London, England, United Kingdom Hybrid / WFH Options
Sky
Design, build, and operate PKI solutions and environments. Manage Certificate Authority Administration, including Certificate Enrolment Web Service & Policy Web Service, and monitor Active Directory Certificate Services (ADCS). Manage KeyManagement Systems (KMS) to ensure robust cryptographic key security. Support and manage the PKI and Certificate deployment, automation, and Thales HSMs. Understand existing certificate use-cases and … of the PKI managed service for Sky and Comcast users, including certificate checks, issuing, and revoking. Work with App Service managed certificates, private and public certificates, and certificates from Key Vault. What You'll Bring Technical and professional leadership across the discipline. Deep knowledge of Information and/or Cyber Security, understanding of cybersecurity principles, practices, and frameworks like … with Certificate Authority Administration, ADCS monitoring. Familiarity with Data-in-motion and Data-at-rest Encryption techniques. Knowledge of PKI machine identity technologies like SSH, SSL, TLS. Experience managing KeyManagement Systems (KMS). Beneficial experience with PKI and Certificate deployment automation and Thales HSMs. Team Overview Cyber Security Our products, platforms, and technologies are constantly evolving. Protecting More ❯
Acadian Asset Management LLC is a Boston-headquartered investment management firm with wholly owned affiliates located in Singapore, London, and Sydney. As of March 31, 2025, the firm managed approximately US$122 billion on behalf of major pension funds, endowments, foundations, governments and other investors based in the U.S. and abroad.Position Overview:The Senior Security Engineer, reporting to … consistently governing our AWS Platform-as-a-Service (PaaS) infrastructure. We are looking for candidates with deep experience and understanding of continuous delivery, container security, SAST/DAST, secrets management, Identity and Access Management (IAM) governance, privilege management, encryption and keymanagement, threat detection, logging, cloud infrastructure security and policy-as-code.What You’ll Do … the Identity and Config team to ensure least privilege in Acadian’s federated identity systems, utilizing tools such as Saviynt, Okta and Microsoft Entra ID. Assist with federation of key enterprise applications as necessary.· Build Security infrastructure in AWS using Terraform and Cloudformation, leveraging best practices such as multi-region and multi-Availability zone architecture with autoscaling.· Assist with More ❯
Goldman Sachs is a leading global investment banking, securities, and investment management firm that provides a wide range of services worldwide to a substantial and diversified client base, including corporations, financial institutions, governments, and high net-worth individuals. Founded in 1869, it is one of the oldest and largest investment banking firms. Secrets and Encryption Services is part of … the Identity and Access Management (IAM) business unit within the Core Engineering Division of Goldman Sachs. Our mission is to protect the firm and our clients from cyber threats such as credential compromise through the services we deliver and operate. The S&ES team is on a journey to uplift credential management solutions across the enterprise, including the … integration and adoption of HashiCorp Vault across environments. The Role Role Overview: We are seeking a motivated and skilled Platform Engineer with an interest in cybersecurity and secrets management to join our team. The candidate will contribute to ensuring the reliability, performance, and scalability of our platform and infrastructure while learning and implementing security best practices. The role involves More ❯
Goldman Sachs is a leading global investment banking, securities and investment management firm that provides a wide range of services worldwide to a substantial and diversified client base that includes corporations, financial institutions, governments and high net-worth individuals. Founded in 1869, it is one of the oldest and largest investment banking firms. Secrets and Encryption Services is part … of the Identity and Access Management (IAM) business unit within Core Engineering Division of Goldman Sachs. Our mission is to protect the firm and our clients from cyberthreats such as credential compromise through the services we deliver and operate. The S&ES team is on a journey to uplift credential management solutions across the enterprise with a transformational … adoption of HashiCorp Vault across environments. The Role Role Overview: We are looking for a motivated and skilled Platform Engineer with a developing interest in cyber security and secrets management to join our team. The ideal candidate will contribute to ensuring the reliability, performance, and scalability of our platform and infrastructure while learning and implementing security best practices. This More ❯
