RFP/RFQ responses. • Engage with program and division managers to establish financial budgets and reporting structures. • Ensure DCAA audit compliance and oversee incurred cost submissions (ICS). • Support management in building and managing budgets, resource allocations, and conducting regular program management reviews focused on financials. • Monitor revenue and expenses, coordinate financial data consolidation, and prepare special reports. … such as Aprio, Forvis, Dixon Hughes, or other CPA firms specializing in GovCon. • Deep understanding of Federal government contract pricing, contract types (FFP, T&M, CPFF, etc.), and financial risk management. • Proven ability to develop scalable financial processes, reporting structures, and compliance frameworks for government contractors. • Strong leadership capabilities with the ability to manage, supervise, and coordinate teams effectively. … Detail-oriented with excellent time management skills, capable of handling multiple responsibilities in a deadline-driven environment. • Must have a strong backbone to handle leadership responsibilities and work collaboratively with executive leadership to drive financial strategy. Desired Skills & Qualifications: • Certified Public Accountant (CPA) credential. • Experience in Project Management (PMP certification preferred). • Prior experience in contract managementMore ❯
employee at M.C. Dean, you will join forces with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the … include requirements elicitation, analysis and functional allocation, conducting systems requirements reviews, developing concepts of operation and interface standards, developing system architectures, and performing technical/non-technical assessment and management as well as end-to-end flow analysis Implements comprehensive SOA solutions Develops scenarios (threads) and an Operational Concept that describes the interactions between the system, the user, and … changes to requirements, considers impacts prior to commitment to change, gains stakeholder buy-in, eliminates ambiguity, ensures traceability to source requirements, and tracks and settles open actions Assess each risk to the program and determine the probability of occurrence and quantified consequence of failure in accordance with an approved riskmanagement plan Manages and ensures the technical More ❯
Job Opportunity: Privacy Advisor/Business Analyst (Mergers & Acquisitions) Are you ready to make a significant impact in the world of privacy within the dynamic sectors of insurance, riskmanagement, and consulting? Our client, a global leader in their field, is looking for an experienced Privacy Advisor/Business Analyst (Mergers & Acquisitions) to join their fast-paced privacy … organization's Data Privacy Framework requirements. Engage Collaboratively: Work closely with diverse teams to deliver activities needed for compliance with the Global M&A Privacy Framework. Key Responsibilities: Privacy RiskManagement: Identify and manage privacy risks throughout the M&A lifecycle. Develop Privacy M&A Playbooks: Create playbooks to systematically manage privacy risks. Conduct Privacy Due Diligence: Perform More ❯
employee at M.C. Dean, you will join forces with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the … include requirements elicitation, analysis and functional allocation, conducting systems requirements reviews, developing concepts of operation and interface standards, developing system architectures, and performing technical/non-technical assessment and management as well as end-to-end flow analysis Implements comprehensive SOA solutions Develops scenarios (threads) and an Operational Concept that describes the interactions between the system, the user, and … changes to requirements, considers impacts prior to commitment to change, gains stakeholder buy-in, eliminates ambiguity, ensures traceability to source requirements, and tracks and settles open actions Assess each risk to the program and determine the probability of occurrence and quantified consequence of failure in accordance with an approved riskmanagement plan Manages and ensures the technical More ❯
for extension. Role Background: EMEA Compliance Transformation Programme is a strategic initiative to modernise compliance functions across 19 countries. The programme aims to enhance operational efficiency, regulatory responsiveness, and riskmanagement through technology, data, and process optimisation. The Business Analyst will play a key role in capturing and analysing business processes, identifying improvement opportunities, and supporting the development … and Change Managers to ensure alignment across workstreams and successful delivery of transformation objectives Knowledge, Skills & Experience: Solid experience as a Business Analyst in financial services, preferably within Compliance, Risk, or Regulatory Change. Strong understanding of regulatory obligations management and compliance operations. Demonstrated experience documenting business requirements for third-party or consultancy-delivered solutions (e.g., with Big More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Adecco
