processing activities comply with global privacy laws and regulations. This role involves collaborating with cross-functional teams to integrate privacy by design into all systems and processes, managing privacy risk, and ensuring our organization's adherence to data protection standards. Key Responsibilities: Design, implement, and manage comprehensive privacy frameworks and strategies to safeguard personal data and ensure compliance with … relevant privacy laws and regulations (e.g., GDPR, CCPA, HIPAA). Conduct privacy impact assessments (PIAs) and risk assessments to identify potential privacy risks. Develop and implement strategies to mitigate these risks and address vulnerabilities. Ensure adherence to international and local privacy regulations, standards, and industry best practices. Monitor changes in privacy laws and adjust policies and practices as necessary. … address and resolve issues. Provide support for privacy-related operational activities (e.g., consent collection, fulfilling data subject access requests, etc.). Maintain comprehensive documentation of privacy-related activities, including risk assessments, compliance audits, and policy updates. Prepare reports for management and regulatory bodies as needed. Serve as a subject matter expert by providing advice on privacy-related projects and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
IPS Group
Assist in establishing a comprehensive resilience framework that meets DORA standards and other recognised guidelines (e.g. ISO 22301, ISO 27001, NIST). Draft internal controls, policies, training content, and riskassessment methodologies. Contribute to core DORA workstreams such as ICT risk management, scenario-based testing, and oversight of third-party providers. Stakeholder Engagement Coordinate workshops and sessions … operational leads. Monitor implementation progress and support a smooth transition into standard business processes. Training & Culture Develop and deliver resilience-focused training across various teams. Promote best practices in risk and continuity planning. Embed a culture of awareness, accountability, and continuous improvement. What We’re Looking For: A degree in Risk Management, Cyber Security, Information Technology, or a … resilience, cybersecurity, or regulatory roles. Solid understanding of UK and EU regulatory frameworks, with hands-on experience relating to DORA. Demonstrable experience conducting regulatory gap analyses, resilience testing, and risk assessments. Strong organisational skills and the ability to manage competing priorities in a deadline-driven environment. Excellent interpersonal and stakeholder management skills, particularly in regulated settings. Desirable Attributes: Relevant More ❯
Assist in establishing a comprehensive resilience framework that meets DORA standards and other recognised guidelines (e.g. ISO 22301, ISO 27001, NIST). Draft internal controls, policies, training content, and riskassessment methodologies. Contribute to core DORA workstreams such as ICT risk management, scenario-based testing, and oversight of third-party providers. Stakeholder Engagement Coordinate workshops and sessions … operational leads. Monitor implementation progress and support a smooth transition into standard business processes. Training & Culture Develop and deliver resilience-focused training across various teams. Promote best practices in risk and continuity planning. Embed a culture of awareness, accountability, and continuous improvement. What We’re Looking For: A degree in Risk Management, Cyber Security, Information Technology, or a … resilience, cybersecurity, or regulatory roles. Solid understanding of UK and EU regulatory frameworks, with hands-on experience relating to DORA. Demonstrable experience conducting regulatory gap analyses, resilience testing, and risk assessments. Strong organisational skills and the ability to manage competing priorities in a deadline-driven environment. Excellent interpersonal and stakeholder management skills, particularly in regulated settings. Desirable Attributes: Relevant More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
IPS Group
Assist in establishing a comprehensive resilience framework that meets DORA standards and other recognised guidelines (e.g. ISO 22301, ISO 27001, NIST). Draft internal controls, policies, training content, and riskassessment methodologies. Contribute to core DORA workstreams such as ICT risk management, scenario-based testing, and oversight of third-party providers. Stakeholder Engagement Coordinate workshops and sessions … operational leads. Monitor implementation progress and support a smooth transition into standard business processes. Training & Culture Develop and deliver resilience-focused training across various teams. Promote best practices in risk and continuity planning. Embed a culture of awareness, accountability, and continuous improvement. What We’re Looking For: A degree in Risk Management, Cyber Security, Information Technology, or a … resilience, cybersecurity, or regulatory roles. Solid understanding of UK and EU regulatory frameworks, with hands-on experience relating to DORA. Demonstrable experience conducting regulatory gap analyses, resilience testing, and risk assessments. Strong organisational skills and the ability to manage competing priorities in a deadline-driven environment. Excellent interpersonal and stakeholder management skills, particularly in regulated settings. Desirable Attributes: Relevant More ❯