at Goldman Sachs Get AI-powered advice on this job and more exclusive features. Job Description Job Description Goldman Sachs is a leading global investment banking, securities and investment management firm that provides a wide range of services worldwide to a substantial and diversified client base that includes corporations, financial institutions, governments and high net-worth individuals. Founded in … it is one of the oldest and largest investment banking firms. Secrets and Encryption Services is part of the Identity and Access Management (IAM) business unit within Core Engineering Division of Goldman Sachs. Our mission is to protect the firm and our clients from cyberthreats such as credential compromise through the services we deliver and operate. The S&ES … team is on a journey to uplift credential management solutions across the enterprise with a transformational programme to improve the security posture for the firm. including the integration and adoption of HashiCorp Vault across environments. The Role Role Overview We are looking for a motivated and skilled Platform Engineer with a developing interest in cyber security and secrets managementMore ❯
Architect to join our established team of PKI architects. You will support the delivery of highly secure network services into our customers within Defence and Central Government, performing a key role in a customer facing team. You will be working with the solution architects, security architects and project teams to deliver a high assurance service from design to delivery. … strategies/architectures. You should have established knowledge and skills in the following areas: A sound and extensive knowledge of PKI and Cryptography solution design Experience in MS Certificate Management Services (Certification Authority, Online Responder, Network Device Enrollment (NDES) Services, Certificate Enrollment Web Services (CEP/CES), Active Directory Domain Services and certificate management solutions. Expert level experience … in SSL certificate management concepts, processes, solution management and tools including OpenSSL and Certutil. Hardware security module (HSM) technology and KeyManagement Server (KMS) technology. Direct experience with Thales HSM platforms is highly desirable. Expert level experience in cloud solution development with Azure or AWS architectures as is related to PKI management. Extensive Cryptography & PKI solution More ❯
specifically responsible for completing the implementation of a number of strategic based security solutions for new security tooling or existing. The engineer will also participate in security related service management processes (incident, change and problem management) and will participate in the planning, design, enforcement and review of security controls which protect the integrity of Walkers IT. “The ideal … by-design principles into development processes . Conduct reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Support Data Loss Prevention (DLP) solutions that protect corporate … data across platforms, devices, and environments globally. Monitoring and managing responses to the Security Incidents and Security DLP. Standard, third party and privilege Identity Access Management Operate, manage and improve HSM keymanagement infrastructure. Remediation of external, internal vulnerabilities, web application scanning and patch compliance. Cyber Incident Management and or Security Forensic experience. Documenting High Low More ❯
by ensuring the company is operating in line with security, compliance, and regulatory requirements, resulting in architectures and solutions that reduce technical security risks and minimise security vulnerabilities. A key focus is to develop the security architecture, serve as an ambassador for security design best practices and providing security architecture and design consulting as required. As an AI/… also provide general support for security design assurance for a wide range of business initiatives. The AI ML Global Security Architect is also responsible for the day-to-day management of demand and activities, ensuring work is appropriately prioritised and progress is reported against. The role is expected to promote the quality of team outcomes through peer reviews and … team members. You will drive and support the identification, development and deployment of use cases and security controls across business and security services to drive efficiency and risk reduction. Key accountabilities Develop and implement comprehensive AI/ML security strategies, policies, standards and guidelines to protect organizational assets and ensure the secure operation of these systems and own robust More ❯
roadmap and vision. 3) To own the Security, Data Assurance and Quality for both core D&A systems and the wider technology architecture. 1. Data & Analytics (D&A) Infrastructure Management: Develop, maintain, and optimize the D&A architecture on AWS and Azure, including the design, deployment, and maintenance of the cloud based Pladis' data platform (PDP). Deliver an … AI solutions that are robust, scalable, and in line with business requirements. Integrate generalized AI models into business processes and ensure they harmonize with existing systems. 6. AI Data Management and Storage: Manage and safeguard data for AI models, emphasizing governance, quality, security, and accessibility. Design storage solutions optimized for real time processing, querying, and scalability. Collaborate with data … Docker and Kubernetes. Infrastructure Automation: Terraform, Ansible, and AWS CloudFormation. API & Microservices: API Development: RESTful API design and GraphQL. Microservices Tools: Istio, Envoy, and Linkerd. Security & Governance: Identity & Access Management: AWS IAM, Azure Active Directory. Data Governance Tools: AWS Lake Formation, Azure Purview. Data Security Tools: AWS KeyManagement Service (KMS), Azure Key Vault. Data Analytics More ❯
