within private (VCF) and hyperscale (AWS, Azure, GCP) environments Knowledge of certificate auto-enrolment, key management, and hardware security modules (HSMs) Familiarity with relevant standards and policies such as X.509, RFC5280, TLS, FIPS 140-3, and NCSC or NIST identity guidance Background delivering within high-assurance, disconnected, or restricted network environments This contract offers the chance to take technical ownership More ❯
within private (VCF) and hyperscale (AWS, Azure, GCP) environments Knowledge of certificate auto-enrolment, key management, and hardware security modules (HSMs) Familiarity with relevant standards and policies such as X.509, RFC5280, TLS, FIPS 140-3, and NCSC or NIST identity guidance Background delivering within high-assurance, disconnected, or restricted network environments This contract offers the chance to take technical ownership More ❯
Liverpool, England, United Kingdom Hybrid/Remote Options
InPost UK
DNS. Experience of implementing, troubleshooting and operating Cisco Catalyst, Meraki and Nexus switches. Demonstrable understanding of network practises, including design and topology. Understanding of 802.1x, Windows-based PKI and x.509 certificates. Understanding of LAN Connectivity (Cat5/6, Multi-mode OM1, 2 & 3 fibre, single mode fibre & wireless bridging.) Knowledge of APC UPS and ATS devices. WLAN Experience of managing More ❯
CMVP-Focused Tasks): Perform end-to-end FIPS 140-2/3 validations: Derive test plans from module documentation, execute cryptographic algorithm tests (e.g., RNG, key exchange), PKI validations (X.509 chains, entropy assessment), and source code reviews for crypto implementations. Conduct physical security testing (e.g., using oscilloscope for side-channel analysis, tamper evidence checks) and logical analysis against Protection Profiles. …/analysis. OpenSSL/OpenPGP expertise; ADB/WinDBG debugging. Pen testing limited to crypto modules; CCNA or similar for lab networks. Active Directory/Linux in test setups; X.509 deep dives. Why This Role? Exciting growth in crypto validation-learn from CST lab leads, handle diverse modules (e.g., HSMs, software libs), and contribute to secure military comms. Competitive pay More ❯