Job Opportunity: Privacy Advisor/Business Analyst (Mergers & Acquisitions) Are you ready to make a significant impact in the world of privacy within the dynamic sectors of insurance, riskmanagement, and consulting? Our client, a global leader in their field, is looking for an experienced Privacy Advisor/Business Analyst (Mergers & Acquisitions) to join their fast-paced privacy … organization's Data Privacy Framework requirements. Engage Collaboratively: Work closely with diverse teams to deliver activities needed for compliance with the Global M&A Privacy Framework. Key Responsibilities: Privacy RiskManagement: Identify and manage privacy risks throughout the M&A lifecycle. Develop Privacy M&A Playbooks: Create playbooks to systematically manage privacy risks. Conduct Privacy Due Diligence: Perform More ❯
Head of Decision Science We are looking for a Head of Decision Science to join our Decision Science team within Risk. The Risk team plays a crucial role in Funding Circle. They ensure our borrowers and investors get what we promise, use data and modelling to provide insights to the rest of the business, control and monitor the risk … Chief Credit Officer, advising on the use of statistical models and advanced quantitative techniques to optimise business performance Working across our UK business, you will collaborate with experts in riskmanagement, technology, data management, marketing, business operations to understand business needs and shape analytical solutions Managing a team of data scientists you will be responsible for designing More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. RiskManagement & Compliance - Proficiency in identifying potential security risks, conducting risk assessments, and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and … maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. Security Automation & Scripting - Familiarity with scripting languages (such as Python, PowerShell, or Bash More ❯
Facilitate communication between stakeholders, development teams, and other departments. • Ensure adherence to software development lifecycle (SDLC) processes and best practices. • Develop detailed project plans, including timelines, resource allocation, and riskmanagement strategies. • Monitor project progress, identify potential issues, and implement corrective actions as needed. • Provide technical guidance and support to development teams. • Prepare and present project status reports … Design and Development. • Strong technical background with expertise in Java, Python, Typescript, AWS, React JS, and Angular. • Proven experience managing end-to-end project lifecycles. • Exceptional leadership and team management skills. • Excellent problem-solving and analytical abilities. • Strong communication and interpersonal skills. • Designed scalable software architectures and developed robust REST APIs. • Proficient in Java, Python, TypeScript, AWS, React JS More ❯
program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the RiskManagement Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on RMF assessment and authorization issues Perform risk assessments and … security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing More ❯
into existing infrastructure. • Collaborate with other teams and team members to develop automation strategies and deployment processes. • Develop, implement and maintain security controls and supporting documentation as required for riskmanagement framework (RMF). • Fault finding, analysis and of logging information for reporting of performance exceptions. • Support security incident reporting, vulnerability assessments, and information assurance compliance scans. • Maintain … system evaluations and certifications. • Facilitate the creation and maintenance of Identity and Device Management • Provide platform administration for Linux based applications. • Provide input on ways to improve the stability, security, efficiency, and scalability of the environment. • Maintain best practices on managing systems and services across all environments. Requirements • Associate or bachelor's degree in a related field, or two … etc. • Solid knowledge of protocols such as DNS, HTTP, LDAP, SMTP and SNMP • Experience acquiring and installing software from different sources (ie: vendor tar files, repos) • Identity and Device Management (ie: Active Directory, Kerberos, PAM, SSSD) • Experience using Windows operating systems, Microsoft Office, and other productivity software. • Knowledge of networking concepts (ie: VLANs & IPV6) and troubleshooting techniques. • Strong customer More ❯
