Liverpool, England, United Kingdom Hybrid / WFH Options
SW Group
As Cloud Security Engineer, your responsibilities will include among others Managing, implementing, and maintaining technical security controls for IAAS, PAAS and SAAS based services which support Financial Planning, Investment Management, Tax Advice and a range of Professional Services. Building out and improving capabilities around M365 utilising E5 licensing. Ensuring E5 security capabilities are being fully utilised and are correctly … date as services continue to mature and develop. Provide risk analysis and end to end control design, implementation for new services using cloud-based solutions. Supporting Agile based project management and iteration - squad-based delivery. Ensure that the vision for cloud-based service is built out on security best practice Familiarity in interpreting highly technical detail, being able to … enhancements to the cloud security strategy by identifying and alerting on appropriate event types. Identify and define system security requirements at a detailed technical level including controls for encryption, keymanagement, IAAS design and segregation. Deep technical experience of implementing security features within Azure including DDOS protection, encryption, and appropriate monitoring controls. Implement technical controls and make recommendations. More ❯
victories together. About the Role As a Security Software Engineer, your role involves architecting, designing, and implementing end-to-end security controls to impact the global user base. A key focus is on developing automated, scalable security solutions to enhance efficiency and protect Roku. This position requires expertise in creating and extending security automation tools, including detection and process … designing, and implementing End-to-End Security solutions and controls. Your work will directly impact our global user base Focusing on Automation. Developing automated, scalable security solutions. Efficiency is key Administering HashiCorp Vault for secrets management Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure Applying cryptography and security design … principles to cloud environments Documenting playbooks, procedures, and architecture Providing subject matter expertise to software development groups to assist in cryptography and keymanagement/authentication API. We are excited if you have Passion for cybersecurity with an effective and passionate drive to protect digital assets. Experience implementing custom, cloud-agnostic IAM at scale Navigate the complexities of More ❯
Cryptography HSM and KeyManagement Specialist Cryptography HSM and KeyManagement Specialist Job Description Purpose of the role Undertake all team activities in line with Barclays strategy, Crypto strategy and departmental goals. Ensure the integrity and availability of cryptographic and keymanagement services to business functions and applications. Maintain accurate environment documentation, process and … device categorisation. Provide ongoing assurance that risk and compliance requirements are being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. Incident management. Change management. ITIL. Ensure the integrity and availability of cryptographic and keymanagement services … to business functions and applications. Accountabilities Cryptographic Hardware Management - including on site local configuration activities. Support with resourcing, scheduling and distribution of work requests for HSM and Key management. Work closely with dates set in cooperation with Service Management to ensure smooth continuity of services and operations. Deliver to the required SLAs for all service. Gather, distribute More ❯
and in the cloud. The Data Security Architect is responsible for developing and executing a global data security strategy, ensuring the protection of sensitive information across the JD Group. Key Responsibilities: Implement and lead the Data Security Architecture capability across JD Sports, formalising principles through reference architectures, diagrams, and procedures. Research, evaluate, and implement data security technologies, process and … and implementing data security controls in geographically dispersed and hybrid cloud environments. Hands-on experience with modern enterprise-level data protection tools, including Data Loss Prevention (DLP), Digital Rights Management (RMS), data encryption/tokenization, and data discovery. Strong familiarity with Microsoft security solutions, such as AD RMS, Azure RMS, and Microsoft Purview for data governance, classification, and compliance … monitoring. In-depth knowledge of PKI, including certificate lifecycle management, encryption protocols, and secure keymanagement practices. Ability to lead and execute large, complex projects related to data security (e.g. introduction of a global DLP solution, replacement of a PKI environment). Considerable technical writing proficiency, oral presentation skills, problem solving and decision-making skills. Experience in More ❯
work with teams and communicate complex technical concepts to all partners. What you will do Provide implementation and operations support for security event and information monitoring, digital certificate and keymanagement processes, endpoint security, and web application security. Perform infrastructure security platform implementation, patching, and lifecycle management. Provide guidance to all lines of business on security related to … s degree in computer science, Information Security, or equivalent system security engineering experience. 2+ years of experience. 1-2 years in an engineering role focusing on endpoint protection, certificate management, SEIM, or web application security. Experience supporting multiple operating systems including Windows Server and Linux/UNIX. Hands-on experience with cybersecurity products and concepts such as EDR/… XDR, endpoint protection, SEIM, PKI, CA, HSM, key vaults, encryption services, web application security/web application firewall/bot protection, ATOs. Support projects including product upgrades, deployment of new capabilities, tools, enhancements, and daily operational support. Ability to present technical issues to non-technical audiences. What We Offer Open and dynamic working atmosphere. Attractive remuneration model. Flexible working More ❯
