Cryptography Analyst - Knutsford - £40,000 We're seeking a technically strong and highly logical Cryptography & KeyManagement Specialist to join our tightly knit team. This is a critical position in a high-security environment, supporting enterprise-level cryptographic services and secure keymanagement across physical infrastructure and applications. You'll be part of a small, agile … crypto (think quantum), and are keen to bridge technical expertise with business logic, we want to hear from you. Responsibilities Manage and support Hardware Security Modules (HSMs) and associated keymanagement processes. Contribute to secure cryptographic practices including PKI, SSH, symmetric/asymmetric encryption. Assist with application connectivity and infrastructure related to secure traffic flow and encryption. Perform … or support secure key ceremonies and data centre activities. Collaborate closely with cross-functional teams to translate technical requirements into practical, secure solutions. Your Experience: Must-Have Skills & Experience: Minimum 2 years of hands-on cryptography experience (graduates will not be considered). Understanding of cryptographic principles, including Strong IT background - especially in one or more of the following More ❯
Burgess Hill, West Sussex, South East, United Kingdom
Lancesoft Ltd
development experience within JavaCard/HCE domain. (MUST) o Working experience with cryptographic algorithms like 3DES, AES, RSA, ECC etc. (MUST) o Deep understanding of Global Platform card content management and keymanagement processes (MUST) o Knowledge of EMV Common Personalization Specification and processes. (MUST) o Nice to have working knowledge of different KeyManagementMore ❯
opportunity, then make sure to apply today. (MUST) o Working experience with cryptographic algorithms like 3DES, AES, RSA, ECC etc. (MUST) o Deep understanding of Global Platform card content management and keymanagement processes (MUST) o Knowledge of EMV Common Personalization Specification and processes. (MUST) o Nice to have working knowledge of different KeyManagementMore ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Investigo
looking for an experienced Cryptography Analyst to join a dedicated security team. You will be supporting the integrity and availability of the clients cryptographic infrastructure. You will play a key role in supporting cryptographic hardware, keymanagement services, certificate management, and ensuring adherence to IT security standards. Your expertise will help shape and secure the operations … aligning with the Crypto strategy and wider departmental goals. Key Responsibilities Manage cryptographic hardware (HSMs - Thales, Entrust, Gemalto, etc.), including installation, configuration, and on-site activities Perform SSH key and certificate management Support cryptographic key lifecycle activities: generation, distribution, storage, recovery, and deletion Maintain accurate documentation and perform regular risk and compliance checks Handle incident, problem … and change management processes (aligned with ITIL best practices) Ensure strong governance, audit trails, and adherence to Barclays' IT Security Standards Contribute to automation and scripting efforts (e.g., Python) to streamline operations Participate in out-of-hours support and provide monthly risk/management reporting Collaborate with global teams across diverse platforms (IBM, Tandem, Unix) Essential Skills & Qualifications More ❯
Burgess Hill, Sussex, United Kingdom Hybrid / WFH Options
N Consulting Limited
Hill, UK (Hybrid, 2-3 days onsite) Industry: Financial Services Interview: Single client roundWe are looking for 1-2 subcontractor profiles with niche skills in the Payments domain . Key Must-Have Skills: JavaCard/HCE application developmentCryptographic algorithms (3DES, AES, RSA, ECC)Global Platform card content & keymanagement processesEMV Common Personalization Specification Nice to Have: Keymanagement principlesAndroid/iOS development for payment processingEnterprise mobile application development experience This is a highly specialized role requiring strong expertise in JavaCard (not standard Java), EMV, and cryptography .If you're interested or know someone suitable, please DM me or share your profile at your email/contact . More ❯
This role ensures secure provisioning, rotation, storage, and decommissioning of sensitive credentials across enterprise systems, while leading a team of engineers and analysts to maintain compliance and operational excellence. Key Responsibilities: Leadership & Team Management Lead a team responsible for managing enterprise KCS infrastructure. Assign tasks, monitor performance, and provide mentorship and training. Foster a culture of security, accountability … and continuous improvement. Operational Oversight Oversee the deployment, monitoring, and maintenance of keymanagement systems (KMS), certificate authorities (CA), and secrets management platforms. Manage Certificate Authorities (CAs), Registration Authorities (RAs), OCSP responders, CRLs, and HSMs. Ensure timely rotation and renewal of certificates and secrets to prevent outages or vulnerabilities. Manage access controls and audit trails for all … internal policies and external standards (e.g., NIST, ISO 27001, PCI-DSS). Support internal and external audits by maintaining accurate documentation and logs. Implement and enforce policies for secure key generation, storage, and destruction. Incident Response & Troubleshooting Act as the escalation point for KCS-related incidents. Lead root cause analysis and remediation efforts for certificate expirations, key compromise More ❯
development experience within JavaCard/HCE domain. (MUST) o Working experience with cryptographic algorithms like 3DES, AES, RSA, ECC etc. (MUST) o Deep understanding of Global Platform card content management and keymanagement processes (MUST) o Knowledge of EMV Commo click apply for full job details More ❯
On-site - Corsham/Farnborough Clearance Required: DV (Developed Vetting) Role Summary We're seeking a skilled PKI Support/Operator to provide 2nd-4th line support for Public Key Infrastructure (PKI) services and supporting infrastructure. This on-site role involves troubleshooting, maintenance, certificate life-cycle management, and ensuring compliance with security best practices in a high-assurance … environment. Key Responsibilities Operational Support & Incident Management Provide 2nd/3rd line support for PKI systems including root, subordinate, and issuing CAs. Troubleshoot certificate issues (issuance, revocation, validation, auto-enrolment). Manage incidents, service requests, and changes within defined SLAs. Infrastructure Maintenance Support identity and security services (e.g. AzureAD, Intune, SSO). Monitor and respond to alerts (e.g. … Microsoft Defender). Maintain server health, backups, patching, and updates. Certificate Lifecycle Management Handle certificate requests, renewals, and revocations. Maintain inventory and ensure timely renewals to avoid service disruption. Compliance & Documentation Adhere to CP/CPS and security policies. Manage CA audit logs and role-based access controls. Maintain detailed technical and procedural documentation. Required Skills & Experience Technical: Solid More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or related fields within Public Sector and MOD and will … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance … Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams in support of evaluation activities. Preparation of TEMPEST Control Plans, advising development teams on appropriate implementation techniques, and liaising with TEMPEST test facilities. Advising development teams on suitable platform lockdown and configurations, and supporting Penetration … test activities. Analysing penetration test results and preparation of remedial action plans. Prepare and implement through life support and maintenance for product security including vulnerability and patch management plans Lead security incident management teams during incident/crisis situations in conjunction with Head of Product Security for EW/FCA Review and maintain corporate product security policies. Deliver More ❯
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering KeyManagement in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering KeyManagement in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering KeyManagement in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯
resilient cloud applications Infrastructure as Code (IaC): Experience with IaC tools like AWS CloudFormation or Terraform to automate the deployment of AWS resources securely and efficiently. Identity and Access Management (IAM): Expertise in managing access to AWS services and resources securely, using AWS IAM to control authentication and authorization. Understanding of encryption methods and AWS services related to data … encryption both at rest and in transit. Experience with AWS KeyManagement Service (KMS) and AWS Certificate Manager (ACM). Knowledge of compliance requirements that impact cloud security (e.g., GDPR, HIPAA, SOC 2) and experience in implementing controls to meet these requirements. Ability to design and execute incident response strategies within the AWS cloud, including the use of More ❯