minimal travel. Your essential job functions will include but may not be limited to: • Perform system security technical decomposition, analysis, and impact assessments with the focus on the vulnerability assessment of ground- and space-based cyber physical, logical and embedded systems operating in a variety of domains and mission contexts. • Apply cybersecurity analytical methods, processes, and frameworks, such as … RMF, to support the development, assessment, and authorization of secure technical solutions. • Develop and review system documentation for cybersecurity measures to support program management and Defense acquisition life cycle milestone requirements. • Conduct operational and system data flow analysis and documentation for vulnerability assessments. • Complete verification, validation analysis and documentation of system interfaces or sub-components of cyber-physical and … clients, to include assisting with requirement development, project execution, and reporting. Qualifications • Minimum 5+ years relevant work experience (cyber offense/defense, hardware/software reverse engineering, technical cyber riskassessment). • Cybersecurity experience to include: o Assessing and testing NIST SP 800-53 security controls. o Experience working with space, aeronautical and aerospace systems, maritime systems, and More ❯
adheres to best practices and legislation in data protection, information security, quality management, environmental compliance and industry-specific security standards. The ideal candidate will have experience in compliance management, riskassessment, audits, security frameworks and policy implementation. They will need to work across teams such as IT, Operations, Finance, Delivery and Engineering to ensure robust governance, risk … and compliance Information security and Cyber Essentials Plus Oversee Cyber Essentials Plus compliance ensuring security controls are in place Work closely with the IT team to assess vulnerabilities, manage risk and implement cyber security policies Work with the Head of IT to manage incident response planning and ensure security incidents are managed in line with best practices Data protection … Assessments (DPIAs) Implement processes around Data Subject Access Requests (DSARs) and breach management Ensure compliance with any client and third-party data processing agreements (DPAs) and data retention rules Risk management and policy development Review, update, maintain and enforce policies and procedures related to: Information security Data protection Environmental sustainability Business continuity Incident response Supplier security assessment Maintain More ❯
We offer outstanding benefits and opportunities for leadership development. This work is in support of Naval Surface Warfare Center - Philadelphia. Tasking includes: • Assist with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM … and CS security control baselines based on RMF guidelines and categorization of the RMF boundary • Perform Ports, Protocols, and Services Management (PPSM). • Perform IT and CS vulnerability-level risk assessments. • Execute security control testing as required by a riskassessment or annual security review (ASR). • Mitigate and remediate IT and CS system level vulnerabilities for … RMF boundaries and/or guidance provided by the command ISSMs • Implement and assess STIG and SRGs. • Perform and develop vulnerability assessments with automated tools such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Check (SCC) and Evaluate STIG. • Deploy security updates to Information System components. • Perform routine audits of IT system hardware and software More ❯
London, England, United Kingdom Hybrid / WFH Options
PROSPECTUS
include: Governance review and task backlog creation Work phasing, including quick wins and long-term planning Highlighting interdependencies between tasks Delivering quick wins and groundwork for longer-term projects Risk management, including updating the organisational risk register and reviewing risk appetite Working with leadership, committees, and the board to understand and set risk appetite Overseeing IT … backlog creation, work phasing, and delivering quick wins You should have a strong background in project management with experience in at least two of the following areas: charity governance, riskassessment, HR, or IT. Knowledge of charity processes, excellent communication skills, high organisation, multi-tasking ability, and IT proficiency are essential. You should be a collaborative self-starter More ❯
Southern Md Facility, Maryland, United States Hybrid / WFH Options
Softek International Inc
Platform Management: Configure, manage, and optimize Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), and Zscaler Digital Experience (ZDX) solutions to ensure secure and efficient internet and application access. RiskAssessment and Mitigation: Perform regular risk assessments to identify potential vulnerabilities in the organization's systems and networks and develop strategies to mitigate these risks effectively. System … Platform Management: Configure, manage, and optimize Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), and Zscaler Digital Experience (ZDX) solutions to ensure secure and efficient internet and application access. RiskAssessment and Mitigation: Perform regular risk assessments to identify potential vulnerabilities in the organization's systems and networks and develop strategies to mitigate these risks effectively. System More ❯
