Key Management Jobs in London

1 to 25 of 84 Key Management Jobs in London

DevOps/Cloud PKI Engineer

London, England, United Kingdom
Hybrid / WFH Options
Sky
Design, build, and operate PKI solutions and environments. Manage Certificate Authority Administration, including Certificate Enrolment Web Service & Policy Web Service, and monitor Active Directory Certificate Services (ADCS). Manage Key Management Systems (KMS) to ensure robust cryptographic key security. Support and manage the PKI and Certificate deployment, automation, and Thales HSMs. Understand existing certificate use-cases and … of the PKI managed service for Sky and Comcast users, including certificate checks, issuing, and revoking. Work with App Service managed certificates, private and public certificates, and certificates from Key Vault. What You'll Bring Technical and professional leadership across the discipline. Deep knowledge of Information and/or Cyber Security, understanding of cybersecurity principles, practices, and frameworks like … with Certificate Authority Administration, ADCS monitoring. Familiarity with Data-in-motion and Data-at-rest Encryption techniques. Knowledge of PKI machine identity technologies like SSH, SSL, TLS. Experience managing Key Management Systems (KMS). Beneficial experience with PKI and Certificate deployment automation and Thales HSMs. Team Overview Cyber Security Our products, platforms, and technologies are constantly evolving. Protecting More ❯
Posted:

Senior Cloud Security Engineer Boston, Massachusetts, United States

London, England, United Kingdom
Acadian Asset
Acadian Asset Management LLC is a Boston-headquartered investment management firm with wholly owned affiliates located in Singapore, London, and Sydney. As of March 31, 2025, the firm managed approximately US$122 billion on behalf of major pension funds, endowments, foundations, governments and other investors based in the U.S. and abroad.Position Overview:The Senior Security Engineer, reporting to … consistently governing our AWS Platform-as-a-Service (PaaS) infrastructure. We are looking for candidates with deep experience and understanding of continuous delivery, container security, SAST/DAST, secrets management, Identity and Access Management (IAM) governance, privilege management, encryption and key management, threat detection, logging, cloud infrastructure security and policy-as-code.What You’ll Do … the Identity and Config team to ensure least privilege in Acadian’s federated identity systems, utilizing tools such as Saviynt, Okta and Microsoft Entra ID. Assist with federation of key enterprise applications as necessary.· Build Security infrastructure in AWS using Terraform and Cloudformation, leveraging best practices such as multi-region and multi-Availability zone architecture with autoscaling.· Assist with More ❯
Posted:

Software Engineering

London, England, United Kingdom
Goldman Sachs Bank AG
Goldman Sachs is a leading global investment banking, securities, and investment management firm that provides a wide range of services worldwide to a substantial and diversified client base, including corporations, financial institutions, governments, and high net-worth individuals. Founded in 1869, it is one of the oldest and largest investment banking firms. Secrets and Encryption Services is part of … the Identity and Access Management (IAM) business unit within the Core Engineering Division of Goldman Sachs. Our mission is to protect the firm and our clients from cyber threats such as credential compromise through the services we deliver and operate. The S&ES team is on a journey to uplift credential management solutions across the enterprise, including the … integration and adoption of HashiCorp Vault across environments. The Role Role Overview: We are seeking a motivated and skilled Platform Engineer with an interest in cybersecurity and secrets management to join our team. The candidate will contribute to ensuring the reliability, performance, and scalability of our platform and infrastructure while learning and implementing security best practices. The role involves More ❯
Posted:

Engineering - London - Associate - Software Engineering

London, England, United Kingdom
WeAreTechWomen
Goldman Sachs is a leading global investment banking, securities and investment management firm that provides a wide range of services worldwide to a substantial and diversified client base that includes corporations, financial institutions, governments and high net-worth individuals. Founded in 1869, it is one of the oldest and largest investment banking firms. Secrets and Encryption Services is part … of the Identity and Access Management (IAM) business unit within Core Engineering Division of Goldman Sachs. Our mission is to protect the firm and our clients from cyberthreats such as credential compromise through the services we deliver and operate. The S&ES team is on a journey to uplift credential management solutions across the enterprise with a transformational … adoption of HashiCorp Vault across environments. The Role Role Overview: We are looking for a motivated and skilled Platform Engineer with a developing interest in cyber security and secrets management to join our team. The ideal candidate will contribute to ensuring the reliability, performance, and scalability of our platform and infrastructure while learning and implementing security best practices. This More ❯
Posted:

