ❯
Minimise the Bank’s credit-related losses by monitoring and analysing the loan portfolio and identifying early warning signals. To achieve the objectives at the portfolio levels while considering risk tolerance, return expectations, and market conditions. Ensure timely delivery and accuracy of internal and external report. Produce reports both in Chinese and English. Assist the Head/Deputy Head … the credit portfolio to identify important message/early warning signals of distress or deteriorating credit quality by tracking and analysing the repayment patterns, financial covenants, internal rating, country risk, large exposure, and other changes related to credit risk. Credit risk control reporting and analysis: prepare regular reports/MI pack to the Management, committees, Head Office … regulators and other relevant stakeholders, providing updates and analysis on credit risk exposure, risk appetite metrics, and other indicators to reflect the effectiveness of risk management strategies. Credit risk control: including limit reservations for derivatives and money market, and etc. Credit RiskAnalysis: Evaluate the credit risk impact to the Bank’s More ❯
Python and/or R for regression and classification data is preferred here • SQL database query skills are beneficial • Natural Language Processing (NLP) for text search/matching and analysis, since a lot of the contract data and deliverables are text-based • Another useful skillset is importing/exporting data to Excel using Python or R, as well as … years' experience with a Bachelor's Degree • Apply principles, theories and methods of cost estimation to complex Government acquisitions • Develop cost estimating relationships through the application of advanced statistical analysis techniques • Ability to collect and normalize data and design cost estimating methods and models • Develop life-cycle cost estimates using a variety of methods (e.g. parametric, analogy, etc) • Experience … leading life-cycle cost estimates for major system acquisitions • Ability to identify key cost and technical risk areas, and translate the risk areas into program cost impacts • Proficient with the application of Monte Carlo simulation techniques • TS/SCI clearance Desired: • Master's Degree in Engineering, Physics, Operations Research, Cost Analysis, Mathematics, Finance, Economics, Business Administration or More ❯
Secure, and Value our clients' digital strategies. Within a community of more than 1500 experts, you will develop a recognized and technical expertise to support the security and digital risk management of our clients in various sectors. The ideal candidate has a first understanding of cybersecurity standards and certifications. Objectives of this role Take the lead in day-to … systems for remaining ahead of cybercriminals Maintain documentation of security guidelines, procedures, standards, and controls Maintain knowledge of current cybercrime tactics Responsibilities Collect data on current security measures for riskanalysis, and write systems status reports regularly Monitor constantly for attacks and run appropriate defensive protocols if a breach occurs Conduct testing to identify vulnerabilities, and collaborate with … . Ability to work successfully in both individual and team settings You have a first overview of the fundamentals of cybersecurity in terms of audit methodologies and/or riskanalysis methodologies. More ❯
Derby, Derbyshire, United Kingdom Hybrid / WFH Options
Alexander Mann Solutions - Contingency
insights in a change/transformation environment and presenting to stakeholders. As a Project Manager, your primary responsibilities will include: Supporting the Integrated Project Team with the generation and analysis Project data, and by performing analysis such as critical path, schedule riskanalysis and Earned Value variance root cause analysis. Liaising with other internal areas. Presenting … data and insight analytics to stakeholders. Supporting Senior Project Managers on the project. Ensuring contractual and programme baseline control management is adopted. Monthly collation and analysis of finance data such as schedule derived Estimates To Complete. Breakdown Structures to ensure effective cost and schedule reporting. Support to the Programme Risk & Opportunity Management Process with risk identification, documentation … and riskanalysis, including the tracking of mitigation and capture plans within the IMS as required. To be successful as a Project Manager, you will need to meet the following criteria: Strong MS Excel skills, using pivot tables and V-Lookups. Have experience with programme management and delivery. Able to gather, analyse and present data and insights. Experience More ❯
Derby, Derbyshire, East Midlands, United Kingdom Hybrid / WFH Options
AMS CWS
