Press Tab to Move to Skip to Content Link Head of Syndication & Financing Risk Tech Delivery Are you a tech leader with deep expertise in risk analytics, data solutions, and AI-driven automation? We’re looking for a Head of Syndication & Financing Risk Tech Delivery to drive the development of cutting-edge Risk, Analytics, and Data … solutions for our Syndication and Financing Risk business. This is a technology leadership role, focused on delivering data-driven risk solutions for loans, syndications, CLOs, and synthetic financing. You’ll collaborate with engineering teams, data scientists, product owners, and business stakeholders to develop and deploy innovative platforms, analytics, and automation tools that enhance decision-making and risk assessment. Technology & Solution Delivery – Design, develop, and implement Risk, Analytics, and AI-driven solutions for credit risk and financing. Data & AI Innovation – Leverage machine learning, automation, and advanced analytics to enhance risk processes. Platform & Infrastructure Development – Build and optimize data pipelines, analytics platforms, and AI-driven insights for lending and financing teams. Agile & Cross-Team Collaboration More ❯
Columbus, Ohio, United States Hybrid / WFH Options
Seneca Resources, LLC
are seeking two experienced Senior Auditors to join our team either in Indianapolis, IN or Columbus, OH. As a Senior Auditor, you will play a vital role in performing risk identification and assessment related to the Fund Balance with Treasury line item and associated processes reported on the Balance Sheet and related Note 3. This is an excellent … opportunity for individuals with a strong background in federal financial management, internal controls, and auditing. Responsibilities: Conduct risk identification and assessment related to the Fund Balance with Treasury line items and associated processes. Identify relevant controls, including ITACs (Information Technology Automated Controls) and controls over IPE (Information Produced by Entity)/reports. Assess the current design of controls … and recommend improvements to prevent, detect, and correct identified risks or control gaps. Design and implement new controls as needed to address control gaps. Utilize extensive knowledge in riskassessment, internal controls, analytical and critical thinking, accounting, auditing, and technical writing. Preference for external financial statement audit experience, with experience in financial statement audits, agreed upon procedures, or More ❯
the highest level of system security. • Develop and maintain formal documentation, including NSS-specific SOPs and Concept of Operations (CONOPs), to streamline and enhance the authorization process. • Analyze cyber risk indicators stemming from system threats and vulnerabilities and provide detailed cybersecurity risk recommendations in support of NSS continuous monitoring activities. • Research, develop, and implement policies to improve the … effectiveness and efficiency of the security authorization process while minimizing operational impacts on critical NSS systems. • Conduct vulnerability scans, create Body of Evidence (BoE) artifacts, and produce Security Assessment Reports (SARs) to document risk levels and recommended mitigations. • Provide in-depth analysis of cyber threat actor behavior and create detailed white papers to inform DHS NSS of potential … risks and threat trends. • Actively participate in security meetings, including engineering review boards and cybersecurity supply chain risk management (C-SCRM) sessions, to inform and support NSS initiatives. • Develop automated assessment tools and dashboards to support continuous monitoring and ongoing authorization processes, leveraging tools like Splunk, Tenable, and Axonius. Basic Qualifications: • Bachelor's Degree in Information Technology, Cybersecurity More ❯
the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/riskassessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact … of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), RiskAssessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Assists security authorization activities in compliance with Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Requirements TS/SCI w/Polygraph More ❯
assessments are completed for each IS. Initiate a POA&M with identified weaknesses and suspense dates for each IS based on findings and recommendations from the SAR. Evaluate security assessment documentation and provide written recommendations for security authorization to the CISO and AO. Assess proposed changes to Information Systems, their environment of operation, and mission needs that could affect … The system-level continuous monitoring strategy must conform to all applicable published DoD enterprise-level or DoD Component-level continuous monitoring strategies. Determine and document in the SAR a risk level for every noncompliant security control in the system baseline. Determine and document in the SAR an aggregate level of risk to the system and identify the key … drivers for the assessment. The SCA's riskassessment considers threats, vulnerabilities, and potential impacts as well as existing and planned risk mitigation. Develop the continuous monitoring plan specific to the information system Schedule and coordinate assessments of security controls and potential vulnerabilities. Ensure that assessments cover all required aspects, including confidentiality, integrity, and availability (CIA). More ❯
