Knutsford, Cheshire, England, United Kingdom Hybrid / WFH Options
Searchability NS&D
cryptographic technologies Exposure to enterprise-level environments and global teams THE CRYPTOGRAPHY ANALYST ROLE As a Cryptography Analyst , you will ensure the integrity, availability, and compliance of cryptographic and keymanagement services across the organisation. You will be hands-on in managing HSMs (Thales, Entrust, Gemalto, or similar), automating operational tasks, and supporting incident, change, and configuration management. … information security Hands-on experience managing HSMs (Thales, Entrust, or Gemalto) Proficiency with HSM monitoring tools and automation Coding skills in Python or similar scripting languages Knowledge of SSH key and certificate management ITIL Foundation qualification Excellent attention to detail and stakeholder management Hold active BPSS clearance TO BE CONSIDERED: Please apply through this advert or email … applying for this role, you give express consent for us to process and submit (subject to required skills) your application to our client in conjunction with this vacancy only. KEY SKILLS: Cryptography Analyst, HSM Management, Python, Automation, Information Security, ITIL, Certificate Management, KeyManagement, Security Operations, Risk and Compliance, NSD More ❯
Cryptography Engineer Manchester Area | 2-3x a week Role Description Join a global Cyber Security team as a Cryptography Specialist , ensuring the integrity and availability of cryptographic and keymanagement services across global systems. In this role you will help to develop the function further as one of the key technical components of this dedicated team. … Standard UK hours (9 AM – 5 PM) with one week on-call every four weeks. What You’ll Do Manage, configure, and support Hardware Security Modules (HSMs) and keymanagement infrastructure. Oversee key generation, distribution, and governance across multiple platforms. Maintain risk controls, compliance records, and security documentation to audit standards. Support incident, change, and problem management, driving service improvements. Essential Experience Proven expertise in cryptography, HSMs, and key/certificate management. ITIL Foundation certification and experience in operational security environments. Strong stakeholder management and communication skills. Bachelor’s degree in Computer Science or related discipline. Desirable: Security or project management certifications (e.g. CISSP, CISM, PMP). Familiarity with Unix/Windows, data More ❯
their established team. Youll be instrumental in embedding security into every stage of the software development lifecycleguiding engineers, shaping best practices, and driving secure, scalable solutions across our platform. Key Responsibilities: Security Advisory: Serve as the go-to expert for application security across engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement: Promote … and implement secure development practices across CI/CD pipelines, secrets and keymanagement, dependency management, and secure design. Vulnerability Management: Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. Tooling & Automation: Integrate security tools (e.g., SAST, DAST, SCA, secrets scanning) into developer workflows, ensuring automation is both scalable … Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secrets management, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis, and container More ❯
with a strong focus on containerisation, cloud security, and automation . You will work closely with development, security, and operations teams to deliver reliable, secure, and scalable cloud solutions. Key Responsibilities: Design and implement cloud architectures on Azure, leveraging services such as AKS, SQL PaaS , and other Microsoft cloud technologies. Collaborate with development, security, and operations teams to ensure … like Prisma Cloud and App Check . Integrate security best practices into CI/CD pipelines in collaboration with DevOps and Infrastructure teams. Apply expertise in cloud networking, identity management, and encryption to ensure robust and secure environments. Manage identity and access management (IAM) , keymanagement systems, and encryption mechanisms across Azure. Maintain and optimise AKS More ❯
dartford, south east england, united kingdom Hybrid / WFH Options
Europa Worldwide Group
Cloud and App Check. Work with DevOps and Infrastructure teams to embed security best practices into CI/CD pipelines. Apply strong knowledge of cloud networking, security, and identity management to ensure robust and secure environments. Manage identity and access management (IAM), encryption mechanisms, and keymanagement systems across Azure. Maintain and optimise AKS environments, ensuring … best practices for cluster configuration, container lifecycle management, and operational resilience. Ensure adherence to organisational security policies, regulatory requirements, and industry best practices. Stay up to date with emerging Azure, cloud security, and containerisation technologies to drive continuous improvement. Our Ideal Person 3+ years of experience in cloud engineering or a related technical role. Strong, hands-on experience with More ❯
Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Sanderson
