Liverpool, England, United Kingdom Hybrid / WFH Options
SW Group
As Cloud Security Engineer, your responsibilities will include among others Managing, implementing, and maintaining technical security controls for IAAS, PAAS and SAAS based services which support Financial Planning, Investment Management, Tax Advice and a range of Professional Services. Building out and improving capabilities around M365 utilising E5 licensing. Ensuring E5 security capabilities are being fully utilised and are correctly … date as services continue to mature and develop. Provide risk analysis and end to end control design, implementation for new services using cloud-based solutions. Supporting Agile based project management and iteration - squad-based delivery. Ensure that the vision for cloud-based service is built out on security best practice Familiarity in interpreting highly technical detail, being able to … enhancements to the cloud security strategy by identifying and alerting on appropriate event types. Identify and define system security requirements at a detailed technical level including controls for encryption, keymanagement, IAAS design and segregation. Deep technical experience of implementing security features within Azure including DDOS protection, encryption, and appropriate monitoring controls. Implement technical controls and make recommendations. More ❯
victories together. About the Role As a Security Software Engineer, your role involves architecting, designing, and implementing end-to-end security controls to impact the global user base. A key focus is on developing automated, scalable security solutions to enhance efficiency and protect Roku. This position requires expertise in creating and extending security automation tools, including detection and process … designing, and implementing End-to-End Security solutions and controls. Your work will directly impact our global user base Focusing on Automation. Developing automated, scalable security solutions. Efficiency is key Administering HashiCorp Vault for secrets management Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure Applying cryptography and security design … principles to cloud environments Documenting playbooks, procedures, and architecture Providing subject matter expertise to software development groups to assist in cryptography and keymanagement/authentication API. We are excited if you have Passion for cybersecurity with an effective and passionate drive to protect digital assets. Experience implementing custom, cloud-agnostic IAM at scale Navigate the complexities of More ❯
and in the cloud. The Data Security Architect is responsible for developing and executing a global data security strategy, ensuring the protection of sensitive information across the JD Group. Key Responsibilities: Implement and lead the Data Security Architecture capability across JD Sports, formalising principles through reference architectures, diagrams, and procedures. Research, evaluate, and implement data security technologies, process and … and implementing data security controls in geographically dispersed and hybrid cloud environments. Hands-on experience with modern enterprise-level data protection tools, including Data Loss Prevention (DLP), Digital Rights Management (RMS), data encryption/tokenization, and data discovery. Strong familiarity with Microsoft security solutions, such as AD RMS, Azure RMS, and Microsoft Purview for data governance, classification, and compliance … monitoring. In-depth knowledge of PKI, including certificate lifecycle management, encryption protocols, and secure keymanagement practices. Ability to lead and execute large, complex projects related to data security (e.g. introduction of a global DLP solution, replacement of a PKI environment). Considerable technical writing proficiency, oral presentation skills, problem solving and decision-making skills. Experience in More ❯
Newcastle upon Tyne, England, United Kingdom Hybrid / WFH Options
Leonardo
by a team of consultants, engineers, and specialists. The role may involve a hybrid working model, combining remote work and on-site collaboration at one of Leonardo's offices. Key Responsibilities Work with a team to deliver cyber and information security across the engineering lifecycle. Interpret customer requirements into security management plans, statements of work, and activities. Oversee … certification. Experience should include: 3+ years in a cyber/engineering role. Involvement in MOD accreditation and secure design processes. Knowledge of standards like NIST SP 800-series. Risk management in compliance with regulations. Experience with proprietary and open-source software, firmware, hardware. Design analysis and security design development. Cyber risk assessment, threat modeling, vulnerability analysis. Security verification, validation … and remedial planning. Collaboration with engineers and architects for secure solutions. Nice to have: Understanding of engineering lifecycle. Knowledge of cryptographic technologies, keymanagement, COMSEC, MOD/NCSC standards. Knowledge of Cyber Security & Airworthiness standards. Security Clearance Eligible for full security clearance. More info: UK Security Clearance Levels Life at Leonardo Benefits include flexible working, private healthcare, generous More ❯
approach extends beyond traditional service and solutions delivery, we strategically invest in and nurture a diverse portfolio of promising companies operating across vital sectors including; financial services, health, infrastructure management, sustainability, education, and business intelligence. This commitment to fostering innovation across a broad spectrum allows Aqovia to stay at the cutting edge, delivering transformative solutions and creating significant impact. … MiCA’s stringent requirements. The Head of Custody collaborates with the CEO, CSO, and compliance teams to safeguard assets and maintain regulatory compliance in a rapidly evolving fintech landscape. Key Responsibilities: Oversee the custody and safekeeping of crypto-assets, ensuring compliance with MiCA requirements for secure storage, client asset segregation, and accessibility. Develop and implement custody policies, including keymanagement, wallet security (hot/cold storage), and disaster recovery plans specific to crypto-assets. Manage the operational processes for depositing, withdrawing, and transferring crypto-assets, ensuring efficiency, security, and transparency for clients. Coordinate with the CSO to integrate custody security measures with the broader ICT and cybersecurity framework under MiCA and ISO 27001 standards. Liaise with the More ❯