objectives, and improve the quality of the service it delivers both internally and externally. Be a part of the professional culture within the team where ownership and quality are key values. Main Responsibilities: Support & Infrastructure: Monitor and resolve issues affecting the delivery of services to our clients; Manage application licensing; Keep up to date with the latest infrastructure and … Support the ongoing modernization process. Security: Maintain an understanding of the regulatory and compliance issues driving Sequel's ISMS; With leaders across the business, assist with the maintenance and management of Sequel's Risk Registers; Gain an understanding of the key information risks to the business (systems, networks, data, human error, cyber-attacks); Engage in information security audits … at least CII certification to appreciate how the insurance industry works. Knowledge and Experience: Essential: A minimum of 2 years in an infrastructure, SysOps or Security role; Active Directory management; NTFS permission & Group Policy configuration & management; Microsoft RDS Architecture (RemoteApp/RDWeb Gateway/RDS Broker); Virtual Windows 2016 DC Servers/File Server with SMB file shares More ❯
Basingstoke, England, United Kingdom Hybrid / WFH Options
Fujitsu
seeking a PKI Architect to join our established team. You will support the delivery of highly secure network services to our customers within Defence and Central Government, playing a key role in a customer-facing team. You will collaborate with solution architects, security architects, and project teams to deliver high assurance services from design to deployment. Responsibilities You will … major technical projects, strategies, and architectures. You should have established knowledge and skills in the following areas: Extensive knowledge of PKI and cryptography solution design. Experience with MS Certificate Management Services, including Certification Authority, Online Responder, Network Device Enrollment Services (NDES), Certificate Enrollment Web Services (CEP/CES), Active Directory Domain Services, and certificate management solutions. Expertise in … SSL certificate management, including concepts, processes, solutions, and tools such as OpenSSL and Certutil. Knowledge of Hardware Security Module (HSM) technology and KeyManagement Server (KMS) technology, with direct experience with Thales HSM platforms being highly desirable. Experience in cloud solution development with Azure or AWS architectures related to PKI management. Extensive cryptography and PKI solution design More ❯
security requirements and standards Developing Liberty Global’s technical security strategy and driving its realisation Providing security architecture and design assurance for all programmes and projects, ensuring appropriate identification, management and mitigations of any security risks You will be assuring the team delivers against the responsibilities above through collaboration with the internal Global Security teams, Liberty Global departments and … by ensuring the company is operating in line with security, compliance, and regulatory requirements, resulting in architectures and solutions that reduce technical security risks and minimise security vulnerabilities. A key focus of here is to serve as an ambassador for security design best practices and providing security architecture and design consulting as required. The Global Security Architect is also … responsible for the day-to-day management of demand and activities, ensuring work is appropriately prioritised and progress is reported against. The role is expected to promote the quality of team outcomes through peer reviews and also serve as a mentor and encourage the personal development of other team members. Key accountabilities Accountable for creating and maintaining Architecture More ❯
businesses to achieve their goals. AIG’s Information Technology functions include enterprise architecture, software and systems engineering, cybersecurity, and technology risk and compliance. About the role The Privileged Access Management team is situated within the AIG Global Identity and Access Management team. The team is currently focused on increasing the adoption of the selected Enterprise Privileged Access management … development teams to implement strong PAM controls, protect credentials and secrets and mature AIG’s posture using the zero-trust framework. What You Will Do: The PAM (Privileged Access Management) Engineer role is essential to supporting business requests for securing and managing privileged accounts. Plays a pivotal role in supporting the principal engineers by integrating applications with the PAM … tool and extending capabilities of the PAM service, ensuring the management of Privileged Accounts and Secrets. Work directly with our users, being the front line of Privileged Access. Partner with engineering and architecture teams to scope requirements and capabilities for PAM that are out of the box. Installing and implementing marketplace plug-ins as needed to support adoption. Support More ❯