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Hampshire, South East, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Hampshire, South East, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Telford, Shropshire, West Midlands, United Kingdom
InfinityQuest Ltd,
Key Skills & Experience: 10+ years of experience in PAM consulting and implementation, with a strong focus on environmental assessment and solution design. Strong expertise in RBAC and ABAC models, including policy design and enforcement. Deep understanding of on-premises infrastructure and hosting environments. Hands-on experience with Windows, Linux, Solaris, and AIX server platforms. Familiarity with Active Directory, LDAP … SSH keymanagement, and service account governance. Experience with PAM tools such as CyberArk, BeyondTrust, Delinea, etc Experience with identity federation, directory services, and authentication. More ❯
monitoring and protection tools such as Firewalls, IDS/IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience in designing and implementing Identity and Access Management (IAM) solutions and maintaining secure authentication practices. Proficiency with Windows and Linux systems , as well as network scanning and diagnostic tools (e.g., Wireshark, IP scanner). A solid understanding … of Public Key Infrastructure (PKI) and encryption fundamentals. Excellent collaboration, communication, and organisational skills , with the ability to work both independently and as part of a cross-functional team. Proven ability to handle sensitive information with discretion, professionalism, and sound judgment. Relevant certifications such as AWS Certified Security - Speciality, CISSP, CCSP, or Terraform Associate (or equivalent experience). Preferred … Qualifications Exposure to threat intelligence and security analytics , particularly within cloud environments. Bachelor's degree in Computer Science, Information Technology, or Information Security , or equivalent practical experience. Familiarity with key security frameworks and standards such as PCI, ISO 27001, NIST, and CIS, along with experience supporting audits and compliance initiatives. Strong understanding of networking protocols, systems architecture , and secure More ❯
Farnborough, Hampshire, South East, United Kingdom
Sanderson Government and Defence
this role, you'll be: Providing the Secure by Design risk and security assurance function within MOD as part of a managed service. Have an excellent understanding of risk management and assessment principles and frameworks, such as ISO27005 and the NIST Cyber Security Framework. Produce informative and succinct reporting that clearly articulates any identified vulnerabilities, associated risks, controls and … risk treatment activity. Facilitate security and risk workshops with the various Authority departments, to align with wider customer transformational Security and risk management outcomes. Provide accurate and pragmatic remediation/risk management guidance/advice in balance with Business objectives and risk appetites. Have an understanding of risk assessment in an agile delivery environment. Exceptional team working ethic … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering KeyManagement in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering KeyManagement in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯
based PKI solutions tailored to client needs using Azure or AWS architectures. Required Skills & Qualifications: Extensive knowledge and experience in PKI and Cryptography solution design. Proficiency in MS Certificate Management Services including Certification Authority, Online Responder, NDES Services, CEP/CES, and Active Directory Domain Services. Expert level experience in SSL certificate management, OpenSSL, and Certutil. Experience with … Hardware Security Module (HSM) technology and KeyManagement Server (KMS) technology, preferably with Thales HSM platforms. Expertise in cloud solution development with Azure or AWS, specifically related to PKI management. Strong background in Cryptography & PKI solution design (HLD & LLD). More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
Experis
team as a PKI Architect , designing and delivering secure, high-assurance cryptographic solutions for Defence and Government clients. This is a unique opportunity to apply your expertise in Public Key Infrastructure (PKI) and cryptography to protect critical national systems and enable trusted digital services. About the Role - PKI Architect As a PKI Architect , you'll play a key … In-depth knowledge of Microsoft Certificate Services (CA, NDES, CEP/CES, AD DS) and tools such as OpenSSL and Certutil . Expertise with Hardware Security Modules (HSMs) and KeyManagement Systems (KMS) - experience with Thales HSM platforms highly desirable. Advanced understanding of SSL certificate management and related lifecycle processes. Experience designing PKI in cloud environments (Azure More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Experis
team as a PKI Architect , designing and delivering secure, high-assurance cryptographic solutions for Defence and Government clients. This is a unique opportunity to apply your expertise in Public Key Infrastructure (PKI) and cryptography to protect critical national systems and enable trusted digital services. About the Role - PKI Architect As a PKI Architect , you'll play a key … In-depth knowledge of Microsoft Certificate Services (CA, NDES, CEP/CES, AD DS) and tools such as OpenSSL and Certutil . Expertise with Hardware Security Modules (HSMs) and KeyManagement Systems (KMS) - experience with Thales HSM platforms highly desirable. Advanced understanding of SSL certificate management and related lifecycle processes. Experience designing PKI in cloud environments (Azure More ❯