We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role. What you'll be doing: Cyber Security riskassessment of systems and services Support the definition and design of secure solutions that meet business needs Assess Architectural designs and identify proportionate Cyber Security controls aligned with … business objectives Assessment of systems, services and Cyber Security controls, to provide an independent analysis of compliance with BAE Systems Security Policy, standards and external regulatory requirements. Lead Assessment of Cyber Security controls to ascertain effectiveness in reducing risk, including any vulnerability components Analysis, creation and compilation of relevant documentation determining the compliance level of systems and … services, technical security controls with applicable certification, accreditation, and internal policy requirements Manage the delivery of penetration tests and vulnerability analysis in support of risk mitigation strategies Support stakeholders in resolving Cyber Security issues and act as a subject matter expert regarding assurance activities for the wider organisation Your skills and experiences: Good knowledge of industry standard security policy More ❯
join our innovative Security Program, SecOps27 . This program modernizes operational technology, integrates IT and operations teams, and employs evolving technologies to secure our assets. Key Responsibilities Cyber Security Assessment and Policy Development: Evaluate Cadent's cybersecurity posture and develop policies to mitigate risks, aligning with the company's risk appetite set by executive leadership. Policy Implementation and … and states. Control Framework Management and Strategy Definition: Manage the cybersecurity control framework, conduct audits, and define strategies, policies, and guidelines for managing controls across networks, systems, and data. RiskAssessment and Framework Alignment: Conduct risk assessments, process reviews, and control testing; monitor and report on risks; collaborate with the central risk team to ensure alignment … with the corporate risk framework. Skills and Experience Bachelor's degree in Computer Science or related field. Preferred certifications: ISO 27001 Lead Auditor, CISSP, or CISM. Proven expertise in security controls, policy development, and management across enterprise networks. Experience with third-party security risk assessments and regulatory compliance (ISO 27001, SWIFT, PCI DSS). Strong knowledge of cybersecurity More ❯
training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration … Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Responsible for assisting in identifying the overall security requirements for the protection of data, to ensure the implementation of appropriate information security controls, and perform and analyze the security riskassessment, risk analysis, risk management process, security control assessments, and awareness activities for systems and networking operations. Provide assistance to ensure Cybersecurity functions are included in the configuration management process. Interact with customers, Information Technology (IT) staff, and high-level corporate officers in defining and achieving required Cybersecurity objectives for the organization. Contribute to building security architecture. Assist with the More ❯
the role Manage commercial activities for complex multi-domain bids. In a support role to sales, create structure and negotiate commercial and financial structure of bids with minimal residual risk, to address customer needs as well as Orange Business financial and business objective, in conjunction with policy requirements. Key accountabilities Advisor with significant experience and ability to support structuring … presentations to internal and external executives. In support of Sales, and in coordination with Legal, Finance and Solutions teams, create, structure and negotiate (internally and externally) commercial, financial and risk structure of bids from qualification through to customer proposal submission, negotiation and contract signature. In support of commercial structure inclusive of: Customer & Opportunity discovery & assessment including due diligence … flow-up; Heads of Agreements/MOU/LOI ; Technology refresh; Termination & termination liability; Penalties and liabilities; Governance model; Migration planning; Change management Key result/decision areas (outcomes) Risk is understood and mitigated through design and negotiation of business terms and conditions, and linked to the business case. Clearly presented overview of pricing and commercial terms to customers More ❯
Derby, Derbyshire, East Midlands, United Kingdom Hybrid / WFH Options
Risktec Solutions Ltd
Functional Safety Consultant - Derby Background: Risktec Solutions Ltd is an established, independent engineering and risk management consultancy. We help clients to manage Health, Safety, Security, Environmental (HSSE) and business risk in sectors where the impact of loss is high. Our people are high calibre and motivated professionals, with a clear focus on meeting clients expectations. We are seeking … with a minimum of 5 years experience of functional safety analysis to join our growing Derby team. The successful candidates will work as part of a team of technical risk management professionals to support the delivery of technical engineering, safety case and project management to a number of major projects across high-hazard industry sectors, with a focus on … a dynamic and growing team based in Derby and to regularly collaborate with our other teams, both in the UK and internationally. Typical responsibilities include: Providing specialist Probabilistic Safety Assessment (PSA) and Reliability, Availability, Maintainability and Safety (RAMS) analysis and advice to resolve complex problems within major projects across multiple high-hazard industry sectors. Facilitating hazard identification and optioneering More ❯