training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration … Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide support for a program, organization, system, or enclave's information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an … the information system and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/riskassessment analysis to support security authorization. Provide configuration management (CM) for information systems security SW, HW, and FW. Manage changes to system and assess the security impact of More ❯
training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration … Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide support for a program, organization, system, or enclave's information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an … the information system and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/riskassessment analysis to support security authorization. Provide configuration management (CM) for information systems security SW, HW, and FW. Manage changes to system and assess the security impact of More ❯
ensure compliance with all associated controls and responsibilities in the day-to-day performance of their duties. Individuals working in departments that are considered to be in the high-risk category will be required to undergo advanced training based on their role and level of access. Individuals with access to modify data and the configuration baseline will require further … Data Environment Repository (SPIDER) Navy Data Environment (NDE) Open Architecture Retrieval System (OARS) Configuration Data Managers Database-Open Architecture (CDMD-OA) Configuration Management Professional (CMPro) Navy Tool for Interoperability RiskAssessment (NTIRA) Assured Compliance Assessment Solution (ACAS) Enterprise Mission Assurance Support Service (eMASS) Federal Information Security Management Act (FISMA) database Vulnerability Remediation Asset Manager (VRAM) Xacta Information … Assurance (IA) Manager and NSERC DoD Information Technology Portfolio Repository-DON (DITPR-DON) DON Application Database Management System (DADMS) Microsoft Visio, PEO C4I Risk Exchange Online Server Tool and Office Suite & Jira Online Tool Excellent organizational skills with the ability to identify, prioritize, and execute tasks to meet project deadlines consistently. DESIRED Knowledge of and practical experience with submarine More ❯
and Cross-Functional Support · Serve as QA lead for product development projects, including: Reviewing technical documentation Producing phase review documentation Supporting RA in regulatory submissions · Guide development teams through risk-based quality decisions and process changes, including regulatory and market-driven adaptations. · Oversee complaint handling and post-market surveillance, including root cause analysis, hazard assessment, and escalation. Core … QA Responsibilities · Own and manage the following processes: Document Control, Change Control, CAPA, Supplier Evaluation and Monitoring, Management Review and Training. · Support and guide process owners in regulatory interpretation, risk-based decision making, and change implementation. · Lead and coordinate internal audits to ensure ongoing QMS and ISMS compliance. · Coordinate and host external audits from Notified Bodies, certification bodies, customers … external auditing experience Familiarity with EU MDR, US 21 CFR Part 820 Strong communication skills with the flexibility to engage effectively with diverse audiences System ownership, root cause analysis, riskassessment, documentation, project leadership, software development familiarity Strategic thinker, self-starter, cross-functional collaborator, efficiency-driven, pragmatic Preferred Experience hosting audits and managing CAPAs ISO 27001, IEC More ❯
Document findings and work with various stakeholders, including senior management, to agree recommendations and implementation plans to address any compliance deficiencies. Lead the delivery of the Internal Controls Self-Assessment Programme. Develop and roll out new compliance policies, as required. Advise the COO and leadership team on regulatory developments and required actions. Oversee regulatory reporting, audit readiness, and interaction … knowledge of UK regulatory frameworks including FCA CONC, Consumer Credit Act, and GDPR. Experience with QA methodologies and performance monitoring tools, ideally within data-heavy contexts. Excellent problem-solving, riskassessment, and communication skills. Ability to manage multiple projects and stakeholders in a fast-paced, growing business. Professional certifications in compliance, risk, or quality (e.g. ICA, ISO More ❯