so they are always in search of the best people to join our ever-growing talented team. Responsibilities: Design and maintain a robust technology control testing framework aligned with risk management standards (e.g., NIST, ISO 27001, COBIT, ITIL). Develop and update testing methodologies, ensuring they address key risks related to IT infrastructure, cybersecurity, cloud services, and software development. … Establish and maintain control testing policies and procedures that align with regulatory and internal governance requirements. Ensure the control testing framework integrates seamlessly with the broader Operational Risk Management Framework (ORMF). Maintain a comprehensive control library, mapping controls to risks and business objectives. Plan and execute detailed control testing activities across IT operations, systems, and processes, including: Cybersecurity … e.g., GDPR compliance, data backups). Incident management processes and disaster recovery testing. Test both the design and operating effectiveness of IT controls. Prioritise control testing activities based on risk assessments, focusing on high-risk areas such as payment systems, customer data protection, and regulatory reporting. Document and communicate control deficiencies to relevant stakeholders. Work with technology teams More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
MN Climate Innovation Finance Authority (MNCIFA)
Job Description: Job Title Information Technology (IT) Auditor - Investment Banking Location Birmingham Corporate Title Assistant Vice President The Group Audit (GA) function takes a proactive, risk-based and independent approach to assist the Bank's business and infrastructure functions to identify key control weaknesses. You will be joining the global GA Investment Banking Application & Innovation Technology team reporting into … the effectiveness of internal IT controls supporting Innovation and Investment Banking areas including Fixed Income & Currencies, Electronic Trading, Origination and Advisory in accordance with GA methodology and the established riskassessment framework Conduct technology assessments, continuous monitoring and complete all work assignments on a timely basis - including planned audits, finding validations, and ad-hoc projects Prepare, coordinate and … and audit management, facilitate tracking and closure validation of findings Stay abreast of business/industry changes and their effect on the team's audit plan, GA methodology and risk assessments Pro-actively develop and maintain professional working relationships with colleagues, the business and respective support areas. Contribute to departmental projects and initiatives Your skills and experience Experience in More ❯
Job Description Data Scientist Business Description Verisk Analytics is a multinational data and analytics riskassessment company and a leading source of information about insurance risk. To serve our clients, we draw upon our vast experience in data management and predictive modelling to offer decision analytics to the insurance industry through underwriting to claims management in personal lines … commercial lines, and the London market. In underwriting we create sophisticated risk models to assist insurers with risk selection and accurate pricing. Our range of models is broad spanning residential and commercial property perils, motor insurance, SME business covers, travel, pet and health insurance. To feed our risk models we source many diverse datasets covering high resolution … and manage cases more effectively. Role Purpose Verisk are looking for a Data Scientist to support the development of various data science models to support the development of our risk management products. The International Analytics Team is a dynamic and exciting place to work: our projects are extremely varied and include developing supervised machine learning models, unsupervisedclustering type models More ❯
Verisk Analytics is a multinational data and analytics riskassessment company and a leading source of information about insurance risk. To serve our clients, we draw upon our vast experience in data management and predictive modelling to offer decision analytics to the insurance industry through underwriting to claims management in personal lines, commercial lines, and the London market. … In underwriting we create sophisticated risk models to assist insurers with risk selection and accurate pricing. Our range of models is broad spanning residential and commercial property perils, motor insurance, SME business covers, travel, pet and health insurance. To feed our risk models we source many diverse datasets covering high resolution weather data, property attributes, business activities … and manage cases more effectively. Role Purpose Verisk are looking for a Data Scientist to support the development of various data science models to support the development of our risk management products. The International Analytics Team is a dynamic and exciting place to work: our projects are extremely varied and include developing supervised machine learning models, unsupervisedclustering type models More ❯
