challenges and celebrates victories together. About The Role Roku's Trust Engineering Team is looking for a senior software engineer to focus on cryptographic keymanagement systems. Your work will be focused on the architecture and design of scalable keymanagement systems, including Public Key … work day-to-day with a cross-functional team of web service, devops, firmware and manufacturing ops engineers to build and deploy highly scalable keymanagement and distribution systems. We're Excited If You have Expertise of relevant software development. Practical experience with cryptographic protocols, algorithms and standards. … Experience with key injection, hardware root of trust, HSMs, PKI, DRM and designing secure systems. Experience implementing and integrating with secure RESTful Web Services. Experience with AWS security services such as KMS and ACM. Experience with threat modeling and an awareness of the Internet threat model. Experience with DevOps More ❯
will be part of the Cryptography team within the Cyber Security Office (CSO), Global Information Security. This team provides critical cryptographic services, including Secure KeyManagement, Hardware Security, Application Cryptography, Strong Authentication, and PKI & Certificate services to the Group. Your primary responsibility will be to act as a … Cryptography Analyst, you will need the following: Experience in Cryptography and Information Security. ITIL Foundation certification. Bachelor's degree in Computer Science. Strong stakeholder management with the ability to influence and negotiate at all levels. Excellent attention to detail and accuracy. Ability to make informed decisions under tight deadlines … and manage multiple priorities effectively. Proficiency in MS Office applications. Some other highly valued skills may include: Relevant security or project management certifications. Background in operational environments, including incident response and change management. Strong documentation skills for operational procedures. Familiarity with SharePoint, Confluence, and JIRA. Unix/Windows operating More ❯
development, security, and operations. This is an individual contributor role, where you will spearhead initiatives and guide the team on best practices without direct management responsibilities. Key Responsibilities: Design, implement, and maintain secure cloud infrastructure in GCP. Develop and manage infrastructure as code (Terraform, Kubernetes) to ensure repeatable … and operational tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as keymanagement, vulnerability scanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the … such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerability scanning, encryption, authentication, and secrets management (Vault, KeyManagement Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when working More ❯
Aldershot, Hampshire, United Kingdom Hybrid / WFH Options
DXC Technology Inc
Job Description: Our client offers multiple building blocks (Access Management, User Management, OAuth, Certificate Management, Datapower, KeyManagement, PAMaaS and LogaaS) to its customers. The Analyst will through identifying customer needs and requirements, translate them into technical requirements and integration sheet. The successful candidate will … play a key role ensuring the seamless integration of technology solutions. The analyst will join a team that values agile principles: sprint-based approach, onboarding meeting, intake meeting, file building, T&I build and testing, scheduling meeting, PRD build and testing. Location: Fully remote within Belgium is feasible, with … new applications, mapping functional and technical expectations. SPOC to relevant ACM/DEVOPS teams re onboarding of applications/projects. SPOC to support user management re incidents, customer queries from onboarding procedures. Working out the technical requirements of the user and access management projects based on direction from More ❯
critical to delivering exceptional customer and partner experiences at scale in Amazon Ads. The ideal candidate will have a robust background in security program management, experience in establishing security standards for cross-cloud deployments, and a deep understanding of cloud security, particularly within AWS platforms. You will conduct independent … security into their application platforms. Your role will be pivotal in ensuring the protection of customer data and critical infrastructure within the Ads organization. Key job responsibilities As a Security Engineer within Amazon's Ads Security team, you will play a crucial role in ensuring that applications across numerous … tackle a diverse array of security challenges, ranging from novel threats in Ads services to selecting and implementing scalable and secure features such as keymanagement solutions and encrypted storage. Additionally, you will serve as a subject matter expert, providing guidance to developers on building secure products and More ❯