and significant demonstrable experience in their field capable of leading analytical efforts culminating in products. Advanced skill sets with the HUMINT Operations Cycle, CI Support to HUMINT Operations, Asset RiskAssessment System (ARMS), Operational Risk Management Process, and Patterns of Life Analysis and one or more of the following areas: Human Factors Analysis, Human Terrain Analysis, SIGINT … and significant demonstrable experience in their field capable of leading analytical efforts culminating in products. Advanced skill sets with the HUMINT Operations Cycle, CI Support to HUMINT Operations, Asset RiskAssessment System (ARMS), Operational Risk Management Process, and Patterns of Life Analysis and one or more of the following areas: Human Factors Analysis, Human Terrain Analysis, SIGINT More ❯
Epsom, England, United Kingdom Hybrid / WFH Options
AtkinsRéalis
support to our clients’ offshore cable projects. You will act Technical Lead for our offshore cable routing scopes of work, leading GIS based route analysis and offshore Cable Burial RiskAssessment (CBRA) scopes of work. This will include mentoring of junior members of staff in these activities. You will take the lead in developing AtkinsRéalis’ offshore cable routing … enhancement activities. Acting as a champion for offshore cable routing within AtkinsRéalis’ Marine Geoscience team. Providing technical input to bids for subsea cable routing scopes. Input to Cable Burial Risk Assessments (CBRA) and Depth of Lowering Assessments. Routing of offshore and onshore cables using GIS based analysis. GIS based analysis of geophysical, geospatial and geotechnical data and data management. … working as part of a multi-disciplinary team. Experience of offshore cable routing using ArcGIS, Makai Plan or AutoCAD. Experience in analyzing geotechnical and geospatial data for Cable Burial Risk Assessments (CBRA), or Depth of Lowering (DoL) assessments. Excellent interpersonal and technical skills and the ability to work independently or as part of a team on subsea cables projects. More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Snc-Lavalin
to our clients’ offshore cable projects. You will act as Technical Lead for our offshore cable routing scopes of work, leading GIS-based route analysis and offshore Cable Burial RiskAssessment (CBRA) scopes of work. This will include mentoring of junior members of staff in these activities. You will take the lead in developing AtkinsRéalis’ offshore cable routing … enhancement activities. Acting as a champion for offshore cable routing within AtkinsRéalis’ Marine Geoscience team. Providing technical input to bids for subsea cable routing scopes. Input to Cable Burial Risk Assessments (CBRA) and Depth of Lowering Assessments. Routing of offshore and onshore cables using GIS-based analysis. GIS-based analysis of geophysical, geospatial, and geotechnical data and data management. … working as part of a multi-disciplinary team. Experience of offshore cable routing using ArcGIS, Makai Plan, or AutoCAD. Experience in analyzing geotechnical and geospatial data for Cable Burial Risk Assessments (CBRA), or Depth of Lowering (DoL) assessments. Excellent interpersonal and technical skills and the ability to work independently or as part of a team on subsea cables projects. More ❯
the customer. Major functions: • Coordinate the operational security posture for programs and information systems • Ensure the completion/preparation, review, and maintain documentation to include System Security Plans (SSPs), RiskAssessment Reports, Assessment and Authorization packages, and other documentation to support Information System accreditation. • Ensure all IS security-related documentation is current and accessible to properly authorized …/Licenses etc.: • 4 years' experience in information assurance/security experience (RMF/DIACAP/NISPOM/JSIG/JFAN) • Minimum DoD 8570 IAM I certified • Experience with Risk Management Framework (800-53) • Knowledge and Implementation of 32 CFR part 117 and DAAPM More ❯
strong security culture and advise on security risks and mitigations. Maintain knowledge of security threats, vulnerabilities, and compliance standards. Lead efforts in security monitoring and incident response. Support security risk management and compliance with standards like PCI, GDPR, ISO. Perform other duties as assigned. Qualifications 10+ years of experience in information security, including vulnerability assessment, incident response, and … audits. 5+ years working with business leadership and managing projects in a complex environment. Knowledge of security technologies and concepts such as firewalls, intrusion detection, encryption, cloud security, and risk assessment. 3+ years in security compliance and audit support (PCI DSS, GDPR, etc.). Bachelor’s degree in IT or Security, with relevant certifications like CISSP, CRISC, or CISA. More ❯
Leatherhead, England, United Kingdom Hybrid / WFH Options
Hyundai Motor Europe GmbH
to policies, processes and standards related to organisational and technical security. Being a SPOC for all aspects of cybersecurity within HMUK and leading incidents resolution. We Want You To: RiskAssessment and Management - Assess and identify potential security threats, vulnerabilities and developing strategies to mitigate these risks. Establish a vulnerability management process aligned with headquarters guidelines. Policy Development … and policies to both technical and non-technical stakeholders. Good project management skills At least 5 years' experience in an IT security role, dealing with security management principles, including riskassessment, threat analysis, incident response, and security architecture Track record of continuous learning in the cybersecurity field Desirable - Certified information systems security professional (CISSP) What We Offer: Competitive More ❯
