National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Business Control Specialist - Technical

Bromley
1 week ago
Create job alert

Role: Business Control Specialist - Technical

Duration: 12 Months

Location: Bromley (Hybrid) 3 days in office

Rate: £700 per day (umbrella)

Are you a dynamic professional with a passion for risk management and technology? Our client is looking for a Business Control Specialist to lead the charge in enhancing compliance and operational risk within their technology teams. This role is the perfect opportunity for someone who thrives in a fast-paced environment and enjoys collaborating across diverse teams.

What You'll Do:

In this pivotal role, you will:

Lead Risk Management: Collaborate with two Technology Executives to foster a culture of risk identification, escalation, and timely mitigation.
Drive Analysis: Utilize your analytical skills to perform impact assessments and identify root causes related to technology control activities.
Provide Training: Offer guidance and training to team members while monitoring the health of audit issues throughout their lifecycle.
Enhance Collaboration: Work closely with teams across Technology, Operations, Audit, and GIS to identify opportunities for control improvement and risk reduction.Key Responsibilities:

Execute risk mitigation strategies to ensure compliance with laws and regulations.
Partner with various technology organizations and divisional leads to enhance risk management practices.
Present recommendations to leadership for efficient risk identification and remediation.
Leverage your technical expertise in data management, information security, or network operations to ensure policy adherence.
Oversee end-to-end issue management activities, including action plan development for audit and compliance issues.What We're Looking For:

Experience: Years in technology, ideally with a focus in financial services or risk.
Technical Expertise: Proficiency in areas such as data management, artificial intelligence, or information security.
Communication Skills: Ability to translate complex technical information into clear, concise language for various audiences.
Change Advocacy: A proven record of advocating for and embracing change across diverse stakeholder groups.
Collaboration Skills: Strong ability to positively influence and motivate teams.
Problem-Solving Mindset: Comfort with ambiguity and a knack for simplifying complex problems.
Strategic Thinking: Self-starter attitude, organized, and capable of executing priorities with minimal oversight.Pontoon is an employment consultancy. We put expertise, energy, and enthusiasm into improving everyone's chance of being part of the workplace. We respect and appreciate people of all ethnicities, generations, religious beliefs, sexual orientations, gender identities, and more. We do this by showcasing their talents, skills, and unique experience in an inclusive environment that helps them thrive. If you require reasonable adjustments at any stage, please let us know and we will be happy to support you

Related Jobs

View all jobs

Technology Risk Manager

IT Manufacturing Specialist

Senior Building Control Surveyor

Technical Risk Specialist

Security Consultant

Head of Information Technology

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.

Part-Time Study Routes That Lead to Cyber Security Jobs: Evening Courses, Bootcamps & Online Masters

The frequency and sophistication of cyber-attacks have exploded in recent years, making cyber security one of the UK’s most in-demand skill sets. From safeguarding NHS patient data to defending FTSE 100 financial systems, organisations across sectors require qualified professionals—penetration testers, security analysts, incident responders and security architects—to protect critical infrastructure. Yet many professionals cannot pause their careers to upskill full time. Fortunately, an ecosystem of part-time learning pathways—evening courses, intensive bootcamps and flexible online master’s programmes—enables you to learn cyber security while working. This comprehensive guide explores every route: foundational CPD, immersive bootcamps, accredited online MScs, plus funding options, planning strategies and a real-world case study. Whether you’re an IT support technician, a software developer or a compliance manager aiming to pivot into security, you’ll discover how to build expertise at your own pace.

The Ultimate Assessment-Centre Survival Guide for Cyber Security Jobs in the UK

Assessment centres for cyber security positions in the UK are designed to mirror real-world threat landscapes and test both your technical acumen and soft skills under pressure. Across multiple stages—psychometric assessments, penetration testing exercises, incident response group tasks, case studies, interviews and even informal networking breaks—employers assess your ability to identify vulnerabilities, collaborate in high-stakes scenarios and communicate effectively. This guide walks you through each component, equipping you to stand out and secure your next role in cyber defence.