Kingdom and Ireland, Reapit's market-leading technology product suite provides estate and lettings agents with powerful tools covering lead generation, sales, lettings, property management, block management, client accounts, keymanagement and analytics, underpinned by a robust, security infrastructure. Worldwide, Reapit technology is used by over … agents in more than 15,000 branches, with over a million properties under management; enabling them to run their businesses, identify opportunities for growth, manage their properties, collect rent, communicate with their clients, and deliver an outstanding customer experience, every time. What you'll be doing Reporting to the More ❯
role is ideal for security architects who have worked in regulated industries like Banks, Insurance Companies, PSUs or as security architects in System Integrators. Key job responsibilities: Help customers implement core AWS security services such as Amazon Identity and Access Management (IAM), KeyManagement System, CloudHSM … DevSecOps pipeline with IaC scanner, SAST, DAST tool in the SDLC. Hands-on experience in one of the following is mandatory: Identity and Access Management Data Encryption Network Security Incident Response Security Automation About the team Diverse Experiences: Amazon values diverse experiences. Even if you do not meet all More ❯
critical operational environment? Join a dedicated team managing a vital global network infrastructure for a leading organisation. This is an opportunity to become a key member of a small, established team of network professionals responsible for the management and support of a complex global network. You will play … remotely. If you thrive under pressure, can prioritise critical tasks effectively, and excel in a collaborative, time-sensitive environment, this role is for you. Key Responsibilities: Monitor, analyse, and report on all elements of the network infrastructure. Manage and process customer service requests efficiently. Develop, test, and deploy network … configurations for new services. Collaborate effectively with Service Management teams and key stakeholders to deliver services. Provide technical support and guidance to Managed Service Providers (MSPs). Maintain accurate network diagrams and documentation. Contribute to annual Crypto Keymanagement processes. Update and maintain the Configuration ManagementMore ❯
critical operational environment? Join a dedicated team managing a vital global network infrastructure for a leading organisation. This is an opportunity to become a key member of a small, established team of network professionals responsible for the management and support of a complex global network. You will play … remotely. If you thrive under pressure, can prioritise critical tasks effectively, and excel in a collaborative, time-sensitive environment, this role is for you. Key Responsibilities: Monitor, analyse, and report on all elements of the network infrastructure. Manage and process customer service requests efficiently. Develop, test, and deploy network … configurations for new services. Collaborate effectively with Service Management teams and key stakeholders to deliver services. Provide technical support and guidance to Managed Service Providers (MSPs). Maintain accurate network diagrams and documentation. Contribute to annual Crypto Keymanagement processes. Update and maintain the Configuration ManagementMore ❯
of the service it delivers both internally and externally. Be a part of the professional culture within the team where ownership and quality are key values. Main Responsibilities: Support & Infrastructure: Monitor and resolve issues affecting the delivery of services to our clients; Manage application licensing; Keep up to date … Security: Maintain an understanding of the regulatory and compliance issues driving Sequel's ISMS; With leaders across the business, assist with the maintenance and management of Sequel's Risk Registers; Gain an understanding of the key information risks to the business (systems, networks, data, human error, cyber-attacks … appreciate how the insurance industry works. Knowledge and Experience: Essential: A minimum of 2 years in an infrastructure, SysOps or Security role; Active Directory management; NTFS permission & Group Policy configuration & management; Microsoft RDS Architecture (RemoteApp/RDWeb Gateway/RDS Broker); Virtual Windows 2016 DC Servers/File More ❯
industry's most exciting space. Security Consultant: Supports our services that have a focus on enabling security specialists using AWS Services including Identity Access Management (IAM), GuardDuty, Shield, KeyManagement Service (KMS), CloudTrail, CloudHSM, Inspector, etc. About AWS Diverse Experiences AWS values diverse experiences. Even if you …/or Windows). - Experience with software development lifecycle (SDLC) and agile/iterative methodologies; Experience with infrastructure as code, ops automation, and configuration management tools such as Chef, Puppet, or Ansible. - Knowledge of the primary AWS services such as EC2, ELB, RDS, VPC, Route53, and S3. - Experience around More ❯
As a Security Software Engineer, your role involves architecting, designing, and implementing end-to-end security controls to impact the global user base. A key focus is on developing automated, scalable security solutions to enhance efficiency and protect Roku. This position requires expertise in creating and extending security automation … End Security solutions and controls. Your work will directly impact our global user base Focusing on Automation. Developing automated, scalable security solutions. Efficiency is key Administering HashiCorp Vault for secrets management Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure … security design principles to cloud environments Documenting playbooks, procedures, and architecture Providing subject matter expertise to software development groups to assist in cryptography and keymanagement/authentication API. We are excited if you have Passion for cybersecurity with an effective and passionate drive to protect digital assets. More ❯