Engineering - London - Analyst/Associate - Platform Engineer

London, England, United Kingdom
Goldman Sachs
at Goldman Sachs Get AI-powered advice on this job and more exclusive features. Job Description Job Description Goldman Sachs is a leading global investment banking, securities and investment management firm that provides a wide range of services worldwide to a substantial and diversified client base that includes corporations, financial institutions, governments and high net-worth individuals. Founded in … it is one of the oldest and largest investment banking firms. Secrets and Encryption Services is part of the Identity and Access Management (IAM) business unit within Core Engineering Division of Goldman Sachs. Our mission is to protect the firm and our clients from cyberthreats such as credential compromise through the services we deliver and operate. The S&ES … team is on a journey to uplift credential management solutions across the enterprise with a transformational programme to improve the security posture for the firm. including the integration and adoption of HashiCorp Vault across environments. The Role Role Overview We are looking for a motivated and skilled Platform Engineer with a developing interest in cyber security and secrets management More ❯
Posted:

Security Engineer - 12 month FTC

London, England, United Kingdom
Walkers
specifically responsible for completing the implementation of a number of strategic based security solutions for new security tooling or existing. The engineer will also participate in security related service management processes (incident, change and problem management) and will participate in the planning, design, enforcement and review of security controls which protect the integrity of Walkers IT. “The ideal … by-design principles into development processes . Conduct reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Support Data Loss Prevention (DLP) solutions that protect corporate … data across platforms, devices, and environments globally. Monitoring and managing responses to the Security Incidents and Security DLP. Standard, third party and privilege Identity Access Management Operate, manage and improve HSM key management infrastructure. Remediation of external, internal vulnerabilities, web application scanning and patch compliance. Cyber Incident Management and or Security Forensic experience. Documenting High Low More ❯
Posted:

Head of Data & Analytics Architecture and AI

London, United Kingdom
pladis Foods Limited
roadmap and vision. 3) To own the Security, Data Assurance and Quality for both core D&A systems and the wider technology architecture. 1. Data & Analytics (D&A) Infrastructure Management: Develop, maintain, and optimize the D&A architecture on AWS and Azure, including the design, deployment, and maintenance of the cloud based Pladis' data platform (PDP). Deliver an … AI solutions that are robust, scalable, and in line with business requirements. Integrate generalized AI models into business processes and ensure they harmonize with existing systems. 6. AI Data Management and Storage: Manage and safeguard data for AI models, emphasizing governance, quality, security, and accessibility. Design storage solutions optimized for real time processing, querying, and scalability. Collaborate with data … Docker and Kubernetes. Infrastructure Automation: Terraform, Ansible, and AWS CloudFormation. API & Microservices: API Development: RESTful API design and GraphQL. Microservices Tools: Istio, Envoy, and Linkerd. Security & Governance: Identity & Access Management: AWS IAM, Azure Active Directory. Data Governance Tools: AWS Lake Formation, Azure Purview. Data Security Tools: AWS Key Management Service (KMS), Azure Key Vault. Data Analytics More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Global Security Architect

London, England, United Kingdom
Liberty Global Technology Services BV
security requirements and standards Developing Liberty Global’s technical security strategy and driving its realisation Providing security architecture and design assurance for all programmes and projects, ensuring appropriate identification, management and mitigations of any security risks You will be assuring the team delivers against the responsibilities above through collaboration with the internal Global Security teams, Liberty Global departments and … by ensuring the company is operating in line with security, compliance, and regulatory requirements, resulting in architectures and solutions that reduce technical security risks and minimise security vulnerabilities. A key focus of here is to serve as an ambassador for security design best practices and providing security architecture and design consulting as required. The Global Security Architect is also … responsible for the day-to-day management of demand and activities, ensuring work is appropriately prioritised and progress is reported against. The role is expected to promote the quality of team outcomes through peer reviews and also serve as a mentor and encourage the personal development of other team members. Key accountabilities Accountable for creating and maintaining Architecture More ❯
Posted:

Privileged Access Management Engineer

London, England, United Kingdom
AIG
businesses to achieve their goals. AIG’s Information Technology functions include enterprise architecture, software and systems engineering, cybersecurity, and technology risk and compliance. About the role The Privileged Access Management team is situated within the AIG Global Identity and Access Management team. The team is currently focused on increasing the adoption of the selected Enterprise Privileged Access management … development teams to implement strong PAM controls, protect credentials and secrets and mature AIG’s posture using the zero-trust framework. What You Will Do: The PAM (Privileged Access Management) Engineer role is essential to supporting business requests for securing and managing privileged accounts. Plays a pivotal role in supporting the principal engineers by integrating applications with the PAM … tool and extending capabilities of the PAM service, ensuring the management of Privileged Accounts and Secrets. Work directly with our users, being the front line of Privileged Access. Partner with engineering and architecture teams to scope requirements and capabilities for PAM that are out of the box. Installing and implementing marketplace plug-ins as needed to support adoption. Support More ❯
Posted:

Technical Project Manager - Application Security (UK Nationals Only)

London, England, United Kingdom
CENSUS SA
delivers unparalleled security consulting & assessment services for products (software, services, devices, and large-scale platforms), infrastructure, and organizations. Learn more about CENSUS at census-labs.com. About the Job/Key Responsibilities CENSUS’ bespoke cybersecurity services are built upon a talented pool of Security Engineers, whose role extends beyond mere adherence to industry best practices. Our Technical Project Managers play … role in formulating and executing service delivery strategies that align with the rigorous quality standards set by CENSUS. Drawing from their robust technical background and leveraging their project & stakeholder management skills, TPMs serve as the primary facilitators empowering our clients to effectively maximize the potential of our assessment and advisory teams. We are looking for talented & ambitious professionals to … and top-tier cybersecurity services to our valued clients. As part of this role, you will use your technical background - in the Application Security domain – along with your Project Management skills to ensure a successful service delivery to our clients. You will work side-by-side with our clients’ development and security teams & partners, under engagements/projects that More ❯
Posted:

Senior Product Security Consultant - Defense Systems (UK Nationals)

London, England, United Kingdom
CENSUS SA
ensure system resilience through structured evaluations. You will also engage in proposal development, solution scoping, and roadmap planning for security-centric projects in line with mission and operational requirements. Key Responsibilities Product Security Evaluation Perform architecture and implementation reviews of embedded, cloud-based, or mission-critical systems. Analyze and validate secure boot flows, cryptographic controls, and firmware integrity mechanisms. … aligned frameworks (e.g., NIST SP 800-53, NIST RMF, Common Criteria, NATO NIAG, ISO 15408). Evaluate usage of post-quantum and hybrid cryptographic algorithms in secure communication and key management schemes. Conduct security testing of control systems, secure enclaves, radios, mission payload platforms, or ICS/SCADA endpoints. Defense Industry Compliance & Assurance Map system security evaluations to … mission objectives and operational constraints into viable secure-by-design implementation pathways. Conduct technical workshops and demos to engage with defense primes, integrators, and government clients. Project and Stakeholder Management Lead technical execution of security engagements with clear milestones, deliverables, and resourcing plans. Maintain ongoing communication with client technical leads and internal engineering teams. Ensure deliverables meet both compliance More ❯
Posted:

Director, Security Assurance and Remediation

London, England, United Kingdom
Hybrid / WFH Options
CLS-Group
to remediation plans, producing regular reporting at relevant levels confirming direction of travel of risk improvement or decline. Collaborate with security and IT teams on monitoring vulnerability and patch management progress against standards and controls guidelines, with oversight of remediation and timing to reduce risk to an acceptable level. Direct, coach and rollout training for team to understanding security … and security artefacts that support multiple internal and external audits and regulatory requirements. Stay updated on advancements in security technologies, policies, and regulatory changes, recommending and implementing necessary improvements. Key member of the function who regularly reviews Security Policies, Standards and Controls and optimize position on areas associated to regulations and company strategy. Integrate processes with Cyber Threat Intelligence … to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies, aligning to a 3 lines of defence model and enforcing alignment of risk taxonomy to organizational cybersecurity risk management processes, procedures and activities are identified across all security functions. Leadership Leads by More ❯
Posted:

Cryptographic Key Management Operations Lead, Vice President, Hybrid

London, England, United Kingdom
Hybrid / WFH Options
State Street
Who we are looking for State Street is seeking an experienced Cryptographic Key Operations Lead to oversee the end-to-end lifecycle management of cryptographic keys across cloud, on-premises, infrastructure and IoT environments. This role ensures the secure generation, distribution, rotation, revocation, and retirement of encryption keys while maintaining compliance with regulatory and security policies. Additionally, the … Key Operations Lead will manage and mentor a team of Key Management Engineers, driving operational excellence and automation to enhance key lifecycle processes. This role requires close collaboration with security, IT, cloud, infrastructure, and application teams to maintain the availability, reliability, and security of key management services, supporting business-critical operations and financial transactions. … model, where you can balance work from home and office to match your needs and role requirements. What you will be responsible for Lead and manage a team of Key Management Engineers, providing guidance, mentoring, and technical leadership to ensure effective cryptographic key lifecycle management. Oversee the daily operations and security of cryptographic key management More ❯
Posted:

Security Architect

London, England, United Kingdom
CloudFlare
of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations: London, England About the role As a Security Architect you will play a key role in effectively designing secure network architectures, defensible builds & configurations, security platforms and automation, assisting in secure tool and product development, and will help establish security standards and guidelines … across the enterprise. This role will focus on designing robust public key infrastructure and secrets management solutions to support Cloudflare’s secure authentication processes and encryption solutions for both our internal and client-facing systems, users, and applications. This role will also include collaborating with cross-functional teams including software engineering, cybersecurity, product management, etc. to integrate … key management solutions into the Cloudflare environments. We are looking for a candidate that is passionate about cryptography and security. We are seeking Security Architects or Engineers proficient in strategy, design, and implementation of public key infrastructure and secrets management solutions to help make a better internet. What You’ll Do Define security requirements for and More ❯
Posted:

Security & Information Security Architect

London, England, United Kingdom
NextEnergy Group
the security vision and implement secure-by-design principles across all organizational layers—from field-level Operational Technology networks and real-time trading engines to corporate business systems. A key aspect of this role involves close collaboration with: Data Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs, and audits Network & Security Engineering team: translating architecture patterns into robust … monitored, and recoverable production configurations External security advisors & key technology suppliers: aligning architectural controls with best practices, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances secure-by-design principles with practical delivery across cloud, on-premises, and SaaS environments. KEY RESPONSIBILITIES Develop and evolve enterprise security architecture … architecture on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) with Network & Security Engineers. Establish standards for IAM, encryption (at rest/in transit), secrets management, and key management aligned with ISO 27001/27019 and NIS2. Review and select third-party security solutions; lead due diligence with EPC, O&M, and SCADA More ❯
Posted:

Senior Infrastructure Engineer - DfE - SEO

London, England, United Kingdom
Government Digital and Data
Digital services. If you are successful, you will work within DfE’s Cyber and Information Security division as part of a team providing specialist support including the following. Identity management and administration. Security, management, governance and automation of DfE’s centrally managed Identity Directory Services, Microsoft Active Directory and Azure Entra. Includes design, build, operate and maintain core … continue to meet requirements. Managed infrastructure and securing identity services. Build, operate and maintain cloud and on-premises infrastructure resources for business applications. Back-up and restore, security vulnerability management, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing infrastructure services within the identity workspace, managing processes … improve reliability & performance, avoid costs, scale & expand, prevent legacy, meet new requirements, or address emerging problem statements. Job description As a Senior Infrastructure Engineer specialising in Identity and Access Management, you will work within a team of security specialists and engineers maintaining, building and operating Directory Services solutions as directed and according to policy. You will: Provide management More ❯
Posted:

Technical Lead - Application Security (UK Nationals Only)

London, England, United Kingdom
CENSUS SA
delivers unparalleled security consulting & assessment services for products (software, services, devices, and large-scale platforms), infrastructure, and organizations. Learn more about CENSUS at census-labs.com. About the Job/Key Responsibilities CENSUS’ bespoke cybersecurity services are built upon a talented pool of Security Engineers, whose role extends beyond mere adherence to industry best practices. We expect our Technical Leads … an assessment/consultancy role, an equivalent role in other engineering organizations, or a combination of them. Proven experience of 2+ years in a leading application security architecture role. Key Skills & Preferred Qualifications In-depth exposure to security concepts, cryptography, and protocols across various Application types (cloud, web, mobile, IoT/Embedded, etc.). Extensive, and leading role experience … Kotlin, Java, Dart, and JavaScript. Web- and Cloud-relevant, such as Java, Ruby, Rust, Go, Python, PHP, C#, Lua, and JavaScript. Experience with application authentication, authorization, identity, and access management methods, such as OAuth, SSO, JWT, PKI/Certificates, Cloud IAM, and Password-less authentication. Experience with application security features and key management systems backed by secure More ❯
Posted:

Security and Information Security Architect

City of London, London, United Kingdom
Hybrid / WFH Options
NextEnergy Group
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
Posted:

Security and Information Security Architect

London Area, United Kingdom
Hybrid / WFH Options
NextEnergy Group
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
Posted:

Security and Information Security Architect

london, south east england, united kingdom
Hybrid / WFH Options
NextEnergy Group
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
Posted:

Security and Information Security Architect

london (city of london), south east england, united kingdom
Hybrid / WFH Options
NextEnergy Group
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
Posted:

Security Operations Manager

London, England, United Kingdom
Hybrid / WFH Options
Barclay Simpson
regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including: Security Command Center VPC Service Controls IAM (Identity & Access Management) Cloud Logging and Monitoring Workload Identity Federation Automate security response using Python, Terraform, or XSOAR. Collaborate with infrastructure and DevOps teams to embed security into CI/CD pipelines … Experience as SOC lead, cyber operations manager, or similar role. Hands-on experience in securing Google Cloud Platform (GCP) environments across multiple projects/accounts. Strong expertise in: SIEM management (Chronicle, Splunk, Elastic) Incident response and recovery Security orchestration (SOAR), preferably Chronicle + XSOAR IAM, policy enforcement, logging, and access reviews in GCP Proven experience working in FinTech or … OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and Key Management Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. Influence More ❯
Posted:

Associate Professional Services Consultant - Early Career Program

London, England, United Kingdom
Amazon
in what is arguably our industry’s most exciting space. Security Consultant: Supports our services that have a focus on enabling security specialists using AWS Services including Identity Access Management (IAM), GuardDuty, Shield, Key Management Service (KMS), CloudTrail, CloudHSM, Inspector etc. BASIC QUALIFICATIONS A degree in Computer Science/Engineering/Mathematics/Technology/Related science … Operating Systems (Unix, Linux, and/or Windows). Experience with software development lifecycle (SDLC) and agile/iterative methodologies; Experience with infrastructure as code, ops automation, and configuration management tools such as Chef, Puppet, or Ansible. Knowledge of the primary AWS services such as EC2, ELB, RDS, VPC, Route53, and S3. Experience around implementing cloud-based technology solutions More ❯
Posted:

Security Operations Manager

London, England, United Kingdom
Hybrid / WFH Options
Barclay Simpson
regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including: Security Command Center VPC Service Controls IAM (Identity & Access Management) Cloud Logging and Monitoring Workload Identity Federation Automate security response using Python, Terraform, or XSOAR. Collaborate with infrastructure and DevOps teams to embed security into CI/CD pipelines … Experience as SOC lead, cyber operations manager, or similar role. Hands-on experience in securing Google Cloud Platform (GCP) environments across multiple projects/accounts. Strong expertise in: SIEM management (Chronicle, Splunk, Elastic) Incident response and recovery Security orchestration (SOAR), preferably Chronicle + XSOAR IAM, policy enforcement, logging, and access reviews in GCP Proven experience working in FinTech or … OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and Key Management Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. Influence More ❯
Posted:

Senior Cloud Architect, ML/AI Remote UK

London, England, United Kingdom
Hybrid / WFH Options
Doit Intl
and SageMaker Pipelines. Proficiency in monitoring and maintaining AI systems with Amazon CloudWatch and SageMaker Model Monitor. AI Governance and Security: Strong understanding of AI governance, incorporating IAM, AWS Key Management Service (KMS), and compliance frameworks. Knowledgeable in AI ethics, bias detection, and accountability using tools like SageMaker Clarify. Emerging AI Trends: Up-to-date on Generative AI More ❯
Posted:
Key Management
London
Median
£60,000
75th Percentile
£97,500
90th Percentile
£140,000