for AI/ML models, data pipelines, and related infrastructure. Develop security policies and procedures specific to AI systems. Evaluate and select security tools and technologies for AI environments. RiskAssessment and Management: Conduct thorough risk assessments to identify vulnerabilities and threats specific to AI systems. Develop and implement risk mitigation strategies for AI-related security More ❯
London, England, United Kingdom Hybrid / WFH Options
Jobgether
a dynamic professional services team, delivering expert guidance and actionable solutions across a broad range of cyber security domains. Your role will span technical controls, compliance, security transformation, and risk management, serving clients across various industries. You will lead and support client engagements, ensuring effective implementation of security measures, risk mitigation strategies, and alignment with leading frameworks and … depth, and strong interpersonal skills to deliver high-impact results. Although remote, occasional travel may be required based on client needs. Accountabilities: Lead and support client engagements in cyber riskassessment, remediation, and compliance initiatives Deliver and manage multiple workstreams including incident response planning, policy implementation, and supply chain risk management Produce technical assessments, maturity audits, and … writing and client RFPs as a subject matter expert Drive continuous improvement of services, tools, and processes within the consulting team Adhere to client and regulatory standards, contributing to risk governance and business continuity efforts Requirements 3+ years in a client-facing cyber security, GRC, or consulting role, or 5+ years in a related field (military, law enforcement, or More ❯
London, England, United Kingdom Hybrid / WFH Options
Deutsche Bank AG, Frankfurt am Main
of internal controls relating to technology supporting Investment Banking areas including Fixed Income & Currencies, Electronic and Algorithmic Trading, Origination and Advisory in accordance with GA methodology and the established riskassessment framework. Conduct technology assessments and all work assignments on a timely basis – including planned audits, finding validations, and ad-hoc projects. Prepare, coordinate and execute audit assignments … of findings. Develop and maintain broad regulatory knowledge and experience. Stay abreast of business/industry changes and their effect on the team’s audit plan, GA methodology and risk assessments. Pro-actively develop and maintain professional working relationships with colleagues including coaching of junior team members, the business and respective support areas. Work in an integrated manner with … application management lifecycle, including IT general and automated application controls in the Financial Services Industry, ideally within Investment Banking. Very good knowledge of auditing standards and concepts (i.e., design assessment, audit testing/sampling and operating effectiveness testing). Strong project management skills and the ability to multitask, prioritize with minimal supervision. Excellent team working capabilities and an ability More ❯
related discipline Active Secret Clearance Must be a U.S. citizen Desired Qualifications: Experience with government financial programs or loan guarantees Knowledge of Foreign Military Sales (FMS) processes Experience with riskassessment and financial performance evaluation Advanced skills in Excel, PowerBI, or other analytical tools Experience supporting federal financial policy initiatives Knowledge of international finance and export credit mechanisms More ❯
of the security architecture of the client's IT systems. The Security Architect will draw upon Enterprise Security Architecture or Security Solutions Architecture to: Identify business objectives, user needs, risk appetite, and cyber security obligations Identify vulnerabilities, perform threat modelling, undertake riskassessment, evaluate the effectiveness of security controls Verify and evidence alignment to 'Secure by Design … solutions Develop secure conceptual, logical, and high-level designs by identifying appropriate security controls to be embedded in solutions that meet business requirements whilst evidencing alignment to the target risk appetite Own the design and be able to articulate and justify design recommendations at security architecture assurance gates Draft design documentation, options papers, risk assessments, stakeholder presentations, and … non-technical stakeholders Contribute to a reference architecture of established patterns, principles, and guidelines Research emerging technologies and new products, positioning them against the evolving threat landscape and client risk appetite Distil complex information into key discussion points to facilitate resolution rather than just identifying challenges Contribute to developing the Security Practice's skills and capabilities, including coaching and More ❯