Data Security Architect is responsible for developing and executing a global data security strategy, ensuring the protection of sensitive information across the JD Group. Key Responsibilities: Implement and lead the Data Security Architecture capability across JD Sports, formalising principles through reference architectures, diagrams, and procedures. Research, evaluate, and implement … in geographically dispersed and hybrid cloud environments. Hands-on experience with modern enterprise-level data protection tools, including Data Loss Prevention (DLP), Digital Rights Management (RMS), data encryption/tokenization, and data discovery. Strong familiarity with Microsoft security solutions, such as AD RMS, Azure RMS, and Microsoft Purview for … data governance, classification, and compliance monitoring. In-depth knowledge of PKI, including certificate lifecycle management, encryption protocols, and secure keymanagement practices. Ability to lead and execute large, complex projects related to data security (e.g. introduction of a global DLP solution, replacement of a PKI environment). More ❯
and integrate Big Data services. Security Consultant - Supports our services that have a focus on enabling security specialists using AWS Services including Identity Access Management (IAM), GuardDuty, Shield, KeyManagement Service (KMS), CloudTrail, CloudHSM, Inspector etc. A day in the life of a Professional Services Consultant: Watch …/or Windows). - Experience with software development lifecycle (SDLC) and agile/iterative methodologies; Experience with infrastructure as code, ops automation, and configuration management tools such as Chef, Puppet, or Ansible. - Experience around implementing cloud-based technology solutions - in a school project or while working for a company. More ❯
or DV Clearance is required for eligibility. In this role, you will be at the forefront of designing, implementing, and supporting cutting-edge Public Key Infrastructure (PKI) solutions for high-profile clients. You will be involved in the entire solution lifecycle-from pre-sales architecture to implementation and ongoing … internal improvements-driving strategic initiatives while ensuring technical excellence and a strong focus on client satisfaction. Key Responsibilities: Pre-Sales & Client Engagement: Lead technical discussions, develop proposals, and educate stakeholders on PKI. Solution Architecture & Delivery: Design and implement PKI solutions, oversee CA/RA setups, and ensure compliance. Innovation … hiring through your network. Requirements: Expertise in PKI technologies and standards (X.509, SSL/TLS, S/MIME). Strong understanding of cryptographic algorithms, keymanagement, and code signing. Hands-on experience with tools such as Keyfactor Command, Venafi TLS Protect, AppViewX CERT+, EJBCA, Microsoft AD CS, and More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
Incident Response & Forensic Analysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance - Proficiency in identifying potential security risks, conducting risk assessments, and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing … implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure keymanagement, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
Incident Response & Forensic Analysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance - Proficiency in identifying potential security risks, conducting risk assessments, and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing … implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure keymanagement, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. More ❯
YAML, Python Experience of azure automation using arm templates Experience of Linux, Windows Server, Azure SQL Server, Azure Storage, CosmosDB Experience in cloud security management (IAM, Security Groups, certificates & keymanagement) Experience with logging, monitoring and alerting platforms such as app Insights Experience of working within an More ❯
and security. You will work with cutting-edge technologies and participate in an on-call rota to support business-critical systems 24/7. Key Responsibilities: -Provide technical support for VMware platform, Tanzu, Dell VxRail, and Dell Data Domain. -Troubleshoot keymanagement systems like HashiCorp Vault and … Thales HSM. -Support privileged access management solutions (BeyondTrust) and SSO systems (KeyCloak). -Have a foundational knowledge of network principles. System Maintenance: -Administer and maintain Windows Server 2022 and Hyper-V. -Monitor system performance and conduct routine maintenance. -Contribute to disaster recovery and business continuity strategies. Collaboration & Documentation: -Work More ❯