lead, coach, and manage our software implementation teams and their projects of implementing applications and services. You will be a key person to exemplify excellence in business and project management processes and procedures. You will also set best-practice measures in order to maximiz, and consequently: Responsibilities: Provide industry related expertise to internal teams, implementation partners as well as … existing and prospective customers Coach, direct, and oversee our implementation teams and their subsequent implementation projects Review implementation scope, execution plan and deliverable schedules in collaboration with other senior management personnel and stakeholders Monitoring overall team workload, forecast, identify, and address possible team bottlenecks, and formulate team manpower strategies as a whole Proactively manage resource allocation and execution plans … relevant business department leading experience is required, preferably in enterprise systems implementation Solid experience in enterprise systems implementation, preferably in retail and consumer products businesses Excellent organizational and time management skills Familiar with software application implementation processes, preferably with thorough knowledge in Agile Strength in theoretical and practical aspects of project management. PMP Certification, a plus Ability to effectively More ❯
driving alignment between security and business objectives. As a Security GRC Consultant, you’ll act as the crucial link between central security teams and business units, ensuring robust governance, riskmanagement, and compliance practices are not only adopted but embedded across complex environments. What You’ll Do - Act as the primary liaison between security functions and key business … stakeholders, ensuring security requirements are aligned to business priorities.- - Champion the integration of governance, risk, and compliance controls across projects, processes, and systems. - Assess and remediate gaps in security practices and influence operational teams to adopt security-first approaches. - Drive adherence to industry standards and frameworks such as ISO 27001, NIST, or similar. - Provide expert input to enhance security More ❯
scenario planning, task sequencing, dependencies, and timing. Collaboration: Work closely with engineering, infrastructure, infosec, and operations teams to validate readiness for the cutover and any necessary failback procedures. Requirement Management: Identify, document, and manage all technical cutover requirements, including data needs, system configurations, interface activations, and rollback procedures. Checkpoint Definition: Establish technical checkpoints, rollback plans, and contingency strategies to … mitigate risks. Compliance Assurance: Ensure all activities align with change management processes, operational constraints, safety protocols, security standards, and regulatory requirements. Rehearsal Management: organise and manage cutover rehearsals, dry runs, and simulations to ensure the viability of cutover scenarios and the effectiveness of the runbook. Execution Leadership: Provide technical leadership during the cutover execution phase, ensuring adherence to … cutover runbooks for complex, mission-critical systems. In-depth knowledge of system integration infrastructure readiness and network configuration within Operational Technology (OT) environments. Familiarity with cybersecurity requirements and operational riskmanagement for Critical National Infrastructure (CNI). Strong problem-solving abilities, documentation skills, and coordination capabilities under high-pressure conditions. Excellent communication skills, with the capacity to lead More ❯
scenario planning, task sequencing, dependencies, and timing. Collaboration: Work closely with engineering, infrastructure, infosec, and operations teams to validate readiness for the cutover and any necessary failback procedures. Requirement Management: Identify, document, and manage all technical cutover requirements, including data needs, system configurations, interface activations, and rollback procedures. Checkpoint Definition: Establish technical checkpoints, rollback plans, and contingency strategies to … mitigate risks. Compliance Assurance: Ensure all activities align with change management processes, operational constraints, safety protocols, security standards, and regulatory requirements. Rehearsal Management: organise and manage cutover rehearsals, dry runs, and simulations to ensure the viability of cutover scenarios and the effectiveness of the runbook. Execution Leadership: Provide technical leadership during the cutover execution phase, ensuring adherence to … cutover runbooks for complex, mission-critical systems. In-depth knowledge of system integration infrastructure readiness and network configuration within Operational Technology (OT) environments. Familiarity with cybersecurity requirements and operational riskmanagement for Critical National Infrastructure (CNI). Strong problem-solving abilities, documentation skills, and coordination capabilities under high-pressure conditions. Excellent communication skills, with the capacity to lead More ❯