insights in a change/transformation environment and presenting to stakeholders. As a Project Lead, your primary responsibilities will include: Supporting the Integrated Project Team with the generation and analysis Project data, and by performing analysis such as critical path, schedule riskanalysis and Earned Value variance root cause analysis. Liaising with other internal areas. Presenting … data and insight analytics to stakeholders. Supporting Senior Project Managers on the project. Ensuring contractual and programme baseline control management is adopted. Monthly collation and analysis of finance data such as schedule derived Estimates To Complete. Breakdown Structures to ensure effective cost and schedule reporting. Support to the Programme Risk & Opportunity Management Process with risk identification, documentation … and riskanalysis, including the tracking of mitigation and capture plans within the IMS as required. To be successful as a Project Lead, you will need to meet the following criteria: Strong MS Excel skills, using pivot tables and V-Lookups. Have experience with programme management and delivery. Able to gather, analyse and present data and insights. Experience More ❯
Our technologies and services help banks exchange funds, enable cross-border movement, make energy smarter, and more. Over 30,000 organizations trust us for identity verification, access control, data analysis, and encryption. We offer opportunities for employees to develop their careers, with flexible working arrangements to support personal well-being and lifestyle. Role Overview Are you a seasoned cyber … digital security, supporting banks, governments, and industries worldwide. Our Cyber Security Consultants deploy and implement data security solutions in customer environments, evaluating security configurations, and advising on cybersecurity and risk management. This role is highly technical and customer-facing, involving installation, configuration, and support of our security products, primarily focusing on IT security, encryption, and key management. Key Responsibilities … Conduct cybersecurity audits and consulting (architecture reviews, best practices, compliance) Perform risk assessments and define cybersecurity governance strategies and policies Advise on security enhancements and perform security riskanalysis Assist in integrating security standards and executing cybersecurity projects Analyze client needs to recommend appropriate security solutions Ensure compliance with regulations (PCI DSS, NIST, ISO 27000, Privacy) Develop More ❯
will play a critical role in safeguarding and optimizing the performance of our highest-staking customer accounts. This position is responsible for the trading, continuous monitoring, and in-depth analysis of high-impact accounts, ensuring proactive management of individual customer behavior. By evaluating behavioral patterns, identifying significant changes, and providing actionable recommendations, this role will support the development of … opportunities. Provide ongoing evaluation of individual customer performance, highlighting any significant changes in staking patterns, frequency, or other relevant behaviors. Analyze and report on key account metrics, including profitability, risk exposure, and customer lifecycle trends. Trade high-stakes accounts with precision, ensuring profitability while managing exposure to risk. Collaborate with trading teams to adjust pricing or betting limits based … on customer profiles and behavioral insights. Work with stakeholders to develop tailored strategies for high-impact accounts based on analysis and business objectives. Deliver detailed reports on high-stakes customer performance, providing actionable insights for internal teams. Escalate concerns about suspicious behavior, unusual activity, or emerging trends that may pose a risk to the business. Present findings and More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
will play a critical role in safeguarding and optimizing the performance of our highest-staking customer accounts. This position is responsible for the trading, continuous monitoring, and in-depth analysis of high-impact accounts, ensuring proactive management of individual customer behavior. By evaluating behavioral patterns, identifying significant changes, and providing actionable recommendations, this role will support the development of … opportunities. Provide ongoing evaluation of individual customer performance, highlighting any significant changes in staking patterns, frequency, or other relevant behaviors. Analyze and report on key account metrics, including profitability, risk exposure, and customer lifecycle trends. Trade high-stakes accounts with precision, ensuring profitability while managing exposure to risk. Collaborate with trading teams to adjust pricing or betting limits based … on customer profiles and behavioral insights. Work with stakeholders to develop tailored strategies for high-impact accounts based on analysis and business objectives. Deliver detailed reports on high-stakes customer performance, providing actionable insights for internal teams. Escalate concerns about suspicious behavior, unusual activity, or emerging trends that may pose a risk to the business. Present findings and More ❯