mitigate the same. Participate in crisis calls for service recovery, MIRs and SIPs. Own the resolution of problems in hand, demonstrate analytical and problem management skills to drive the resolution and prevent recurrence. * Work on critical/complex incidents and ensure completion within agreed deadlines. Participate in POCs and … efficiencies and reduce toil. Enterprise focus * building solutions with an emphasis on sustainability, supportability, stability and robustness including disaster recovery features. * Knowledge of Service Management (Change, Incident and Problem) and Agile methodologies. * Ability to work independently with minimal supervision and with sense of ownership and accountability. * Strong written, verbal … External Authentication Server etc. * Excellent general knowledge of file transfer protocols (e.g. sFTP, AS2, C:D, FTPS, HTTPS) and products. * Knowledge of cryptography/keymanagement (SSL/TLS, SSH, PGP/GPG etc.) and data security * Ability to manage application support operations, resiliency and availability including monitoring More ❯
Crewe, Cheshire, United Kingdom Hybrid / WFH Options
Bentley Motors
security standards and legislations (all regions, e.g., GB44495, ISO/SAE21434, UNECE WP29/R155, GDPR, Data security). Proven experience in technical project management, particularly in planning and rolling out security functions. Technical knowledge of product security countermeasures, including Intrusion Detection Systems (IDS), Secure Onboard Communication (SOK), Vehicle … KeyManagement Systems (VKMS), TLS, etc. Excellent communication and collaboration skills. Strong problem-solving and analytical skills. Software/Programming knowledge (C, C++). Encryption algorithms knowledge. Ability to influence colleagues within your area of responsibility. Engineering degree or equivalent is essential. What Bentley Offers Hybrid working options More ❯
to join our team. This role is ideal for professionals who excel in supporting, maintaining, and optimizing critical IT infrastructure. You will play a key role in ensuring the high availability, security, and performance of our systems while troubleshooting complex issues efficiently. Additionally, you will participate in an on … call rota to provide 24/7 support for mission-critical systems. Key Responsibilities: Advanced Support & Troubleshooting: Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. Troubleshoot and resolve issues related to keymanagement systems, including HashiCorp Vault and Thales … Hardware Security Module. Manage and support privileged access management solutions (BeyondTrust) and SSO systems (KeyCloak). Have a strong foundation in networking principles. System Maintenance & Optimisation: Administer and optimise Windows Server 2022 and Hyper-V environments. Perform proactive monitoring and maintenance to ensure system performance and reliability. Implement and More ❯
to join our team. This role is ideal for professionals who excel in supporting, maintaining, and optimizing critical IT infrastructure. You will play a key role in ensuring the high availability, security, and performance of our systems while troubleshooting complex issues efficiently. Additionally, you will participate in an on … call rota to provide 24/7 support for mission-critical systems. Key Responsibilities: Advanced Support & Troubleshooting: -Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. -Troubleshoot and resolve issues related to keymanagement systems, including HashiCorp Vault and Thales … Hardware Security Module. -Manage and support privileged access management solutions (BeyondTrust) and SSO systems (KeyCloak). -Have a strong foundation in networking principles. System Maintenance & Optimisation: -Administer and optimise Windows Server 2022 and Hyper-V environments. -Perform proactive monitoring and maintenance to ensure system performance and reliability. -Implement and More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
leonardo company
line capability wherever and whenever required. We are looking for an experienced product security practitioner with expertise in developing and maintaining robust product security management systems for defence and government customers. The Chief Product Security Engineer will take responsibility for ensuring that all security aspects of the design, development … teams, including in terms of: Deriving security requirements Undertaking security risk assessments for products Preparing security risk mitigation plans Review and approval of Security Management plans Security policy maintenance and monitoring Production of LoB security metrics Management of attendance at external security forums Attendance and support to the … Security Special Interest Group Lead security incident management teams during incident/crisis situations in conjunction with the Lead Product Security Engineer(s) The Chief Product Security Engineer has delegated authority within the independent Design Integrity function, responsible for the following elements: Security process maintenance and monitoring Security competence More ❯
with IaC technology - Ideally CloudFormation. Broad experience across AWS products. Strong skills and experience with suite of services and tools that address security, identity, management, governance, and compliance within AWS. Control Tower, IAM, AWS Organisations, CloudWatch, Secrets Manager, KeyManagement Service, WAF & Shield, Certificate Manager, Cognito Strong More ❯