months Central Government experience in the last 5 years is strongly preferred. As an Aker Lead Security Architect, you will be a recognised subject matter expert in security, risk management and compliance with demonstrable experience in highly regulated industries, specifically UK Government and/or Defence. You will build effective working relationships with delivery team members and Aker customers … testing (e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG Information Assurance RiskAssessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST … CSF, and CSA Identify and deliver appropriate controls based on industry standards (e.g. CCM) to drive cloud and customer security solutions framework based on business risk and cloud native threats. Provide oversight and guidance on government security procedures and processes. Continually evaluate new threats in the cloud, to identify the impact on IT and the business to develop and More ❯
Bath, England, United Kingdom Hybrid / WFH Options
None
Trent House (95002), United Kingdom, Nottingham, NottinghamshireRisk Remediation AssessorAbout the RoleCapital One has a team of Information Security specialists who not only focus on security, but are relationship experts, riskassessment champions, and resolve complex information security issues related to Capital One’s third parties. The Cyber Third Party Risk Reduction (CTPRR) program defines the framework and … internal and external stakeholders to ensure third party engagements receive the necessary CTPRR due diligence; evaluate the effectiveness of the third party’s security environment and deliver a quality assessment report. It also supports ongoing security by working with the third parties to remediate any identified issues, enabling effective risk management in alignment with business tolerance and industry … requirements. Those that work for this team pragmatic and practical in your understanding of risk and security, but are also willing to know when to pull in experts and escalate. They challenge and innovate within their team to drive process improvements to elevate program efficiency.What you’ll do:Support kick-off, planning and scoping activities for cyber-focused riskMore ❯
safety, security and overall improvement, adhering to the Target Operating Model. The Information Security Analyst will manage the delivery of all cyber security related services. This will include cyber risk management, Data Security Protection Toolkit (DSPT) compliance against cyber relatedassertions, policy and procedure lifecycle management, and ensuring theTrust's information compliance adheres to the Cyber Assurance Framework (CAF) and … inform the recruitment team. Job description Job responsibilities PRINCIPAL RESPONSIBILITIESSupport the CISO in developing, implementing and monitoring a strategic, comprehensive cyber, enterprise information security, resilience, information governance and IT risk management strategy and plan.Provide expert cyber security advice to senior stakeholders and technical teams across the organisation.Work directly with key stakeholders to facilitate riskassessment and risk … that risks in relation to cyber, resilience and information integrity and security are addressed appropriately.Develop business cases and propose funding allocations based around intelligence on the areas of greatest risk and benefit.Develop and implement a cyber, resilience and information integrity and security strategy, ensuring all partners endorse the strategy.Ensure that all local information and cyber security strategies and activities More ❯
Data Protection Act. Any data that is must be undertaken with regard to the Trust Information Governance and Information Security policies. The post holder must adhere to the Trust riskassessment and risk management processes. The post holder must adhere to infection control policies and procedures. Undertake mandatory training and any other training relevant to the role More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Summer-Browning Associates Ltd
supporting our Central Government client who are seeking a Cyber Security Advisor on an initial 8 contract Service Location: Glasgow (Hybrid) Essential Skills Experience of cyber security analysis and assessment, including threat identification, riskassessment, evaluation of technical controls, and assessment against industry standards Experience of engaging, advising and influencing at all levels of an organisation More ❯
milton, central scotland, united kingdom Hybrid / WFH Options
Summer-Browning Associates Ltd
supporting our Central Government client who are seeking a Cyber Security Advisor on an initial 8 contract Service Location: Glasgow (Hybrid) Essential Skills Experience of cyber security analysis and assessment, including threat identification, riskassessment, evaluation of technical controls, and assessment against industry standards Experience of engaging, advising and influencing at all levels of an organisation More ❯
paisley, central scotland, united kingdom Hybrid / WFH Options
Summer-Browning Associates Ltd
supporting our Central Government client who are seeking a Cyber Security Advisor on an initial 8 contract Service Location: Glasgow (Hybrid) Essential Skills Experience of cyber security analysis and assessment, including threat identification, riskassessment, evaluation of technical controls, and assessment against industry standards Experience of engaging, advising and influencing at all levels of an organisation More ❯
