Shell scripting (Bash, KornShell, etc.) Infrastructure as Code (IaC): Ansible, Terraform, Puppet, Chef Process and job control (cron, at, systemd timers) Networking fundamentals (TCP/IP, DNS, DHCP, NFS, SSH, FTP) Filesystem management (LVM, ext4, XFS, ZFS) Performance tuning and monitoring (top, vmstat, iostat, sar, netstat) Exposure to automation software such as Ansible/Puppet Knowledge of scripting with Bash More ❯
Linux & Windows 10 development experience GIT, GitHub and collaborative software development Nice-to-Haves: AWS (S3, SageMaker, Lambdas) MLOps, CI/CD processes PyTorch-Ignite TypeScript & Semantic UI React SSH and secure deployment workflows Bonus Skills: JIRA & Confluence ClearML What We Value At Hawk-Eye, our culture is built on openness , collaboration , and technical excellence . Here's what we More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Investigo
the operations, aligning with the Crypto strategy and wider departmental goals. Key Responsibilities Manage cryptographic hardware (HSMs - Thales, Entrust, Gemalto, etc.), including installation, configuration, and on-site activities Perform SSH key and certificate management Support cryptographic key lifecycle activities: generation, distribution, storage, recovery, and deletion Maintain accurate documentation and perform regular risk and compliance checks Handle incident, problem, and change More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
with HSM management and monitoring tools, as well as automation and Scripting skills (Python or similar). Key Responsibilities: HSM configuration, installation, and support (Thales, Entrust, Gemalto or equivalent) SSH key and certificate management Cryptographic key life cycle management across IBM, Tandem, Unix platforms Incident and change management Maintaining audit trails and governance records Supporting cryptographic infrastructure and delivering to More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
in Knutsford . Key Responsibilities Manage and configure HSMs (Thales, Entrust, Gemalto or similar) Monitor HSM health using appropriate tools Automate cryptographic processes using Python or other scripting languages SSH key and certificate lifecycle management Generate key components across IBM, Tandem, Unix platforms Support incident, change, and problem management (ITIL-aligned) Maintain accurate documentation and audit trails Collaborate with stakeholders More ❯
Coventry, West Midlands, England, United Kingdom Hybrid / WFH Options
Lorien
understanding of Group Policy, DNS, DHCP Microsoft Exchange Server administration experience Excellent troubleshooting skills across Windows-based applications Familiarity with core protocols: TCP/IP, FTP, HTTP(S), SMTP, SSH, Telnet, TLS/SSL, SNMP Experience working within an ITIL framework The Benefits: Salary up to £66,200 (12-month FTC) Hybrid working model (1 day onsite in Coventry) Discretionary More ❯
as regional compliance standards, relevant local regulations, and applicable laws Knowledge of cryptographic modules and solutions, eg TPMs, Good understanding on IT Infrastructure technical platforms/technologies Understanding of SSH/SSL functionality and usage Experience interfacing with technology teams to bring lab concepts to market within an organization and building effective operational models to ensure capabilities are able to More ❯
with business logic, we want to hear from you. Responsibilities Manage and support Hardware Security Modules (HSMs) and associated key management processes. Contribute to secure cryptographic practices including PKI, SSH, symmetric/asymmetric encryption. Assist with application connectivity and infrastructure related to secure traffic flow and encryption. Perform or support secure key ceremonies and data centre activities. Collaborate closely with More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
The Cryptographic Operations Specialist supports secure, compliant, and reliable cryptographic and key management services across the organization. This includes managing cryptographic infrastructure (e.g., HSMs), key lifecycle activities, certificate and SSH key management, and maintaining risk and compliance standards. Key Responsibilities: Manage cryptographic infrastructure (HSMs, key generation/distribution, SSH keys, certificates). Support cryptographic operations across platforms (IBM, Tandem, Unix More ❯