Nessus and Trellix ePO (HBSS/ESS) across Windows and Red Hat Linux environments. Responsibilities include applying DISA STIGs, conducting vulnerability assessments, implementing system hardening measures, and supporting the Risk Management Framework (RMF) process. The ideal candidate has experience with tool administration, system architecture, Tier 3 troubleshooting, and security documentation. A strong understanding of IA integration and secure systems … Integration: o Build IA into systems deployed to operational environments, validating and verifying system security requirements, and establishing system security designs for stand-alone systems. o Support security planning, assessment, risk analysis, and risk management. • Security Tool Troubleshooting & Support: o Provide Tier 3 troubleshooting support for cybersecurity tools such as ACAS and HBSS/ESS. • RMF Support … Documentation: o Support the documentation of security control implementations and gathering of artifacts to support Risk Management Framework (RMF) and ICD 503 Security Accreditation. o Assist with RMF related tasks as needed. Education, Experience and Qualifications: • Security+ certification. • 5+ years of hands-on experience administering and maintaining Tenable Nessus, Trellix ePO (HBSS/ESS), and related security tools in More ❯
support to our clients’ offshore cable projects. You will act Technical Lead for our offshore cable routing scopes of work, leading GIS based route analysis and offshore Cable Burial RiskAssessment (CBRA) scopes of work. This will include mentoring of junior members of staff in these activities. You will take the lead in developing AtkinsRéalis’ offshore cable routing … enhancement activities. Acting as a champion for offshore cable routing within AtkinsRéalis’ Marine Geoscience team. Providing technical input to bids for subsea cable routing scopes. Input to Cable Burial Risk Assessments (CBRA) and Depth of Lowering Assessments. Routing of offshore and onshore cables using GIS based analysis. GIS based analysis of geophysical, geospatial and geotechnical data and data management. … working as part of a multi-disciplinary team. Experience of offshore cable routing using ArcGIS, Makai Plan or AutoCAD. Experience in analysing geotechnical and geospatial data for Cable Burial Risk Assessments (CBRA), or Depth of Lowering (DoL) assessments. Excellent interpersonal and technical skills and the ability to work independently or as part of a team on subsea cables projects. More ❯
support to our clients’ offshore cable projects. You will act Technical Lead for our offshore cable routing scopes of work, leading GIS based route analysis and offshore Cable Burial RiskAssessment (CBRA) scopes of work. This will include mentoring of junior members of staff in these activities. You will take the lead in developing AtkinsRéalis’ offshore cable routing … enhancement activities. Acting as a champion for offshore cable routing within AtkinsRéalis’ Marine Geoscience team. Providing technical input to bids for subsea cable routing scopes. Input to Cable Burial Risk Assessments (CBRA) and Depth of Lowering Assessments. Routing of offshore and onshore cables using GIS based analysis. GIS based analysis of geophysical, geospatial and geotechnical data and data management. … working as part of a multi-disciplinary team. Experience of offshore cable routing using ArcGIS, Makai Plan or AutoCAD. Experience in analysing geotechnical and geospatial data for Cable Burial Risk Assessments (CBRA), or Depth of Lowering (DoL) assessments. Excellent interpersonal and technical skills and the ability to work independently or as part of a team on subsea cables projects. More ❯
Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Help develop and execute strategic security plans aligned with threat intelligence and operational priorities Threat Intelligence and RiskAssessment: Leverage threat intelligence to prioritize and scope security projects based on real-world risks Conduct risk-based evaluations of critical systems, networks, and Industrial Control Systems … of experience in Cybersecurity operations, including Blue Team, Red Team, or Purple Team roles Proven leadership in incident response, threat hunting, and vulnerability management Strong understanding of threat intelligence, riskassessment methodologies, and adversary tactics (MITRE ATT&CK, etc.) Experience with SIEMs, EDRs, forensic tools, and scripting languages (e.g., Python, PowerShell) Excellent communication and collaboration skills Preferred Qualifications More ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Reed Technology
