maintain a strong customer focus. Manage engineer shift and customer onsite rotas. Always act in the best interest of the Company To adhere to the processes and systems for Risk and Health and Safety Management including workplace and riskassessment Maintain a proactive approach and support the wider team namely sales and administration Show a willingness to More ❯
Telford, England, United Kingdom Hybrid / WFH Options
Undisclosed
days in the past 5 years) Role purpose/summary The Preventative Risking (PR) team within RIS is responsible for managing the risking and compliance referral processes for Self-Assessment (SA) registrations. Currently, the system identifies approximately 200,000 fraudulent registrations out of 1 million, resulting in an estimated £51 million to £219 million in lost SA repayment claims … of concept (POC) was developed using: SAS Enterprise Guide for table creation, SAS Studio V and SAS RTENG to build the SA registration network, SAS Viya 3.5 tools for riskassessment of new SA registrations. The POC leveraged data from 20 different sources, most of which were already housed in the Minerva Oracle database. Previously, some data had More ❯
newport, midlands, united kingdom Hybrid / WFH Options
Undisclosed
days in the past 5 years) Role purpose/summary The Preventative Risking (PR) team within RIS is responsible for managing the risking and compliance referral processes for Self-Assessment (SA) registrations. Currently, the system identifies approximately 200,000 fraudulent registrations out of 1 million, resulting in an estimated £51 million to £219 million in lost SA repayment claims … of concept (POC) was developed using: SAS Enterprise Guide for table creation, SAS Studio V and SAS RTENG to build the SA registration network, SAS Viya 3.5 tools for riskassessment of new SA registrations. The POC leveraged data from 20 different sources, most of which were already housed in the Minerva Oracle database. Previously, some data had More ❯
telford, midlands, united kingdom Hybrid / WFH Options
Undisclosed
consecutive days in the past 5 years) Project Overview: The Preventative Risking (PR) team within RIS is responsible for managing the risking and compliance referral processes for Self-Assessment (SA) registrations. Currently, the system identifies approximately 200,000 fraudulent registrations out of 1 million, resulting in an estimated £51 million to £219 million in lost SA repayment claims for … of concept (POC) was developed using: SAS Enterprise Guide for table creation, SAS Studio V and SAS RTENG to build the SA registration network, SAS Viya 3.5 tools for riskassessment of new SA registrations. The POC leveraged data from 20 different sources, most of which were already housed in the Minerva Oracle database. Previously, some data had More ❯
newport, midlands, united kingdom Hybrid / WFH Options
Undisclosed
consecutive days in the past 5 years) Project Overview: The Preventative Risking (PR) team within RIS is responsible for managing the risking and compliance referral processes for Self-Assessment (SA) registrations. Currently, the system identifies approximately 200,000 fraudulent registrations out of 1 million, resulting in an estimated £51 million to £219 million in lost SA repayment claims for … of concept (POC) was developed using: SAS Enterprise Guide for table creation, SAS Studio V and SAS RTENG to build the SA registration network, SAS Viya 3.5 tools for riskassessment of new SA registrations. The POC leveraged data from 20 different sources, most of which were already housed in the Minerva Oracle database. Previously, some data had More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Operations Resources
Senior IT Security Analyst with an exposure to cloud security to lead in the development of cloud security measures with a view to identifying weakness in the system via risk assessments and providing solutions. Working as a Senior member of a small team you should have a strong knowledge of RiskAssessment frameworks and methodologies especially in More ❯
CIPP/E, CIPM) are highly desirable. Technical & AI Experience: Proven experience delivering data protection advice and work within digital projects, preferably involving Artificial Intelligence or Machine Learning systems. RiskAssessment: Demonstrable ability to conduct and support Data Protection Impact Assessments (DPIAs) with a collaborative, pragmatic, and enabling attitude. Data Governance: Experience advising on data sharing agreements and More ❯
CIPP/E, CIPM) are highly desirable. Technical & AI Experience: Proven experience delivering data protection advice and work within digital projects, preferably involving Artificial Intelligence or Machine Learning systems. RiskAssessment: Demonstrable ability to conduct and support Data Protection Impact Assessments (DPIAs) with a collaborative, pragmatic, and enabling attitude. Data Governance: Experience advising on data sharing agreements and More ❯