services clients, based in London. This role will focus on developing secure, automated, and scalable infrastructure solutions within Microsoft Azure. Role Overview The Azure Cloud Engineer will play a key role in designing and implementing secure Azure environments to support our clients global technology operations. This position requires deep expertise in infrastructure-as-code, CI/CD pipelines, and … cloud-native security practices. The ideal candidate will have strong experience in the financial services sector and a solid understanding of compliance requirements within the cloud ecosystem. Key Responsibilities Design, implement, and maintain secure and scalable Azure cloud infrastructure in alignment with enterprise architecture and security policies. Develop Infrastructure as Code (IaC) using Terraform for consistent and repeatable cloud … and maintain CI/CD pipelines with integrated DevSecOps tools to automate both application and infrastructure deployments. Integrate security capabilities such as vulnerability scanning, static code analysis, and secrets management into the development lifecycle. Work closely with development, architecture, and cybersecurity teams to ensure security and compliance are embedded into all cloud solutions. Monitor cloud environments using tools such More ❯
London, England, United Kingdom Hybrid / WFH Options
CENSUS SA
delivers unparalleled security consulting & assessment services for products (software, services, devices, and large-scale platforms), infrastructure, and organizations. Learn more about CENSUS at census-labs.com. About the Job/Key Responsibilities CENSUS’ bespoke cybersecurity services are built upon a talented pool of Security Engineers, whose role extends beyond mere adherence to industry best practices. Our Technical Project Managers play … role in formulating and executing service delivery strategies that align with the rigorous quality standards set by CENSUS. Drawing from their robust technical background and leveraging their project & stakeholder management skills, TPMs serve as the primary facilitators empowering our clients to effectively maximize the potential of our assessment and advisory teams. We are looking for talented & ambitious professionals to … and top-tier cybersecurity services to our valued clients. As part of this role, you will use your technical background - in the Application Security domain – along with your Project Management skills to ensure a successful service delivery to our clients. You will work side-by-side with our clients’ development and security teams & partners, under engagements/projects that More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
SW Group
As Cloud Security Engineer, your responsibilities will include among others Managing, implementing, and maintaining technical security controls for IAAS, PAAS and SAAS based services which support Financial Planning, Investment Management, Tax Advice and a range of Professional Services. Building out and improving capabilities around M365 utilising E5 licensing. Ensuring E5 security capabilities are being fully utilised and are correctly … date as services continue to mature and develop. Provide risk analysis and end to end control design, implementation for new services using cloud-based solutions. Supporting Agile based project management and iteration - squad-based delivery. Ensure that the vision for cloud-based service is built out on security best practice Familiarity in interpreting highly technical detail, being able to … enhancements to the cloud security strategy by identifying and alerting on appropriate event types. Identify and define system security requirements at a detailed technical level including controls for encryption, keymanagement, IAAS design and segregation. Deep technical experience of implementing security features within Azure including DDOS protection, encryption, and appropriate monitoring controls. Implement technical controls and make recommendations. More ❯
ensure system resilience through structured evaluations. You will also engage in proposal development, solution scoping, and roadmap planning for security-centric projects in line with mission and operational requirements. Key Responsibilities Product Security Evaluation Perform architecture and implementation reviews of embedded, cloud-based, or mission-critical systems. Analyze and validate secure boot flows, cryptographic controls, and firmware integrity mechanisms. … aligned frameworks (e.g., NIST SP 800-53, NIST RMF, Common Criteria, NATO NIAG, ISO 15408). Evaluate usage of post-quantum and hybrid cryptographic algorithms in secure communication and keymanagement schemes. Conduct security testing of control systems, secure enclaves, radios, mission payload platforms, or ICS/SCADA endpoints. Defense Industry Compliance & Assurance Map system security evaluations to … mission objectives and operational constraints into viable secure-by-design implementation pathways. Conduct technical workshops and demos to engage with defense primes, integrators, and government clients. Project and Stakeholder Management Lead technical execution of security engagements with clear milestones, deliverables, and resourcing plans. Maintain ongoing communication with client technical leads and internal engineering teams. Ensure deliverables meet both compliance More ❯