Responsibilities Clearance Operational Support: Oversee and execute the screening, onboarding, review and data transfer requests fulfillment across all businesses within Citi as defined in rules provided by Independent Compliance Risk Management (ICRM). Discuss, implement and operationalize new country privacy and regulatory changes impacting the cross-border transfer process as advised by Country ICRM. Quality Assurance: Perform regular reviews … Contribute to Data Enablement Process: Provide support and guidance to the business in the execution of the transformational data enablement process to streamline, standardize and simplify global program related riskassessment questionnaires by driving efficiency through organizing questions into logical groups and reducing redundancies. Target State Process Model Implementation: Support the design and implementation of the target state … operational model for the Data Transfers Office, contributing to projects and initiatives to drive consistency and reduce risk in DTO processes. Team Collaboration: Lead, mentor, and train a high-performing team responsible for execution, coordination, and control adherence, fostering accountability, excellence and continuous improvement. Process Implementation & Enhancements: Assist in the implementation of a scalable and efficient operating model aligned More ❯
Hereford, Herefordshire, England, United Kingdom Hybrid / WFH Options
QA
About SPS: Special Projects and Services Limited (SPS) is a UK-based security and risk management company founded in 1991. Operating globally, SPS provides crisis response, riskassessment, medical operations support, and project management in high-risk or complex environments. Known for its expertise in global assistance and specialist security operations, SPS was acquired by Concentric … in 2025, strengthening its position as a trusted provider of integrated risk and crisis management solutions. Overview: You will support the delivery of IT services across the UK business, assisting with technical support, device management, and ongoing tech ops projects. This role provides structured, hands-on training in IT systems administration, cyber security, and compliance, contributing to the smooth More ❯
comparable in size to the Commonwealth. • Exposure to technical configurations, technologies, and processing environments in one or more projects of similar size and complexity to BEST. • Understanding of information risk concepts and principles as a means of relating business needs to security controls. • Experience with common information security management frameworks, such as International Organization for Standardization (ISO) 2700x and … the ITIL, COBIT and National Institute of Standards and Technology (NIST) frameworks. • In-depth knowledge of riskassessment methods and technologies. • Good understanding of financial systems security requirements. • Excellent technical knowledge of mainstream operating systems and a wide range of security technologies, such as network security appliances, identity, and access management (IAM) systems, anti-malware solutions, automated policy … provisioning users of the Mosaic application. Specific Duties • Works with the BEST Team, SI, and product vendors, CTR and EOTSS to identify security requirements, using methods that may include risk and business impact assessments. Components of this activity include but are not limited to: o Providing operational support as defined by SLA requirements agreed to by the Commonwealth and More ❯
of over 140 across London, Toronto, New York and Singapore. We have achieved scale by building the best-in class surveillance tooling, where our analytics bring the front office risk mindset to the compliance function. Though we have developed in the trade surveillance arena, we have always been more than that. At heart, we are a finance focused big … s leading financial markets analytics platform. The Role We are seeking a Head of Information Security to join our team in London and lead our cybersecurity strategy and manage risk across our corporate estate. You can expect to work closely with our Engineering and Infrastructure teams to effect change through our organisation, as well as customer facing teams such … the development, implementation, and continuous improvement of information security practices across all teams Manage regular pentests by external consultants and coordinate with internal resources to remediate issues Information security riskassessment of third party service providers Offer guidance, direction and approval on security solutions and approaches Advocate for secure engineering best practices throughout the company Manage the standards More ❯
organisations navigate complex business challenges with confidence. With a strong presence in the UK, we partner with companies across industries to deliver best-in-class advisory services in accounting, risk, cyber security, technology, and business transformation. We pride ourselves on combining technical expertise with a practical, hands-on approach, helping our clients strengthen resilience, meet regulatory requirements, and stay … ahead in an increasingly digital and risk-driven landscape. Technical and Domain Experience: Conduct cybersecurity maturity and riskassessment and for clients. Practical experience implementing security controls, in areas such as MDR, IAM, Network Security, Cloud Deployments. Advise clients on cybersecurity strategy, metrics and reporting for various levels of stakeholders, including Audit Committees and Board of Directors. … Build risk management practices for clients, including policies, procedures, Risk Register, etc. Previous experience as a systems administrator, systems engineer, or security analyst. Understanding of operating system hardening principles, network design principles, and systems security. Guide clients in establishing cybersecurity policies, standards, and procedures. Manage cybersecurity training & awareness services for clients from design to implementation. Understanding of security More ❯