tactics, and capabilities of adversarial organizations to develop threat characterization. Identify information requirements, develop assessment strategies and collection plans, identify information sources, and develop and conduct Open Source research, analysis, and fusion of relevant information to emulate adversarial planning capabilities. Characterize systems and conduct nodal analysis, identify essential functions/tasks and critical assets necessary to perform them … other environmental characteristics on course of action development. Support field assessments from an adversary perspective. Synthesize findings to support vulnerability identification, course of action development, protection studies, trend analyses, riskanalysis, and mitigation strategies. Develop a comprehensive understanding of the implications of vulnerabilities discovered by the other specialists and fuse those findings with the systems analysis and … to the national and military missions they support. Prepare activity reports including out briefs, Senior Leader briefs, Interim progress reports and briefs, white papers, After Action Reviews, Final Reports, RiskAnalysis reports, and other documents necessary to convey assessment findings to customers, partners, and other stakeholders. Required Experience: 10 years demonstrated expertise performing information/data collection, analysisMore ❯
This role is critical to ensuring cybersecurity compliance, implementing DISA Security Technical Implementation Guides (STIGs), and helping transition to a cloud environment while mitigating cybersecurity risks. Duties: Conduct testing, analysis, and implementation of applicable DISA STIGs. Track and execute quarterly revalidation schedules for STIGs. Monitor for emerging STIG updates and initiate timely application. Support cyber readiness through stakeholder engagement … and leadership briefings. Facilitate and prepare for biweekly Cybersecurity Update meetings. Provide ongoing cybersecurity risk/threat monitoring across the 557 WW cyber environment. Assist in planning and execution of the 557 WW's transition to a secure cloud infrastructure. Basic Qualifications: A minimum of 5 years of relevant experience in Air Force or industry standards for Cyber Security … System Architecture and Engineering (IASAE) Level II certification IAW DoDM 8140.03 and DAFMAN 17-1305 Knowledge of the following: Endpoint Security Assured Compliance Assessment Solution (ACAS) Threat Hunting and RiskAnalysis Intrusion Detection System DISA STIG Security Clearance Requirements: Current Secret Clearance Benefits: K2 Group's benefit offerings include: Medical/Dental/Vision Insurance; FSA Medical & FSA More ❯
for institutions, corporations, and high-net-worth individuals. Description: An exciting opportunity has arisen for an Application Technology Auditor to join our team, focusing on technology supporting Finance and Risk & Compliance processes. The successful candidate will lead audit engagements as an Auditor-in-Charge, executing the audit lifecycle in accordance with internal policies, methodologies, and standards. The role involves … controls and processes, including interface testing (ODBC, FTP, NDM, MQ), application controls (Segregation of Duties, validation, calculations), and output controls (C&A). Understand business processes through flowcharting, workpapers, analysis, and discussions with stakeholders. Apply knowledge of audits, financial controls, regulations, and technology to identify risks and educate the audit team. Query stakeholders to understand processes and controls. Perform … research and utilize statistical sampling and riskanalysis skills. Engage in continuous monitoring activities, applying knowledge of financial institutions and regulations. Analyze business processes and issues, and communicate findings effectively. Build relationships with team members and clients, explaining audit processes and findings clearly. Identify and escalate potential issues promptly. Explain complex technical issues to non-technical audiences and More ❯
hostile intelligence individuals, organizations, or persons of known or suspected questionable character, or fragments of information which furnish reason to sustain suspicion that the subject could be a security risk and/or significant target for coercion. Conducts critical analysis of incoming material/correspondence outlining possible serious and/or very sensitive security concerns relating to the … correspondence to appropriate FO(s) for initiation of an investigation. Provides detailed outlines of background of individual case and information developed from extensive initial research and of the subsequent analysis of same. Defines security vulnerabilities, set forth specific recommendations for the initiation of investigations, recommend leads which are to be addressed and followed, and advise of any restricting regulations … may hamper the investigation. Coordinates with FBI Divisions on foreign nexus/concerns to exploit intelligence for the purpose of making adjudicative determination recommendations. Provides an in-depth, high-riskanalysis of high risk (potentially serious or high impact) investigations so that the Government lead can make a security and suitability determination. Evaluates reports of investigations, personnel More ❯
training as an IT specialist Experience in conceptual design of software and tuning options with practice of database modelling Experience with complex SQL queries as well as database performance analysis and optimization Confident handling of database management systems, preferably DB2 and the associated database languages and tools Knowledge of the structures in TWS/OPC for setting up automated … batch processes Prooved experience in IT project management, i.e. IT process riskanalysis, requirements analysis + business client communication Analytical and strategic thinking Systematic, methodical and solution-oriented approach Good English language skills, preferably also some French language skills, good German is an advantage Collaboration with international colleagues on challenging IT projects Analyze and expand existing software … training as an IT specialist Experience in conceptual design of software and tuning options with practice of database modelling Experience with complex SQL queries as well as database performance analysis and optimization Confident handling of database management systems, preferably DB2 and the associated database languages and tools Knowledge of the structures in TWS/OPC for setting up automated More ❯