victories together. About the Role As a Security Software Engineer, your role involves architecting, designing, and implementing end-to-end security controls to impact the global user base. A key focus is on developing automated, scalable security solutions to enhance efficiency and protect Roku. This position requires expertise in creating and extending security automation tools, including detection and process … designing, and implementing End-to-End Security solutions and controls. Your work will directly impact our global user base Focusing on Automation. Developing automated, scalable security solutions. Efficiency is key Administering HashiCorp Vault for secrets management Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure Applying cryptography and security design … principles to cloud environments Documenting playbooks, procedures, and architecture Providing subject matter expertise to software development groups to assist in cryptography and keymanagement/authentication API. We are excited if you have Passion for cybersecurity with an effective and passionate drive to protect digital assets. Experience implementing custom, cloud-agnostic IAM at scale Navigate the complexities of More ❯
London, England, United Kingdom Hybrid / WFH Options
CLS-Group
to remediation plans, producing regular reporting at relevant levels confirming direction of travel of risk improvement or decline. Collaborate with security and IT teams on monitoring vulnerability and patch management progress against standards and controls guidelines, with oversight of remediation and timing to reduce risk to an acceptable level. Direct, coach and rollout training for team to understanding security … and security artefacts that support multiple internal and external audits and regulatory requirements. Stay updated on advancements in security technologies, policies, and regulatory changes, recommending and implementing necessary improvements. Key member of the function who regularly reviews Security Policies, Standards and Controls and optimize position on areas associated to regulations and company strategy. Integrate processes with Cyber Threat Intelligence … to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies, aligning to a 3 lines of defence model and enforcing alignment of risk taxonomy to organizational cybersecurity risk management processes, procedures and activities are identified across all security functions. Leadership Leads by More ❯
London, England, United Kingdom Hybrid / WFH Options
State Street
Who we are looking for State Street is seeking an experienced Cryptographic Key Operations Lead to oversee the end-to-end lifecycle management of cryptographic keys across cloud, on-premises, infrastructure and IoT environments. This role ensures the secure generation, distribution, rotation, revocation, and retirement of encryption keys while maintaining compliance with regulatory and security policies. Additionally, the … Key Operations Lead will manage and mentor a team of KeyManagement Engineers, driving operational excellence and automation to enhance key lifecycle processes. This role requires close collaboration with security, IT, cloud, infrastructure, and application teams to maintain the availability, reliability, and security of keymanagement services, supporting business-critical operations and financial transactions. … model, where you can balance work from home and office to match your needs and role requirements. What you will be responsible for Lead and manage a team of KeyManagement Engineers, providing guidance, mentoring, and technical leadership to ensure effective cryptographic key lifecycle management. Oversee the daily operations and security of cryptographic keymanagementMore ❯
Cryptography HSM and KeyManagement Specialist Cryptography HSM and KeyManagement Specialist Job Description Purpose of the role Undertake all team activities in line with Barclays strategy, Crypto strategy and departmental goals. Ensure the integrity and availability of cryptographic and keymanagement services to business functions and applications. Maintain accurate environment documentation, process and … device categorisation. Provide ongoing assurance that risk and compliance requirements are being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. Incident management. Change management. ITIL. Ensure the integrity and availability of cryptographic and keymanagement services … to business functions and applications. Accountabilities Cryptographic Hardware Management - including on site local configuration activities. Support with resourcing, scheduling and distribution of work requests for HSM and Key management. Work closely with dates set in cooperation with Service Management to ensure smooth continuity of services and operations. Deliver to the required SLAs for all service. Gather, distribute More ❯