s, DigiCert, OpenSSL. Familiarity with certificate usage in TLS, S/MIME, code signing, document signing, VPN, smart cards, and secure email. Understanding of encryption algorithms, hash functions, and keymanagement practices. Experience in designing secure architectures in hybrid or cloud environments. Knowledge of compliance and regulatory standards such as PCI DSS, HIPAA, SOX, GDPR, NIST More ❯
delivery of secure, large-scale infrastructure across both private and public cloud environments. This position focuses heavily on enterprise PKI and trust services, integrating modern authentication, federation, and certificate management capabilities across highly assured platforms. Youll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering practical … scalable solutions to complex mission systems. Key Responsibilities: Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities, and Certificate Lifecycle Management systems Develop high-quality design artefacts, standards, and documentation for PKI, identity, and cross-domain architectures Provide technical guidance on Active Directory integration, federation services, and certificate-based … PKI and trust infrastructures (Root/Issuing CAs, RA, VA, CLM). Familiarity with Defence or government PKI ecosystems is advantageous Strong understanding of Active Directory, federation and identity management platforms, and certificate-based access controls Experience designing secure cloud solutions within private (VCF) and hyperscale (AWS, Azure, GCP) environments Knowledge of certificate auto-enrolment, keymanagementMore ❯
delivery of secure, large-scale infrastructure across both private and public cloud environments. This position focuses heavily on enterprise PKI and trust services, integrating modern authentication, federation, and certificate management capabilities across highly assured platforms. Youll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering practical … scalable solutions to complex mission systems. Key Responsibilities: Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities, and Certificate Lifecycle Management systems Develop high-quality design artefacts, standards, and documentation for PKI, identity, and cross-domain architectures Provide technical guidance on Active Directory integration, federation services, and certificate-based … PKI and trust infrastructures (Root/Issuing CAs, RA, VA, CLM). Familiarity with Defence or government PKI ecosystems is advantageous Strong understanding of Active Directory, federation and identity management platforms, and certificate-based access controls Experience designing secure cloud solutions within private (VCF) and hyperscale (AWS, Azure, GCP) environments Knowledge of certificate auto-enrolment, keymanagementMore ❯
with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, keymanagement, and secure protocols (TLS, SSH, etc.) Detailed understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network … support to thrive Whether through mentorship, training, or leadership opportunities, we invest in your success so you can make a lasting impact. We believe diverse teams, working together are key to driving growth and delivering business results. We recognise the importance of employee well-being. We prioritise in providing competitive benefit plans, including Private Medical cover, Employee Assistance Program More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
Opus Recruitment Solutions Ltd
resilient cloud applications Infrastructure as Code (IaC): Experience with IaC tools like AWS CloudFormation or Terraform to automate the deployment of AWS resources securely and efficiently. Identity and Access Management (IAM): Expertise in managing access to AWS services and resources securely, using AWS IAM to control authentication and authorization. Understanding of encryption methods and AWS services related to data … encryption both at rest and in transit. Experience with AWS KeyManagement Service (KMS) and AWS Certificate Manager (ACM). Knowledge of compliance requirements that impact cloud security (e.g., GDPR, HIPAA, SOC 2) and experience in implementing controls to meet these requirements. Ability to design and execute incident response strategies within the AWS cloud, including the use of More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
Reed
bring: Deep expertise in PKI and cryptographic solution design . Strong experience with Microsoft Certificate Services (CA, NDES, CEP/CES, AD DS). Advanced knowledge of SSL certificate management , including tools like OpenSSL and Certutil. Hands-on experience with Hardware Security Modules (HSMs) – ideally Thales – and KeyManagement Servers (KMS) . Proven capability in cloud-based More ❯
with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, keymanagement, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network More ❯
with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, keymanagement, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network More ❯