For more than a decade, Karthik Consulting has been a reliable and trusted advisor to our Government customers, providing independent and unbiased recommendations and solutions to mitigate risk and help solve IT issues. We bring the innovation, passion, and agility of the commercial sector to meet the unique challenges of this competitive space. Karthik Consulting is seeking Cybersecurity Specialist … Air Force (HAF). This includes, but is not limited to, activities related to governance, strategic planning, enterprise architecture, capability portfolio management, solutions analysis, solution implementation planning, performance and risk management, IT service management, systems engineering, innovative project management, data and analytics, training, program analysis, policy analysis, information technology analysis, and administrative technical support. Additionally, the candidate will offer … Speaking and presenting • Planning and project management • Analytical thinking and problem-solving skills • Cooperation and unity of purpose • Flexibility and ongoing education • Task management • Leadership and management skills • Adaptability • Riskassessment and management Experience • Demonstrated capability in performing comprehensive risk assessments to identify and address potential security threats across large-scale programs, ensuring the protection of critical More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
McLaughlin & Harvey
Harvey's IT environment and enterprise applications, you will be responsible for the operational management of the Company's Information Security Management System and ensuring that our IT governance, risk management, and compliance measures are effective and implemented. The role will support the implementation and maintenance of security controls across the group, aligned with our cyber security policy, group … are as secure as possible. Create and maintain security documents (policies, standards, baselines, guidelines, and procedures). Maintain & improve Business Continuity and Disaster Recovery plans. Contribute to the IT risk register and mitigation plans. Ensure Endpoint security compliance, including Mobile Device Management. Organise audits, external and internal vulnerability scans, web, infrastructure and application penetration tests and ensure remediation of … effectively with technical and non-technical colleagues at all levels in the organisation. Essential Previous experience within a cyber/information security role. Strong knowledge and understanding of security riskassessment, including security testing principles and tools. Network, operating system, application and organisational security concepts. An investigative and analytical nature with a focus on ensuring the organisation is More ❯
products and services in almost 100 countries, united by a promise to be forever caring. Our solutions provide a range of benefits, from infection prevention and protection of at-risk skin, to improved patient outcomes and reduced care costs. Convatec's revenues in 2023 were over $2 billion. The company is a constituent of the FTSE 100 Index (LSE … implement improvements in key processes for greater efficiency and data-driven decision making. Complaint Management: Support execution and maintain procedures for complaint activities such as product investigations, ad hoc risk reviews, return process, intake process and product monitoring across all franchises. Execute quality engineering activities for all post-market product surveillance, including collection, analysis, and evaluation of product safety … processes as needed. Present complaint trend analyses to stakeholders in a timely and accurate manner while supporting root cause investigations. Design & Development Support: Maintain a current understanding of product risk profiles and reportable product harms/malfunctions. Provide risk-based input to project teams and participate in design control activities, including failure mode identification and historical complaint analysis. More ❯
for AI/ML models, data pipelines, and related infrastructure. Develop security policies and procedures specific to AI systems. Evaluate and select security tools and technologies for AI environments. RiskAssessment and Management: Conduct thorough risk assessments to identify vulnerabilities and threats specific to AI systems. Develop and implement risk mitigation strategies for AI-related security More ❯
requirements. Provide leadership and direction to the information security team. Stay abreast of industry best practices, emerging threats, and regulatory changes, specifically those relevant to the UK financial sector. Risk Management: Conduct regular risk assessments to identify and evaluate potential security threats, taking into account the specific risks faced by UK financial institutions. Develop and implement risk … . Ensurepliance with relevant industry standards (, PCI DSS, ISO 27001) and UK-specific guidelines. Conduct security awareness training for employees, tailored to the UK financial services context. Third-Party Risk Management: Assess and manage security risks associated with third-party vendors and service providers, ensuringpliance with UK data protection and outsourcing regulations. Ensure vendorsply with security requirements and contractual … and managing security posture in cloud environments. Strong analytical and problem-solving abilities. Deep understanding of security technologies and architecture, including cloud security and AWS-specific services. Knowledge of riskassessment methodologies and incident response procedures, tailored to the UK financial services context. Ability to develop and implement security policies and procedures in line with UK regulations. Experience More ❯