threat hypotheses • Proactively and iteratively search through systems and networks to detect advanced threats • Analyze host, network, and application logs in addition to malware and code • Prepare and report riskanalysis and threat findings to appropriate stakeholders • Create, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows … CBP personnel must have a current or be able to favorably pass a 5 year background investigation (BI). • Experience in the areas of incident detection and response, malware analysis, or computer forensics. More ❯
artifacts for each step in the RMF process Support development and transition of cybersecurity policies for cloud environments Assist in the development of Tactics, Techniques, and Procedures that include riskanalysis and threat hunting Support the enforcement of a Wing-wide cybersecurity program Assist with the development and maintenance of IT compliance checklists and processes REQUIREMENTS Active Secret … security clearance 5+ years of demonstrated experience with Air Force Information Assurance and system accreditation Knowledge of AFI Series 33 Experience with Risk Management Framework Proficiency with eMASS accreditation system Familiarity with all specified DISA STIGs Information Assurance Technical Level II certified IAW DoDM 8140.03 and DAFMAN 17-1305 Join a mission-driven team advancing U.S. Air Force cybersecurity More ❯
including threat modeling, secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through analysis, code review, and testing. Collaborate to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Qualifications: Proven experience in application … security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies like STRIDE and risk analysis. Hands-on experience with SAST/DAST/IAST tools such as Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms and modern architectures. Relevant certifications like CSSLP, OSWE, GWAPT More ❯
including threat modeling, secure coding, design reviews, and architecture assessments. Lead DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/dynamic analysis, manual review, and testing. Collaborate to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Requirements: Proven experience in application … security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methods like STRIDE and architectural risk analysis. Hands-on experience with SAST/DAST/IAST tools such as Snyk, SonarQube, Burp Suite, Veracode. Strong understanding of cloud platforms and modern development architectures. Relevant certifications such as CSSLP More ❯
Lexington, Massachusetts, United States Hybrid / WFH Options
Encode
Lexington, MA Job Description: The Software Engineer will be responsible for full lifecycle application development, including designing, coding, and debugging applications in various software languages. The role includes software analysis, requirements analysis, code review, system riskanalysis, and software reliability analysis. The candidate will engage in object-oriented design and analysis (OOA/OOD), software … the team to provide solutions - Software Documentation Background & Responsibilities: The Software Engineer will support the research and development of large-scale open architecture distributed/cloud-based data processing, analysis, and Artificial Intelligence (AI) projects utilizing agile development methodology. The candidate will collaborate with technical staff to implement software architecture, perform coding, integration, and testing. Responsibilities include: - Supporting the More ❯
pivotal role in shaping data-driven strategies by building robust models, dashboards, and analytical frameworks that inform executive-level decisions. You'll collaborate closely with senior stakeholders across finance, risk, and technology, translating complex data into actionable insights. Job Responsibilities/Objectives Develop and maintain advanced data models to support strategic planning, riskanalysis, and financial forecasting. … the following: Experience in consulting, banking, corporate strategy, or a similar analytical role. Proven ability to work with senior stakeholders and communicate complex ideas clearly. Experience in finance or risk analytics is a plus. Advanced Excel (including VBA) Power BI and Power Query SQL for data extraction and manipulation Python (preferred but not required) If you are interested in More ❯
role and a proven track record of at least 10 years in IT within a large organization: Understanding of the enterprise's business and organizational needs Experience in security risk assessments, riskanalysis, audits, mitigation plan development Experience in IT architecture methodologies and structured security architecture methodologies Experience in authentication, identity management, cryptography, security protocols and similar More ❯