<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel>
    <title>Cyber Risk and Compliance Specialist - Randstad Technologies Recruitment RSS Feed</title>
    <link>https://jobs.co.uk/job/cyber-risk-and-compliance-specialist-randstad-technologies-recruitment--e7cb8ef5-189e-4165-987b-dc65b2afe7ec</link>
    <description>RSS feed for Cyber Risk and Compliance Specialist at Randstad Technologies Recruitment.</description>
    <language>en-gb</language>
    <lastBuildDate>Sat, 23 May 2026 18:48:22 GMT</lastBuildDate>
    <item>
      <title>Cyber Risk and Compliance Specialist - Randstad Technologies Recruitment</title>
      <link>https://jobs.co.uk/job/cyber-risk-and-compliance-specialist-randstad-technologies-recruitment--e7cb8ef5-189e-4165-987b-dc65b2afe7ec</link>
      <guid>https://jobs.co.uk/job/cyber-risk-and-compliance-specialist-randstad-technologies-recruitment--e7cb8ef5-189e-4165-987b-dc65b2afe7ec</guid>
      <pubDate>Sun, 10 May 2026 23:00:00 GMT</pubDate>
      <description>Location: London | Salary: &amp;pound;500 - &amp;pound;520/day | Type: Contract | Compliance Specialist (Cyber Risk Management &amp; Assurance)   Are you a risk professional with a knack for bridging the gap between technical security and business compliance? We are looking for a  Compliance Specialist  to join our Risk, Legal, and Regulatory Affairs function.   In this role, you will play a pivotal part in safeguarding the organization by identifying and managing a broad spectrum of risks, with a specific focus on leading our  cyber security vulnerability management  efforts.   The Role   You will support the design and delivery of compliance activities, ensuring that regulatory, operational, and cyber risks are mitigated effectively. You will act as a key advisor, translating complex technical or regulatory issues into clear business impacts.    Key Responsibilities:      Risk Management:  Identify, track, and prioritize risks in line with enterprise frameworks.      Vulnerability Coordination:  Lead the identification and remediation of cyber security vulnerabilities within agreed timelines.      Control Assurance:  Design and execute second-line monitoring to test control effectiveness and identify gaps.     Remediation:  Drive the closure of control weaknesses ...</description>
      <category>Contract</category>
    </item>
  </channel>
</rss>