of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations: London, England About the role As a Security Architect you will play a key role in effectively designing secure network architectures, defensible builds & configurations, security platforms and automation, assisting in secure tool and product development, and will help establish security standards and guidelines … across the enterprise. This role will focus on designing robust public key infrastructure and secrets management solutions to support Cloudflare’s secure authentication processes and encryption solutions for both our internal and client-facing systems, users, and applications. This role will also include collaborating with cross-functional teams including software engineering, cybersecurity, product management, etc. to integrate … keymanagement solutions into the Cloudflare environments. We are looking for a candidate that is passionate about cryptography and security. We are seeking Security Architects or Engineers proficient in strategy, design, and implementation of public key infrastructure and secrets management solutions to help make a better internet. What You’ll Do Define security requirements for and More ❯
the security vision and implement secure-by-design principles across all organizational layers—from field-level Operational Technology networks and real-time trading engines to corporate business systems. A key aspect of this role involves close collaboration with: Data Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs, and audits Network & Security Engineering team: translating architecture patterns into robust … monitored, and recoverable production configurations External security advisors & key technology suppliers: aligning architectural controls with best practices, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances secure-by-design principles with practical delivery across cloud, on-premises, and SaaS environments. KEY RESPONSIBILITIES Develop and evolve enterprise security architecture … architecture on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) with Network & Security Engineers. Establish standards for IAM, encryption (at rest/in transit), secrets management, and keymanagement aligned with ISO 27001/27019 and NIS2. Review and select third-party security solutions; lead due diligence with EPC, O&M, and SCADA More ❯
Digital services. If you are successful, you will work within DfE’s Cyber and Information Security division as part of a team providing specialist support including the following. Identity management and administration. Security, management, governance and automation of DfE’s centrally managed Identity Directory Services, Microsoft Active Directory and Azure Entra. Includes design, build, operate and maintain core … continue to meet requirements. Managed infrastructure and securing identity services. Build, operate and maintain cloud and on-premises infrastructure resources for business applications. Back-up and restore, security vulnerability management, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing infrastructure services within the identity workspace, managing processes … improve reliability & performance, avoid costs, scale & expand, prevent legacy, meet new requirements, or address emerging problem statements. Job description As a Senior Infrastructure Engineer specialising in Identity and Access Management, you will work within a team of security specialists and engineers maintaining, building and operating Directory Services solutions as directed and according to policy. You will: Provide managementMore ❯
DoD standards, to proactively mitigate unacceptable loss and unrecoverable downtime throughout their lifecycle. The multidisciplinary proficiencies supporting this initiative are System Security Concepts & Design Principles, Resilient Architecture, Anomaly & Contingency Management, and Cryptography & Key Management. Job Description: Daily Responsibilities Leveraging System Theoretic Process Analysis (STPA) for Attack Surface Analysis (ASA) to improve "blue team" designs and attack vector insights … On-time delivery and maturating of System Security work packages such as: Attack Surface Traceability | Security Requirements | Security Architecture | Off-Nominal & Contingency scenarios | Anomaly Management policies Socializing and demystifying System Security, Cybersecurity, & Cryptography best practices and techniques to internal cross-disciplinary stakeholders such as: System Architecture | Avionics | Software | Hardware design teams Advocating for System Security best practices, to internal … for the purposes of attack surface modeling and rapid impact & gap analysis for validation An astute understanding of the applications of cryptography for complex weapon and space systems, cryptographic keymanagement, Public Key Infrastructure (PKI) and the NSA's KeyManagement Infrastructure Experience documenting compliance towards parent specifications and standards (i.e.: NIST SP 800.160, NIST More ❯