understand large datasets related to organisational spend. Categorise spend by type, region, country, and post within country. Develop structured outputs and visualisations to support analysis. Spend Aggregation & Market Maturity Assessment: Identify opportunities to aggregate similar types of spend. Assess market maturity for supplier consolidation by region and country. Identify top 3 countries per region with clear aggregation opportunities and … market capability reasoning. Map remaining countries with slower delivery timelines and aggregation potential. Risk Identification: Conduct high-level risk assessments for each country in relation to procurement aggregation. Highlight key risks that may impact delivery timelines or supplier engagement. Strategic Support: Collaborate with procurement and commercial teams to align analysis with strategic goals. Support workshops and stakeholder engagement … stakeholders. Deliverables - By 31 January 2026: Preliminary report with categorised spend data and initial aggregation opportunities. Draft list of top 3 countries per region with market maturity rationale. Initial risk mapping by country. By 28 February 2026: Finalised spend aggregation report with structured data outputs. Full market maturity assessment by region and country. Prioritised list of countries/ More ❯
sensitive in nature. These include but not limited to front to back(f2b), multi-entity, multi-business area impacting initiatives. In addition these may be high budget, high change risk projects, along with multi-year duration - potentially structured as a programme with multiple project workstreams. Projects may include combination of strategic business change, regulatory, and IT components - so close … other senior members of team to help drive BOW. Contribute to IPC, EDF & Other forums - delivery and continuous improvement of the forum which ensures project delivery assurance of high risk, high profile projects in order to provide visibility and alignment across MUFG EMEA, Securities International and support the Deputy Regional Executive in achieving the EMEA/International Strategy and … individual Function Medium Term Business Plans ("MTBP").") goals. Chair the RiskAssessment Forum (RAF) and ensure the RCSA is maintained across all teams in CTO, engaging with team owners to ensure it is up to date and adequate control frameworks are in place for each sub-function. Post Blue Day 2, provide a six month warranty period More ❯
tools and technologies such as SIEM (Splunk), vulnerability management (Tenable), and PAM Strong understanding of security frameworks and standards (e.g., ISO 27001, NIST), as well as asset management and riskassessment solutions It would be a real bonus if you have: Master's degree in Computer Science, Information Security, or a related field Experience or understanding of SOC More ❯
Camberley, Surrey, South East, United Kingdom Hybrid / WFH Options
Morson Edge
of our clients Product Security Engineering teams, supporting the delivery and through-life management of secure submarine systems and products. As a key focal point for security and information risk, you'll apply deep technical expertise to ensure that solutions are designed, delivered, and supported securely, safely, and in compliance with contractual and regulatory requirements. You'll provide subject … policies, and best practices across major defence programmes. Key Responsibilities Provide expert advice on Product Security to engineering and project teams. Analyse system architectures to identify threats, vulnerabilities, and risk mitigation strategies. Develop and manage Product Security analysis using recognised riskassessment techniques. Contribute to the development of Product Security strategies, policies, and guidance. Recommend and present … programmes and provide technical leadership to junior engineers. Support incident management and contribute to key project documentation including RMADS, Security Strategies, and accreditation evidence. Key Deliverables & Accountabilities Delivery of Risk Management Accreditation Document Sets (RMADS) and associated security documentation. Ensuring compliance with contractual and regulatory security requirements. Providing specialist input to verification, qualification, and design review processes. Contribution to More ❯
standards and lifecycle assurance within complex embedded or control software systems. Key Responsibilities Develop a full understanding of the software and its operational environment. Produce and maintain a Software Assessment Plan in line with BS EN 50716 requirements. Evaluate the conformity of the software process and deliverables to applicable standards and assigned SIL levels. Assess the competence of project … and inspections at appropriate development phases, including witnessing of testing activities. Identify, assess, and document any non-conformities or deviations from requirements, evaluating their safety impact. Ensure that the assessment plan is implemented and that all findings are clearly documented in a Software Assessment Report. Provide an independent professional judgment on the software's fitness for purpose, including … any constraints, assumptions, or risks. Maintain thorough assessment records and provide recommendations for improvement or risk control. Key Competencies & Experience : Proven technical competence in software engineering within a safety-critical or regulated domain (e.g. rail, automotive, aerospace, medical, industrial). In-depth understanding of BS EN 50716, BS EN 50128, and/or BS EN 50657. Experience in More ❯
