environments, industry standards and regulation in relation to technology, cyber security and resilience Relevant qualification...*Relevant qualification in Change, Technology, or related Risk Management qualification Ability to analyse, interpret...
Experistraining for all employees and managers Monitor the performance of Group data, compliance and cyber security risk activities... departments to provide guidance and support on data protection/cyber security and compliance matters. Key Responsibilities...
Taylor Rootwith other technology teams in cyber security, data, client support, delivery and platforms, and help support the CIO as he designs... and proposition, better enablement of work in other areas of the business, and a critical contributor to the company’s cyber security...
The Office Groupof technology, work closely with other technology teams in cyber security, data, client support, delivery and platforms, and help... contributor to the company’s cyber security posture. The successful candidate will be able to think strategically and lead...
The Office Groupand mitigates cyber-risk, protecting EY and client data, and our information management systems. The opportunity This exciting... technology needs by focusing on a better user experience. Information Security (Info Sec) - Info Sec prevents, detects, responds...
EYimprovement Testing Technical and end-user documentation User training Applying security principles including Cyber... will be your breath of experience in delivering reliable and responsive application management and security services to colleagues, backed...
Unicefsecurity efforts, encompassing physical and cyber aspects, to safeguard organisational assets and data Provide inspirational... management efficiency, optimise business processes and controls as well as mitigate risk whilst adopting a continuous improvement...
Morgan Law, Cyber, Bloodstock, Aviation, Space, Offshore Energy and A&H. Responsibilities will include: Working with the Global Head... required to better understand non-natural catastrophe aggregation risk across the Group Management of team responsible for creating and enhancing...
Canopius, patterns, guidance and continuously improve processes. Providing privacy advice and support to Cyber Security and Corporate... Security incident and investigation managers on data breach management Participating and contributing to incident management...
Vodafone, availability, and security of our data to mitigate the risk of disruption to the Group’s Important Business Services. The Data... Britain prosper. A resilient organisation instils confidence and trust with customers, staff and regulators, reduces risk...
Lloyds Banking Groupsolutions, proactively guard against cyber threats, and leverage machine learning alongside financial engineering... in risk management, big data, mobile and more. We look for creative collaborators who evolve, adapt to change and thrive...
Goldman SachsRecovery Management Capacity Management Experience supporting cyber security applications along with working knowledge... of our global IT infrastructure, application support, ITSM function and ensuring optimal functionality, security, and scalability...
State Streeta number of classes of business including war and terrorism, energy, marine, financial lines, cyber, transport, political risk, crisis... package that extends beyond time spent at work to offer benefits focused on your health, wellbeing and financial security...
AIGand management teams that lead them. We’ll broaden your horizons Manage risk for our clients to make them stronger for the future.... Our Digital & Risk Advisory Services (DRAS) are designed to enable organisations to leverage our innovative methodologies...
BDOfinancial crime, legal and cyber security, all within the financial and professional services sectors in the United Kingdom... headquartered hedge fund client's Portfolio Risk Team. Reporting into the Head of Investment Compliance who is based in London, the...
Rutherford Searchincluding cyber security and how they apply in Financial Services organizations including the impact of regulation... party vendor/outsourcing, corporate risk policies and standards Strong understanding of risk management practices...
Northern Trustenvironment including, commercial sandboxes, proxies, DLP, OSINT, vulnerability management, cyber and vendor risk management... you use (For example: she/her, he/him, they/them, etc). At Bumble the security of our customers is a top priority. As a threat detection...
Bumble