Knowledge/Skills Comprehensive knowledge of the National Occupational Standards of Care and the Health & Social Care Standards Internal and external audit experience. Must understand internal auditing standards and riskassessment practices. Proven leadership, interpersonal and communication skills Excellent analytical skills. Sound and robust ICT skills and knowledge Knowledge and experience within the care sector The successful candidate More ❯
Altrincham, Cheshire, England, United Kingdom Hybrid / WFH Options
Key Partnership Recruitment Limited
for engineers, ensuring they have clear instructions for their assignments Track engineer progress using scheduling and tracking tools, resolving issues as they arise Prepare and manage permit and RAMS (RiskAssessment Method Statement) documentation to ensure compliance Communicate proactively with customers regarding scheduling updates, delays or changes Maintain accurate records of visits, reports and project metrics in the More ❯
CAT A) Asbestos Awareness CSCS/ECS Card Manual Handling Working at Height PASMA/IPAF First Aid at Work SSSTS Confined Space Training Step Ladder/Ladder Awareness RiskAssessment Awareness Next Steps: As a business, we're on a journey to build on our culture where everyone is included, treated fairly and with respect. This starts More ❯
shortfalls when necessary. Proactively indicate and report if SLAs are in danger of being breached. Ensure all work is carried out within a 'safe system' and approved work processes, riskassessment, and specified work procedures, complying with best practice standards and legal requirements. Lead and manage projects to identify root causes of facility issues, acting as an escalation More ❯
Livingston, West Lothian, Scotland, United Kingdom Hybrid / WFH Options
Apogee Corporation**
convictions, cautions, reprimands, and final warnings that are not protected under the Exceptions Order 1975. Any offer of employment will be conditional upon a satisfactory DBS certificate and a riskassessment of any disclosed information. We are committed to fair recruitment and will consider disclosed information on a case-by-case basis, in line with our policy on More ❯
security, application, data) and how they interconnect. Experience in As-Is/To-Be network design, endpoint mapping, and integration design. Working knowledge of Zero Trust principles and network risk assessment. Proven ability to define technical requirements for RFPs and assess supplier capabilities. Strong stakeholder management and communication skills — able to translate complex concepts into actionable designs and clear More ❯
warrington, cheshire, north west england, united kingdom
Forsyth Barnes
security, application, data) and how they interconnect. Experience in As-Is/To-Be network design, endpoint mapping, and integration design. Working knowledge of Zero Trust principles and network risk assessment. Proven ability to define technical requirements for RFPs and assess supplier capabilities. Strong stakeholder management and communication skills — able to translate complex concepts into actionable designs and clear More ❯
bolton, greater manchester, north west england, united kingdom
Forsyth Barnes
security, application, data) and how they interconnect. Experience in As-Is/To-Be network design, endpoint mapping, and integration design. Working knowledge of Zero Trust principles and network risk assessment. Proven ability to define technical requirements for RFPs and assess supplier capabilities. Strong stakeholder management and communication skills — able to translate complex concepts into actionable designs and clear More ❯
required in Service Management to ensure compliance. Proven experience of working with operational independence using discretion and taking calculated risks to ensure continuity in service and change delivery. Structured risk assessment. Ability to assess risks associated with systems, technologies and processes. - Ability to demonstrate good judgement IS Service-related decisions through a combination of riskassessment and More ❯
required in Service Management to ensure compliance. Proven experience of working with operational independence using discretion and taking calculated risks to ensure continuity in service and change delivery. Structured risk assessment. Ability to assess risks associated with systems, technologies and processes. - Ability to demonstrate good judgement IS Service-related decisions through a combination of riskassessment and More ❯