This role is crucial in ensuring IT risks are identified, measured, and actively managed to protect the organisation from potential impacts. You will develop and implement IT policies, conduct risk assessments, and ensure compliance with regulatory requirements while driving improvements in IT governance processes. Key Accountabilities * Identify, evaluate, and manage IT risks across infrastructure, data protection, and lifecycle management. … Own and maintain the IT risk register, ensuring mitigation plans are in place. * Align risk management frameworks with industry standards (ISO27001, NIST, CIS Critical Controls). * Lead IT audits, coordinate fieldwork, and track findings to ensure timely resolution. * Develop and implement IT policies, procedures, and security awareness initiatives. * Act as an SME, providing guidance on IT governance, compliance … and risk mitigation strategies. Required Skills & Qualifications * Proven experience in IT risk management, security governance, and compliance. * Strong knowledge of ISO27001, GDPR, PCI-DSS, and cybersecurity frameworks. * Experience in IT audit coordination and riskassessment methodologies. * Excellent communication and stakeholder management skills. * Desirable - Certifications such as CRISC, CISA, CISM, or CISSP Benefits * 10% discretionary performance related More ❯
adheres to best practices and legislation in data protection, information security, quality management, environmental compliance and industry-specific security standards. The ideal candidate will have experience in compliance management, riskassessment, audits, security frameworks and policy implementation. They will need to work across teams such as IT, Operations, Finance, Delivery and Engineering to ensure robust governance, risk … and compliance Information security and Cyber Essentials Plus Oversee Cyber Essentials Plus compliance ensuring security controls are in place Work closely with the IT team to assess vulnerabilities, manage risk and implement cyber security policies Work with the Head of IT to manage incident response planning and ensure security incidents are managed in line with best practices Data protection … Assessments (DPIAs) Implement processes around Data Subject Access Requests (DSARs) and breach management Ensure compliance with any client and third-party data processing agreements (DPAs) and data retention rules Risk management and policy development Review, update, maintain and enforce policies and procedures related to: Information security Data protection Environmental sustainability Business continuity Incident response Supplier security assessment Maintain More ❯
Leatherhead, England, United Kingdom Hybrid / WFH Options
Hyundai Motor UK
deploying and monitoring adherence to policies, processes and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. RiskAssessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerability management process aligned with headquarters guidelines. Policy Development … to policies, processes and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. We Want You To: RiskAssessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerability management process aligned with headquarters guidelines. Policy Development … and policies to both technical and non-technical stakeholders. Good project management skills At least 5 years’ experience in an IT security role, dealing with security management principles, including riskassessment, threat analysis, incident response, and security architecture Track record of continuous learning in the cybersecurity field Desirable - Certified information systems security professional (CISSP) We offer: What We More ❯
on current and desired system security architecture. Assessing and mitigating system security threats and risks throughout the program life cycle. Leading and/or contributing to the security planning, assessment, risk analysis, risk management, certification and awareness activities for various system and networking operations. Effectively collaborating with other internal technical experts on a day-to-day basis. … providing advice to Program Managers, Customer technical experts, and internal program teams. Formulating security compliance requirements for new system features. Identifying and remediating security issues throughout the system. Supporting riskassessment, risk management, security control assessment, continuous monitoring, service design, and other IA program support functions. Working with development teams to enrich team-wide understanding of … hold an active TS/SCI clearance with Polygraph. Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience. Must have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark hardware More ❯
Ensure that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture. • Participate in an information security riskassessment during the Security Assessment and Authorization process. • Participate in the development or modification of the computer environment cybersecurity program plans and requirements. • Recognize a possible security … violation and take appropriate action to report the incident, as required • Ensure plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc. • Provide technical documents, incident reports, and findings from computer examinations, summaries, and other situational awareness information to higher headquarters • Develop and maintain RMF Assess and Authorize documentation … required to achieve an Authority to Operate (ATO). Prepare and maintain information systems ATO record on the Navy's Enterprise Mission Assurance Support Service (eMASS) • Run vulnerability assessment tools; ACAS vulnerability scanner, Security Content Automation Protocol (SCAP), STIG Viewe • Manage system/network vulnerabilities using the Vulnerability Remediation and Assets Manager (VRAM) Qualifications/Requirements: • MUST be a More ❯
training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration … Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture … security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/riskassessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security SW, HW, and FW. Manage changes to systems and assess the More ❯