work with teams and communicate complex technical concepts to all partners. What you will do Provide implementation and operations support for security event and information monitoring, digital certificate and keymanagement processes, endpoint security, and web application security. Perform infrastructure security platform implementation, patching, and lifecycle management. Provide guidance to all lines of business on security related to … in computer science, Information Security, or equivalent system security engineering experience. 2+ years of experience. 1-2 years in an engineering role with a focus on endpoint protection, certificate management, SEIM, or web application security. Experience supporting/working with multiple operating systems including Windows Server and Linux/UNIX. Hands-on experience with cybersecurity products and concepts such … as EDR/XDR, endpoint protection, SEIM, PKI, CA, HSM, key vaults, encryption services, web application security/web application firewall/bot protection, ATOs. Support projects including product upgrades and deployment of new capabilities, tools, and enhancements and daily operational support. Ability to present technical issues to non-technical audiences. What We Offer Open and dynamic working atmosphere. More ❯
work with teams and communicate complex technical concepts to all partners. What you will do Provide implementation and operations support for security event and information monitoring, digital certificate and keymanagement processes, endpoint security, and web application security. Perform infrastructure security platform implementation, patching, and lifecycle management. Provide guidance to all lines of business on security related to … in computer science, Information Security, or equivalent system security engineering experience. 2+ years of experience. 1-2 years in an engineering role with a focus on endpoint protection, certificate management, SEIM, or web application security. Experience supporting/working with multiple operating systems including Windows Server and Linux/UNIX. Hands-on experience with cybersecurity products and concepts such … as EDR/XDR, endpoint protection, SEIM, PKI, CA, HSM, key vaults, encryption services, web application security/web application firewall/bot protection, ATOs. Support projects including product upgrades and deployment of new capabilities, tools, and enhancements and daily operational support. Ability to present technical issues to non-technical audiences. What We Offer Open and dynamic working atmosphere. More ❯
Crewe, England, United Kingdom Hybrid / WFH Options
Adecco
technological advancement, ensuring they remain at the forefront of the motor industry. As the Cybersecurity Lead, you will be the driving force behind the organisation’s cybersecurity initiatives. Your key responsibilities will include: Collaborating with control owners to develop and integrate security features, guiding the application of industry expertise in Intrusion Detection Systems (IDS), Secure Onboard Communication (SOC), and … Vehicle KeyManagement Systems (VKMS). Conducting comprehensive risk analyses and vulnerability assessments for automotive components while continuously enhancing defence measures against evolving threats. Leading compliance efforts regarding industry standards and regulatory requirements, ensuring that the organisation’s practices align with GB-44495, ISO/SAE 21434, UNECE WP.29, and GDPR. Fostering productive communication between internal stakeholders, partners … implementation for in-vehicle networks. Experience with SOC protocols, including message authentication and encryption methods for various automotive networks (CAN, LIN, Ethernet). Expertise in managing VKMS for secure key generation, distribution, and storage across Electronic Control Units (ECUs). Hands-on experience with end-to-end system design, integration, and testing of cybersecurity solutions. Familiarity with security regulations More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
University of Manchester
network security (e.g., intrusion and anomaly detection and prevention, denial-of-service attacks and countermeasures, wireless security, software-defined networks) and/or applied cryptography (e.g., algorithms and protocols, keymanagement, real-world applications such as secure messaging, secure computation techniques). Good knowledge of cyber-physical system security (e.g., IoT, botnet, lightweight security). The ability to … highest standards, secure external research funding, pursue real-world impact, and contribute to the PhD training programs. The Department of Computer Science values exceptional academics. You will play a key role in maintaining our reputation as an institute of learning by designing and delivering innovative UG/PG topics, both in your area of expertise and across the spectrum More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Queen Square Recruitment
cybersecurity operations team. This role is ideal for senior professionals who thrive in high-stakes environments and enjoy working on proactive threat detection, incident response, and advanced security automation. Key Responsibilities Lead the investigation and resolution of high-severity security incidents Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite Develop and fine-tune analytic rules, detection … United Kingdom 2 weeks ago Manchester, England, United Kingdom 2 weeks ago Salford, England, United Kingdom 3 weeks ago Waterside, England, United Kingdom 2 weeks ago Cryptography HSM and KeyManagement Specialist Security Systems Small Works/Install Engineer Manchester, England, United Kingdom 1 day ago Manchester, England, United Kingdom 3 months ago Knutsford, England, United Kingdom More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
Leading banking group seeks a Cryptography Analyst to join their security team. As an Analyst in the team, you will work on digital certificate management, cryptographic keymanagement, HSM configuration and support, incident management and change management. The successful candidate will have cryptography knowledge, or at least a strong interest in the subject, and good stakeholder … management skills. The position may suit someone with an operational security background and ITIL exposure who is keen to move into a new area. The role is based in the Manchester area 2 days a week, with 3 days working from home. #J-18808-Ljbffr More ❯
Wilmslow, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Cryptography/HSM/Hardware Security Module/KeyManagement This is an excellent opportunity to join a fast-paced, global Crypto team where you will gain excellent training and career development. Our client offers a people-first culture with stability, variety, and access to industry-first projects and More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
CloudCo Solutions Location: Job Category: Other EU work permit required: Yes Job Views: 3 Posted: 31.05.2025 Expiry Date: 15.07.2025 Job Description: Cryptography/HSM/Hardware Security Module/KeyManagement This is an excellent opportunity to join a fast-paced, global Crypto team where you will gain excellent training and career development. Our client offers a people More ❯