employee at M.C. Dean, you will join forces with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the … include requirements elicitation, analysis and functional allocation, conducting systems requirements reviews, developing concepts of operation and interface standards, developing system architectures, and performing technical/non-technical assessment and management as well as end-to-end flow analysis Implements comprehensive SOA solutions Develops scenarios (threads) and an Operational Concept that describes the interactions between the system, the user, and … changes to requirements, considers impacts prior to commitment to change, gains stakeholder buy-in, eliminates ambiguity, ensures traceability to source requirements, and tracks and settles open actions Assess each risk to the program and determine the probability of occurrence and quantified consequence of failure in accordance with an approved riskmanagement plan Manages and ensures the technical More ❯
employee at M.C. Dean, you will join forces with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the … include requirements elicitation, analysis and functional allocation, conducting systems requirements reviews, developing concepts of operation and interface standards, developing system architectures, and performing technical/non-technical assessment and management as well as end-to-end flow analysis Implements comprehensive SOA solutions Develops scenarios (threads) and an Operational Concept that describes the interactions between the system, the user, and … changes to requirements, considers impacts prior to commitment to change, gains stakeholder buy-in, eliminates ambiguity, ensures traceability to source requirements, and tracks and settles open actions Assess each risk to the program and determine the probability of occurrence and quantified consequence of failure in accordance with an approved riskmanagement plan Manages and ensures the technical More ❯
program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the RiskManagement Framework (RMF) with emphasize on Joint SAP Implementation Guide (JSIG) authorization process Advise customer on RMF assessment and authorization issues Perform risk assessments and make recommendations … security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by More ❯
to a system are implemented and functional Monitor and resolve Plan of Action and Milestones (POA&M) to mitigate system vulnerabilities on assigned Information Systems Develop and provide IA riskmanagement recommendations to the customer Basic Qualifications: A minimum of 5 years of relevant experience in Air Force or industry standards for Cyber Security and system accreditation pr … System Architecture and Engineering (IASAE) Level II certification IAW DoDM 8140.03 and DAFMAN 17-1305 Knowledge of the following: Endpoint Security Assured Compliance Assessment Solution (ACAS) Threat Hunting and Risk Analysis Intrusion Detection System DISA STIG Security Clearance Requirements: Current Secret Clearance Benefits: K2 Group's benefit offerings include: Medical/Dental/Vision Insurance; FSA Medical & FSA Dependent More ❯
functions, ensuring a seamless and reliable experience for all teams across the organisation. Work in close partnership with the Information Security Officer (ISO) to continuously evolve our Information Security Management System (ISMS), balancing strong protection with ease of adoption. Provide efficient, empathetic IT support across hardware, software, VPNs, and cloud-based services, with a strong focus on user experience. … Build trusted relationships with the Risk Committee, ensuring compliance and security needs are addressed in a pragmatic, balanced way. Review and streamline our SaaS ecosystem-optimising cost, security, and scalability while empowering teams with the right tools. Identify and implement improvements in IT processes, reducing friction and bureaucracy while maintaining smart, sustainable structure. Lead the transition from Google Workspace … environment where they can thrive and contribute meaningfully. A collaborative, inclusive leadership style that builds trust and engagement across technical and non-technical teams. Strong IT security, compliance, and riskmanagement experience; familiarity with ISO 27001, SOC 2, or similar frameworks is a plus-backed by support from our compliance team. Familiarity with tools like Google Workspace, Microsoft More ❯
integration, regression, and user acceptance, you name it! Teamwork makes the dream work: You'll be the ultimate collaborator, working hand-in-hand with developers, product managers, and senior management to ensure seamless delivery. Planning like a pro: You'll develop and maintain comprehensive test strategies and plans to guarantee tip-top product delivery. Keeping things ticking: You'll … to our stakeholders, helping us make the best decisions. Optimising everything: You'll help select and implement the best testing tools and frameworks to make our testing super-efficient. Riskmanagement marvel: You'll proactively manage quality and project risks, sorting out any bumps in the road before they become a problem. Communication champion: You'll be the … our QA practices top-notch. What you'll bring: An in-depth understanding of software development life cycles (SDLC) and methodologies, especially Agile frameworks . Strong skills in stakeholder management and cross-functional collaboration . Excellent written and verbal communication skills . Proficient JavaScript skills to support technical testing. The ability to define detailed test specifications from project requirements More ❯