Consultant - 6 months+ £500-600pd Inside IR35 - Remote with 2 days on site per month in London Specialist skills: Must have over half of these skills: Information Assurance riskassessment and management in accordance with HMG policy Accreditation of new systems and re-accreditation of existing systems Requirements Management Process Modelling Architecture and System Design Systems Concepts … System Lifecycle Privacy and Regulatory Impact Assessments Risk and Issue Management Ensuring ongoing compliance of 3rd parties systems IS27001/2 Knowledge of CHECK certification Physical security reviews Team Dynamics and Ways of working Working with a small group of like-minded domain experts Able to effectively prioritise and organise work plans and reschedule, should external events demand a … Security Working Groups (SWGs). Provide systems accreditation, waivers and Go-live approvals as and where appropriate to the overarching remit of the IA Service in line with delegated risk appetite. Undertake site inspections & approvals undertaken to agreed levels. Ensure 3rd party Supplier threat vector mitigation actions in place. Support breach responses and remedial action in conjunction with the More ❯
predictive models to forecast the impacts of floods, cyclones, and heat stress. Utilizing satellite imagery and remote sensing technology for climate hazard detection. Enhancing time-series forecasting to inform risk planning at the asset level. Integrating simulation data with ML for combined physical and statistical modelling. What We're Looking For Demonstrated leadership with extensive hands-on experience. Proven … related fields. Exceptional communication and collaboration skills across teams. A background in startups or scale-ups. Bonus Points Experience analyzing satellite imagery or Earth-observation data. Familiarity with climate riskassessment, catastrophe modelling, or environmental data. Knowledge of physics-informed ML or simulation-driven methodologies. Experience in regulated or data-sensitive industries. If you find this opportunity appealing More ❯
technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerability management, riskassessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across CI/CD … zoom between strategy and execution without losing the thread. Customer obsession : genuine curiosity for security workflows and pain points. Nice to Have Experience at security product companies (vuln management, risk platforms, detection). Background as a backend/infrastructure engineer turned PM. Product marketing or technical content track record. AI/ML or agent-based systems experience. Exposure to More ❯
technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerability management, riskassessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across CI/CD … zoom between strategy and execution without losing the thread. Customer obsession : genuine curiosity for security workflows and pain points. Nice to Have Experience at security product companies (vuln management, risk platforms, detection). Background as a backend/infrastructure engineer turned PM. Product marketing or technical content track record. AI/ML or agent-based systems experience. Exposure to More ❯
technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerability management, riskassessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across CI/CD … zoom between strategy and execution without losing the thread. Customer obsession : genuine curiosity for security workflows and pain points. Nice to Have Experience at security product companies (vuln management, risk platforms, detection). Background as a backend/infrastructure engineer turned PM. Product marketing or technical content track record. AI/ML or agent-based systems experience. Exposure to More ❯
technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerability management, riskassessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across CI/CD … zoom between strategy and execution without losing the thread. Customer obsession : genuine curiosity for security workflows and pain points. Nice to Have Experience at security product companies (vuln management, risk platforms, detection). Background as a backend/infrastructure engineer turned PM. Product marketing or technical content track record. AI/ML or agent-based systems experience. Exposure to More ❯
london (city of london), south east england, united kingdom
Heart Mind Talent
technical depth : bridge AI agent capabilities and security workflows for both engineers and customers. What You’ll Bring Security domain expertise (must-have): hands-on familiarity with vulnerability management, riskassessment, EDR/NDR, cloud security, or adjacent areas. 4–7 years in product management with shipped products that moved business metrics. Technical fluency across CI/CD … zoom between strategy and execution without losing the thread. Customer obsession : genuine curiosity for security workflows and pain points. Nice to Have Experience at security product companies (vuln management, risk platforms, detection). Background as a backend/infrastructure engineer turned PM. Product marketing or technical content track record. AI/ML or agent-based systems experience. Exposure to More ❯