training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration … Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture … security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/riskassessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security SW, HW, and FW. Manage changes to systems and assess the More ❯
to apply. Overview Gallagher Re is seeking a Global Wildfire Peril Lead to join our Property Research team. This team supports our global reinsurance operations by developing in-house risk assessments related to natural catastrophes, evaluating catastrophe models, and collaborating with academic research partners. The team works with brokers, clients, and industry partners to improve property risk quantification … develop innovative risk management solutions, and assess third-party catastrophe models. The selected candidate will lead wildfire riskassessment, model evaluation, and development efforts worldwide. This role is available in London, Paris, Munich, Zurich, and North America. Impact You Will Have Serve as the primary wildfire risk advisor to clients, interpreting and presenting model results and … explaining wildfire risk intricacies. Represent Gallagher Re as a thought leader on wildfire risk within the industry. Lead research and evaluation of wildfire catastrophe models, providing validated reports supported by detailed evidence. Manage wildfire catastrophe model development projects for risk quantification. Innovate to deliver customized risk solutions to clients. Stay updated on the latest wildfire research More ❯
London, England, United Kingdom Hybrid / WFH Options
Eviden
materials Supporting workshop delivery and client meetings Conducting research and analysis Client Engagement Support Typical activities include: Leading client workshops such as security strategy sessions, Cloud security architecture reviews, Riskassessment workshops, technology evaluation sessions. Producing client materials including, Security assessment reports, technical architecture diagrams, implementation roadmaps and project status updates. Conducting security assessments by gathering and …/security experience in the Defence Sector Demonstrable experience of one or more of the following areas: MoD Security GRC/Assurance Processes Secure by Design and RMADs/RiskAssessment Cloud Security Cloud security architecture documentation, s ecurity controls mapping and c ompliance checking automation MoD Cyber Operations SOC tool evaluation support, SIEM use case development, Metrics … and reporting frameworks, and Technology integration assessment. Cyber Vulnerability Investigations Identity & Access IAM architecture reviews, p rivileged access solutions, authentication technology assessment, and Zero Trust implementation planning OT Security OT RiskAssessment/Assurance and OT Vulnerability Management Key Strengths Detail-oriented with a strong focus on quality Well-organised and committed to developing customer service skills More ❯
of TM to help drive the both the BAU TM Enhancement Roadmap and the Strategic Roadmaps, including enhancement of systems, processes and controls Control Framework Oversight: Support on TM RiskAssessment, control assessments, audits and regulatory reviews. Also to maintain oversight of the end-to-end TM control framework Governance & Reporting: Deputise for the Heads of TM at … risks and strategic decisions. Advise key stakeholders, including functional leadership teams and senior management on functional and cross functional areas of impact and alignment. Manage and mitigate risks through assessment, in support of the control and governance agenda. Demonstrate leadership and accountability for managing risk and strengthening controls in relation to the work your team does. Demonstrate comprehensive … FC Transactional Controls & Strategy function is operating effectively across all business lines and jurisdictions. The TM Controls and Strategy function consists of four key teams which are focused on risk coverage (Risk and Strategy Team), model ownership/enhancement execution (Execution Team), analytics (TM Analytics) and governance (TM Governance). This role sits across all teams ensuring they More ❯
adheres to best practices and legislation in data protection, information security, quality management, environmental compliance and industry-specific security standards. The ideal candidate will have experience in compliance management, riskassessment, audits, security frameworks and policy implementation. They will need to work across teams such as IT, Operations, Finance, Delivery and Engineering to ensure robust governance, risk … and compliance Information security and Cyber Essentials Plus Oversee Cyber Essentials Plus compliance ensuring security controls are in place Work closely with the IT team to assess vulnerabilities, manage risk and implement cyber security policies Work with the Head of IT to manage incident response planning and ensure security incidents are managed in line with best practices Data protection … Assessments (DPIAs) Implement processes around Data Subject Access Requests (DSARs) and breach management Ensure compliance with any client and third-party data processing agreements (DPAs) and data retention rules Risk management and policy development Review, update, maintain and enforce policies and procedures related to: Information security Data protection Environmental sustainability Business continuity Incident response Supplier security assessment Maintain More ❯