in Public Key Infrastructure (PKI) including Transmission Layer Security (TLS) and certificate/key management. Willingness to travel up to 10% of time Preferred Additional Skills: Understanding of Key Management Systems including Electronic Key Management System (EKMS) and Key Management Infrastructure (KMI) as they impact the design of End Cryptographic Units (ECUs) Experience with Cybersecurity and RiskManagement Framework Cybersecurity Credential (e.g., CISSP) Model-Based Systems Engineering (MBSE) experience highly desirable More ❯
existing business analytic platforms. The Contractor shall be directly responsible for solutions related to the Sponsor's analytic work in these key areas: availability, latency, performance, efficiency, documentation, change management, monitoring, security, emergency response, and capacity planning. The Contractor shall apply, develop and deploy cloud microservices and integration of cloud resources with on prem high performance computation servers to … host information. The Contractor shall create software pipelines to query databases of interest, combine and merge data sources, and analyze information. The Contractor shall use the Sponsor's knowledge management, version control, coding standards, and delivery platforms. The Contractor shall champion and manage requirements, builds, upgrades, and fixes within multiple (dev, test, production) environments. The Contractor shall assist developers … at the direction of the Sponsor. The Contractor shall use a microservice-based architecture and agile coding for engineering and development activities to support reliable network performance, modern resource management, and security processes. The Contractor shall develop analytical software packages, pipelines, and custom virtual environments for deployment in secure environments including standalone workstations, standalone compute clusters, secure cloud environments More ❯
Do EC&I Compliance & Safety; Ensure full compliance with COMAH regulations and safety standards. Oversee Safety Critical Equipment (SCEs) planning and inspection. Lead root cause analysis, incident investigations, and risk mitigation. Maintain robust plant integrity and contractor quality control Reliability & Performance; Lead site-wide EC&I reliability strategy and improvement initiatives. Deliver year-on-year gains in asset availability … and uptime. Monitor asset data and resolve performance issues with strategic CAPEX planning. Develop maintenance techniques and coordinate major shutdowns Budget Management & Projects; Own and manage site maintenance budgets. Deliver cost-effective, value-driven reliability solutions. Oversee delivery of engineering projects and ensure third-party compliance. Team Leadership & Development; Lead and grow a high-performing Reliability & Compliance team. Foster … EC&I compliance, and maintenance strategy Strong experience with SAP, project delivery, and budget control Proven leadership track record and ability to develop high-performance teams Exceptional stakeholder engagement, riskmanagement, and decision-making skills What We Offer Competitive base salary, annual bonus scheme and enhanced company pension scheme Private healthcare care and life assurance Employee Assistance Programme More ❯
in Active Directory and create and modify Group Policy Objects. • Report on system uptime and SLA performance. • Audit server utilization. • Assist in building, coordinating, maintaining, changing, and updating, the RiskManagement Framework (RMF) Assessment and Authorization (A&A) packages for the five enclaves administered by AFOSI. • Ensure that all application deliverables and systems comply with applicable DISA STIGs … Horizon. • Experience administering servers in a virtualized production environment using VMWare vSphere 7.x or 8.x technology. • Experience with PowerShell for command line and scripting to include scripting for account management, patch deployment, software inventory, service control, and/or object attribute modification. • Experience installing, configuring, and maintaining servers with Microsoft Windows. • Experience with rack mounted or blade server hardware. … backup and restore procedures, and disaster recovery planning. • Must have experience with RMF and applying STIGs. • Working knowledge of IT Systems Maintenance Compliance processes to include information assurance vulnerability management (IAVM). • Experience creating, reviewing, and revising security documentation and artifacts. • Strong understanding of network fundamentals to include TCP/IP and sub-nets desired. • Experience with Storage Area More ❯