processes across the technology estate. Working closely with security architects, enterprise architects, and IT compliance & delivery teams, the role plays a key part in embedding security architecture principles, design risk reviews, and compliance checks throughout the project lifecycle. The role coordinates and manages the Enterprise Architecture Risk and Security (EARS) and Technology Design Assurance (TDA) processes, ensuring that … technology governance, or enterprise architecture, seeking hands-on exposure to secure design review processes, tooling, and stakeholder engagement in a regulated technology environment. What will you be doing? Coordinating risk and security assessments for enterprise architecture to identify potential threats and ensure compliance with security policies and regulations Managing secure design assurance processes, facilitating meetings, tracking actions, and collaborating … and enhancing security architecture data in enterprise tools, integrating multiple data sources to provide clear visibility of security posture and risks Creating dashboards and visual reports to highlight architectural risk themes, compliance status, and security metrics for stakeholders Acting as a key liaison between project teams, architects, and governance bodies to ensure smooth security review workflows and process adherence More ❯
Reporting to the Chief Information Security Officer (CISO), this role ensures that Technology, Data Management and Information Security policies are written, maintained and published in line with the Enterprise Risk Management Framework assuring compliance with regulatory requirements across all entities within the Group. Responsible for leading a team in monitoring regulations related to Information Technology and Security, and ensuring … team to effectively manage technology assurance across the Group. Policy and Standards Management: working with Policy owners to manage updates to policies, standards, processes, and controls within the Enterprise Risk Management Framework (ERMF). Controls Catalogue Management: Oversee the IT General Controls catalogue, ensuring it is comprehensive and up-to-date. Audit Relationship Management: Manage relationships with internal and … effectiveness proactively to avoid audit surprises, supporting control owners in improvement plans required. Stakeholder Coordination: Coordinate with various stakeholders to ensure alignment and effective implementation of technology assurance practices. RiskAssessment: Perform risk assessments to identify potential issues and develop mitigation strategies, providing input to the Technology Risk Forum. Reporting: Prepare and present reports on technology More ❯
London, England, United Kingdom Hybrid / WFH Options
Zinc Network
background in cyber security to support our projects, including those in non-permissive environments. The successful candidate will also provide guidance on cyber, physical and human security, delivering comprehensive risk management strategies. We are particularly interested in individuals with experience working on UK or US government-funded projects and those with professional backgrounds in military, law enforcement, or intelligence. … to the unique needs of our global projects Conduct regular vulnerability assessments and provide actionable recommendations to enhance digital security Ensure secure communication protocols for teams operating in high-risk environments Physical and Human Security: Advise on physical security measures, including site risk assessments and travel safety protocols Develop human security strategies to protect personnel and project participants … focusing on situational awareness and mitigation of threats RiskAssessment and Crisis Management: Conduct thorough risk assessments across physical, human, and cyber security domains Develop crisis management plans and lead response efforts in the event of security incidents Training and Capacity Building: Deliver tailored training programs to staff and partners on best practices in cyber, physical, and More ❯
London, England, United Kingdom Hybrid / WFH Options
Jobgether
a dynamic professional services team, delivering expert guidance and actionable solutions across a broad range of cyber security domains. Your role will span technical controls, compliance, security transformation, and risk management, serving clients across various industries. You will lead and support client engagements, ensuring effective implementation of security measures, risk mitigation strategies, and alignment with leading frameworks and … depth, and strong interpersonal skills to deliver high-impact results. Although remote, occasional travel may be required based on client needs. Accountabilities Lead and support client engagements in cyber riskassessment, remediation, and compliance initiatives Deliver and manage multiple workstreams including incident response planning, policy implementation, and supply chain risk management Produce technical assessments, maturity audits, and … writing and client RFPs as a subject matter expert Drive continuous improvement of services, tools, and processes within the consulting team Adhere to client and regulatory standards, contributing to risk governance and business continuity efforts Requirements 3+ years in a client-facing cyber security, GRC, or consulting role, or 5+ years in a related field (military, law enforcement, or More ❯