Birmingham, West Midlands (County), United Kingdom
Syntax Consultancy Ltd
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP ). Experience with Windows Group Policy Objects and access/permissions control via GPO. More ❯
Shell scripting (Bash, KornShell, etc.) Infrastructure as Code (IaC): Ansible, Terraform, Puppet, Chef Process and job control (cron, at, systemd timers) Networking fundamentals (TCP/IP, DNS, DHCP, NFS, SSH, FTP) Filesystem management (LVM, ext4, XFS, ZFS) Performance tuning and monitoring (top, vmstat, iostat, sar, netstat) Exposure to automation software such as Ansible/Puppet Knowledge of scripting with Bash More ❯
Linux & Windows 10 development experience GIT, GitHub and collaborative software development Nice-to-Haves: AWS (S3, SageMaker, Lambdas) MLOps, CI/CD processes PyTorch-Ignite TypeScript & Semantic UI React SSH and secure deployment workflows Bonus Skills: JIRA & Confluence ClearML What We Value At Hawk-Eye, our culture is built on openness , collaboration , and technical excellence . Here's what we More ❯
being conducted to a satisfactory level & are evidenced to a required level. * Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. * SSH Key Management. * Certificate management * HSM configuration/installation/support * Incident management * Change management * ITIL * Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Investigo
the operations, aligning with the Crypto strategy and wider departmental goals. Key Responsibilities Manage cryptographic hardware (HSMs - Thales, Entrust, Gemalto, etc.), including installation, configuration, and on-site activities Perform SSH key and certificate management Support cryptographic key lifecycle activities: generation, distribution, storage, recovery, and deletion Maintain accurate documentation and perform regular risk and compliance checks Handle incident, problem, and change More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