fifty years and through innovation, interpretation, and professional insight, Verisk has replaced uncertainty with precision to unlock opportunities that deliver significant and demonstrable impact. From our historic roots in riskassessment, we’ve grown to provide analytic insights that help transform industries focused on some of the world’s most critical areas. Today, the insurance industry relies on … what’s possible, embracing challenges, and pushing boundaries Underwriting Solutions — provides underwriting and rating solutions for auto and property, general liability, and excess and surplus to assess and price risk with speed and precision Claims Solutions — supports end-to-end claims handling with analytic and automation tools that streamline workflow, improve claims management, and support better customer experiences Property … offers property estimation software and tools for professionals in estimating all phases of building and repair to make day-to-day workflows the most efficient Extreme Event Solutions — provides risk modeling solutions to help individuals, businesses, and society become more resilient to extreme events. Specialty Business Solutions — provides an integrated suite of software for full end-to-end management More ❯
control systems. Understanding of release branching strategies (Git Flow, Trunk-Based Development). Automation & Deployment Tools: Familiarity with Ansible, Kubernetes, Docker, Helm, SCCM, or Puppet for deployment automation. Monitoring & Risk Management: Ability to assess release risks, implement rollback strategies, and monitor deployments using tools like Splunk, Prometheus, Datadog. Organizing and Scheduling Releases: Working with various agency groups to understand … tools, version control systems, and deployment automation. Project & Stakeholder Management Skills: Excellent communication & coordination skills to collaborate with cross-functional teams, vendors, and business leaders. Strong problem-solving and riskassessment abilities to identify deployment risks and develop mitigation plans. Experience with project management tools (e.g., Jira, ServiceNow, Confluence, Microsoft Project) for tracking releases. Ability to manage multiple More ❯
London, England, United Kingdom Hybrid / WFH Options
Modulr Finance Limited
leadership and direction to the information security team. Stay abreast of industry best practices, emerging threats, and regulatory changes, specifically those relevant to the UK financial sector. Conduct regular risk assessments to identify and evaluate potential security threats, taking into account the specific risks faced by UK financial institutions. Develop and implement risk mitigation strategies to address identified … compliance with relevant industry standards (e.g., PCI DSS, ISO 27001) and UK-specific guidelines. Conduct security awareness training for employees, tailored to the UK financial services context. Third-Party Risk Management: Assess and manage security risks associated with third-party vendors and service providers, ensuring compliance with UK data protection and outsourcing regulations. Ensure vendors comply with security requirements … and managing security posture in cloud environments. Strong analytical and problem-solving abilities. Deep understanding of security technologies and architecture, including cloud security and AWS-specific services. Knowledge of riskassessment methodologies and incident response procedures, tailored to the UK financial services context. Ability to develop and implement security policies and procedures in line with UK regulations. Experience More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Leonardo
of a significant programme, during which you will ensure that the product and associated deliverables are as secure as reasonably practicable, and in accordance with customer’s requirements and risk appetite. You will be supported in this role as part of a larger consulting team, engineers and product domain specialists. Your work at Leonardo UK will see you take … and detailed system and security designs as they pertain to the cyber domain. Decomposing cyber and security requirements down to the system control level. Conducting cyber and information security riskassessment activities including threat modelling, vulnerability analysis and analysis of mitigations, including technical understanding. Scoping and managing security verification and validation activities and remedial action plans. Coordinating with More ❯
Amherst, Massachusetts, United States Hybrid / WFH Options
University of Massachusetts Amherst
capabilities that enable the full lifecycle management of UMass Amherst account identities, credentials, and entitlements according to security, privacy, and compliance requirements. This position will perform security analysis and riskassessment and improve security by setting policies and standards. This position requires deep knowledge in Governance, Risk, and Compliance (GRC), solid understanding of data security, academic business … the university. Prepares and delivers training material independently or via third party training partners. Interfaces with, and responds to, internal and state auditor's requests as needed. Performs security risk assessments/audits in accordance with established security policies and procedures. Researches, recommends, and promotes IT security policies and guidelines which focus on protecting confidentiality, integrity, and availability of More ❯