standards and lifecycle assurance within complex embedded or control software systems. Key Responsibilities Develop a full understanding of the software and its operational environment. Produce and maintain a Software Assessment Plan in line with BS EN 50716 requirements. Evaluate the conformity of the software process and deliverables to applicable standards and assigned SIL levels. Assess the competence of project … and inspections at appropriate development phases, including witnessing of testing activities. Identify, assess, and document any non-conformities or deviations from requirements, evaluating their safety impact. Ensure that the assessment plan is implemented and that all findings are clearly documented in a Software Assessment Report. Provide an independent professional judgment on the software’s fitness for purpose, including … any constraints, assumptions, or risks. Maintain thorough assessment records and provide recommendations for improvement or risk control. Key Competencies & Experience : Proven technical competence in software engineering within a safety-critical or regulated domain (e.g. rail, automotive, aerospace, medical, industrial). In-depth understanding of BS EN 50716, BS EN 50128, and/or BS EN 50657. Experience in More ❯
standards and lifecycle assurance within complex embedded or control software systems. Key Responsibilities Develop a full understanding of the software and its operational environment. Produce and maintain a Software Assessment Plan in line with BS EN 50716 requirements. Evaluate the conformity of the software process and deliverables to applicable standards and assigned SIL levels. Assess the competence of project … and inspections at appropriate development phases, including witnessing of testing activities. Identify, assess, and document any non-conformities or deviations from requirements, evaluating their safety impact. Ensure that the assessment plan is implemented and that all findings are clearly documented in a Software Assessment Report. Provide an independent professional judgment on the software’s fitness for purpose, including … any constraints, assumptions, or risks. Maintain thorough assessment records and provide recommendations for improvement or risk control. Key Competencies & Experience : Proven technical competence in software engineering within a safety-critical or regulated domain (e.g. rail, automotive, aerospace, medical, industrial). In-depth understanding of BS EN 50716, BS EN 50128, and/or BS EN 50657. Experience in More ❯
program access required for the position in the future. Job responsibilities include but are not limited to the following: -Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. -Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance, and disposal. … hardware and software specifications. The selected candidate will be part of a team responsible for designing and implementing cyber security requirements and controls for advanced space systems. This includes riskassessment of the system of interest to attackers by applying risk analysis methodologies such as attack trees and cyber threads (drawn from security CONOPS) to identify vulnerabilities … Experience with DoD or IC Space Program(s) -Experience working on a multidisciplinary team -Ability and comfort to interface with all levels of employees and management -Experience with the Risk Management Framework (RMF) for both IC (ICD 503) and DoD (DoDI 8510.01) communities -Experience with COMSEC and Key Management -Knowledge of Program Protection and OPSEC -Understanding of Anti-Tamper More ❯
fellow TechOps & Delivery team members and act as a consultant to cross-functional project teams. Evaluate emerging technologies and make recommendations on adoption to improve operational efficiency and security. RiskAssessment & Compliance Collaborate with information security teams to implement best practices, including hardening, patching, and threat mitigation. Ensure solutions comply with security, regulatory, and organizational standards. Qualifications & Experience More ❯
fellow TechOps & Delivery team members and act as a consultant to cross-functional project teams. Evaluate emerging technologies and make recommendations on adoption to improve operational efficiency and security. RiskAssessment & Compliance Collaborate with information security teams to implement best practices, including hardening, patching, and threat mitigation. Ensure solutions comply with security, regulatory, and organizational standards. Qualifications & Experience More ❯
fellow TechOps & Delivery team members and act as a consultant to cross-functional project teams. Evaluate emerging technologies and make recommendations on adoption to improve operational efficiency and security. RiskAssessment & Compliance Collaborate with information security teams to implement best practices, including hardening, patching, and threat mitigation. Ensure solutions comply with security, regulatory, and organizational standards. Qualifications & Experience More ❯
fellow TechOps & Delivery team members and act as a consultant to cross-functional project teams. Evaluate emerging technologies and make recommendations on adoption to improve operational efficiency and security. RiskAssessment & Compliance Collaborate with information security teams to implement best practices, including hardening, patching, and threat mitigation. Ensure solutions comply with security, regulatory, and organizational standards. Qualifications & Experience More ❯
london (city of london), south east england, united kingdom
WSS Associates
fellow TechOps & Delivery team members and act as a consultant to cross-functional project teams. Evaluate emerging technologies and make recommendations on adoption to improve operational efficiency and security. RiskAssessment & Compliance Collaborate with information security teams to implement best practices, including hardening, patching, and threat mitigation. Ensure solutions comply with security, regulatory, and organizational standards. Qualifications & Experience More ❯