work with teams and communicate complex technical concepts to all partners. What you will do Provide implementation and operations support for security event and information monitoring, digital certificate and keymanagement processes, endpoint security, and web application security. Perform infrastructure security platform implementation, patching, and lifecycle management. Provide guidance to all lines of business on security related to … s degree in computer science, Information Security, or equivalent system security engineering experience. 2+ years of experience. 1-2 years in an engineering role focusing on endpoint protection, certificate management, SEIM, or web application security. Experience supporting multiple operating systems including Windows Server and Linux/UNIX. Hands-on experience with cybersecurity products and concepts such as EDR/… XDR, endpoint protection, SEIM, PKI, CA, HSM, key vaults, encryption services, web application security/web application firewall/bot protection, ATOs. Support projects including product upgrades, deployment of new capabilities, tools, enhancements, and daily operational support. Ability to present technical issues to non-technical audiences. What We Offer Open and dynamic working atmosphere. Attractive remuneration model. Flexible working More ❯
work with teams and communicate complex technical concepts to all partners. What you will do Provide implementation and operations support for security event and information monitoring, digital certificate and keymanagement processes, endpoint security, and web application security. Perform infrastructure security platform implementation, patching, and lifecycle management. Provide guidance to all lines of business on security related to … in computer science, Information Security, or equivalent system security engineering experience. 2+ years of experience. 1-2 years in an engineering role with a focus on endpoint protection, certificate management, SEIM, or web application security. Experience supporting/working with multiple operating systems including Windows Server and Linux/UNIX. Hands-on experience with cybersecurity products and concepts such … as EDR/XDR, endpoint protection, SEIM, PKI, CA, HSM, key vaults, encryption services, web application security/web application firewall/bot protection, ATOs. Support projects including product upgrades and deployment of new capabilities, tools, and enhancements and daily operational support. Ability to present technical issues to non-technical audiences. What We Offer Open and dynamic working atmosphere. More ❯
work with teams and communicate complex technical concepts to all partners. What you will do Provide implementation and operations support for security event and information monitoring, digital certificate and keymanagement processes, endpoint security, and web application security. Perform infrastructure security platform implementation, patching, and lifecycle management. Provide guidance to all lines of business on security related to … in computer science, Information Security, or equivalent system security engineering experience. 2+ years of experience. 1-2 years in an engineering role with a focus on endpoint protection, certificate management, SEIM, or web application security. Experience supporting/working with multiple operating systems including Windows Server and Linux/UNIX. Hands-on experience with cybersecurity products and concepts such … as EDR/XDR, endpoint protection, SEIM, PKI, CA, HSM, key vaults, encryption services, web application security/web application firewall/bot protection, ATOs. Support projects including product upgrades and deployment of new capabilities, tools, and enhancements and daily operational support. Ability to present technical issues to non-technical audiences. What We Offer Open and dynamic working atmosphere. More ❯
to Sterling Secure Proxy, Sterling External Authentication Server, etc. Excellent general knowledge of file transfer protocols (e.g., sFTP, AS2, C:D, FTPS, HTTPS) and products. Knowledge of cryptography/keymanagement (SSL/TLS, SSH, PGP/GPG, etc.) and data security. #J-18808-Ljbffr More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
integrity such as GPS, against evolving spoofing techniques. In addition to your technical acumen, your track record in leading security initiatives and mentoring junior team members, will play a key role in fostering a proactive security culture. This role is eligible for inclusion in the Company s hybrid working from home policy. Preferred Skills, Qualifications and Experience Demonstrated mastery … tamper and defence systems. Demonstrable ability to lead, coach, and inspire security engineering teams, driving best practices and ensuring continuous knowledge sharing. In-depth understanding of encryption algorithms, secure keymanagement, and cutting-edge approaches in secure coding and risk reduction. Forward-thinking hacker mindset with a passion for identifying vulnerabilities before they are exploited. Excellent communication skills More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
University of Manchester
network security (e.g., intrusion and anomaly detection and prevention, denial-of-service attacks and countermeasures, wireless security, software-defined networks) and/or applied cryptography (e.g., algorithms and protocols, keymanagement, real-world applications such as secure messaging, secure computation techniques). Good knowledge of cyber-physical system security (e.g., IoT, botnet, lightweight security). The ability to … highest standards, secure external research funding, pursue real-world impact, and contribute to the PhD training programs. The Department of Computer Science values exceptional academics. You will play a key role in maintaining our reputation as an institute of learning by designing and delivering innovative UG/PG topics, both in your area of expertise and across the spectrum More ❯
/or on-premise environments Responsibilities include: Manage Kafka Cluster build, including Design, Infrastructure planning, High Availability, and Disaster Recovery Build and support producer/consumer applications Undertake Lifecycle Management across the Kafka on-premise environments Research and recommend innovative ways to maintain the environment and ensure automation is undertaken Set up monitoring tools such as SPLUNK, Prometheus, Grafana … cluster components (e.g., Broker, Zookeeper, Connect, REST proxy, Mirror Maker, Schema Registry, KSQL) Undertake regular assessments of platform health and stability, create improvement plans, and ensure automation/lifecycle management Manage SSL Certificates including public keymanagement Knowledge of Network topologies, Storage (SAN/NAS/DAS), clustering, and virtualization technologies Interaction with Oracle/PostgreSQL databases More ❯