deal teams, portfolio managers, and operations to understand business needs and translate them into analytical requirements. Assist in the design and implementation of AI-powered tools for predictive analytics, riskassessment, and operational optimization. Extract, clean, and model data from various internal and external sources, including CRM systems, financial platforms, and portfolio company data feeds. Identify trends, anomalies More ❯
Easter Howgate, Midlothian, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
This is an exciting opportunity to be part of significant programmes, during which you will ensure that products meet the highest standards, in accordance with customer's requirements and risk appetite. You will be supported in this role as part of a larger team of consultants, engineers and product domain specialists. Your work at Leonardo UK will see you … and detailed system and security designs as they pertain to the cyber domain. Decomposing cyber and security requirements down to the system control level. Conducting cyber and information security riskassessment activities including threat modelling, vulnerability analysis and analysis of mitigations. Scoping and managing security verification & validation activities and remedial action plans. Coordinating with product engineers, system architects More ❯
Newcastle upon Tyne, England, United Kingdom Hybrid / WFH Options
Leonardo
This is an exciting opportunity to be part of significant programmes, during which you will ensure that products meet the highest standards, in accordance with customer’s requirements and risk appetite. You will be supported in this role as part of a larger team of consultants, engineers and product domain specialists. Your work at Leonardo UK will see you … and detailed system and security designs as they pertain to the cyber domain. Decomposing cyber and security requirements down to the system control level. Conducting cyber and information security riskassessment activities including threat modelling, vulnerability analysis and analysis of mitigations. Scoping and managing security verification & validation activities and remedial action plans. Coordinating with product engineers, system architects More ❯
Yeovil, Somerset, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
of a significant programme, during which you will ensure that the product and associated deliverables are as secure as reasonably practicable, and in accordance with customer's requirements and risk appetite. You will be supported in this role as part of a larger consulting team, engineers and product domain specialists. Your work at Leonardo UK will see you take … and detailed system and security designs as they pertain to the cyber domain. Decomposing cyber and security requirements down to the system control level. Conducting cyber and information security riskassessment activities including threat modelling, vulnerability analysis and analysis of mitigations, including technical understanding. Scoping and managing security verification and validation activities and remedial action plans. Coordinating with More ❯
This is an exciting opportunity to be part of significant programmes, during which you will ensure that products meet the highest standards, in accordance with customer's requirements and risk appetite. You will be supported in this role as part of a larger team of consultants, engineers and product domain specialists. Your work at Leonardo UK will see you … and detailed system and security designs as they pertain to the cyber domain. Decomposing cyber and security requirements down to the system control level. Conducting cyber and information security riskassessment activities including threat modelling, vulnerability analysis and analysis of mitigations. Scoping and managing security verification & validation activities and remedial action plans. Coordinating with product engineers, system architects More ❯
reports such SSPs, RARs for (A&A) packages and SCTMs. POAMs: Manage and Maintain Plans of actions and milestones, by tracking remediation efforts, validating closure evidence, prioritizing and communicating risk, and ensuring timely. Oversee Configuration Management: Manage changes to security-relevant software, hardware, and firmware to maintain system security. Basic Qualifications: As a requirement of this position, all candidates … II Preferred Qualifications: Experience Shaping policies and programs for DoD information security initiatives. Knowledge of NIST guidance (SP 800-37, 800-53, 800-161) and JSIG guidance. Hands-on riskassessment experience that incorporates system/mission requirements and operation constraints. Other Requirements: Must have an active Secret clearance with the ability to obtain a Top Secret with More ❯
reports such SSPs, RARs for (A&A) packages and SCTMs. POAMs: Manage and Maintain Plans of actions and milestones, by tracking remediation efforts, validating closure evidence, prioritizing and communicating risk, and ensuring timely. Oversee Configuration Management: Manage changes to security-relevant software, hardware, and firmware to maintain system security. Basic Qualifications: As a requirement of this position, all candidates … II Preferred Qualifications: Experience Shaping policies and programs for DoD information security initiatives. Knowledge of NIST guidance (SP 800-37, 800-53, 800-161) and JSIG guidance. Hands-on riskassessment experience that incorporates system/mission requirements and operation constraints. Other Requirements: Must have an active Secret clearance with the ability to obtain a Top Secret with More ❯