challenges and celebrates victories together. About The Role Roku's Trust Engineering Team is looking for a senior software engineer to focus on cryptographic keymanagement systems. Your work will be focused on the architecture and design of scalable keymanagement systems, including Public Key … work day-to-day with a cross-functional team of web service, devops, firmware and manufacturing ops engineers to build and deploy highly scalable keymanagement and distribution systems. We're Excited If You have Expertise of relevant software development. Practical experience with cryptographic protocols, algorithms and standards. … Experience with key injection, hardware root of trust, HSMs, PKI, DRM and designing secure systems. Experience implementing and integrating with secure RESTful Web Services. Experience with AWS security services such as KMS and ACM. Experience with threat modeling and an awareness of the Internet threat model. Experience with DevOps More ❯
will be part of the Cryptography team within the Cyber Security Office (CSO), Global Information Security. This team provides critical cryptographic services, including Secure KeyManagement, Hardware Security, Application Cryptography, Strong Authentication, and PKI & Certificate services to the Group. Your primary responsibility will be to act as a … Cryptography Analyst, you will need the following: Experience in Cryptography and Information Security. ITIL Foundation certification. Bachelor's degree in Computer Science. Strong stakeholder management with the ability to influence and negotiate at all levels. Excellent attention to detail and accuracy. Ability to make informed decisions under tight deadlines … and manage multiple priorities effectively. Proficiency in MS Office applications. Some other highly valued skills may include: Relevant security or project management certifications. Background in operational environments, including incident response and change management. Strong documentation skills for operational procedures. Familiarity with SharePoint, Confluence, and JIRA. Unix/Windows operating More ❯
City, Aberdeen, United Kingdom Hybrid / WFH Options
Baker Hughes Gruppe
to business strategies and requirements. Assisting in the maintenance of M&A playbooks based on company security standards, procedures, and best practices including account management, tenant management, information/IP protection management, proxy server management, security ingress/egress management, domain trusts posture, SSL/… IPsec, security incident and event management (SIEM), data protection (DLP, encryption), and password/keymanagement, vulnerability/threat assessment. Collaborating with security team members to develop all M&A security requirements for all hardware and software computing platforms, environments and solutions including developing and or modifying … accredited university or college. Have experience in ITGC/GITC audits including interfaces, control reports configurable controls. Possess deep working knowledge of IT service management (e.g., ITIL-related disciplines). Have a solid working knowledge of OT security and how it aligns and differs from Enterprise IT Security. Demonstrate More ❯
Aldershot, Hampshire, United Kingdom Hybrid / WFH Options
DXC Technology Inc
Job Description: Our client offers multiple building blocks (Access Management, User Management, OAuth, Certificate Management, Datapower, KeyManagement, PAMaaS and LogaaS) to its customers. The Analyst will through identifying customer needs and requirements, translate them into technical requirements and integration sheet. The successful candidate will … play a key role ensuring the seamless integration of technology solutions. The analyst will join a team that values agile principles: sprint-based approach, onboarding meeting, intake meeting, file building, T&I build and testing, scheduling meeting, PRD build and testing. Location: Fully remote within Belgium is feasible, with … new applications, mapping functional and technical expectations. SPOC to relevant ACM/DEVOPS teams re onboarding of applications/projects. SPOC to support user management re incidents, customer queries from onboarding procedures. Working out the technical requirements of the user and access management projects based on direction from More ❯
Kingdom and Ireland, Reapit's market-leading technology product suite provides estate and lettings agents with powerful tools covering lead generation, sales, lettings, property management, block management, client accounts, keymanagement and analytics, underpinned by a robust, security infrastructure. Worldwide, Reapit technology is used by over … agents in more than 15,000 branches, with over a million properties under management; enabling them to run their businesses, identify opportunities for growth, manage their properties, collect rent, communicate with their clients, and deliver an outstanding customer experience, every time. What you'll be doing Reporting to the More ❯
role is ideal for security architects who have worked in regulated industries like Banks, Insurance Companies, PSUs or as security architects in System Integrators. Key job responsibilities: Help customers implement core AWS security services such as Amazon Identity and Access Management (IAM), KeyManagement System, CloudHSM … DevSecOps pipeline with IaC scanner, SAST, DAST tool in the SDLC. Hands-on experience in one of the following is mandatory: Identity and Access Management Data Encryption Network Security Incident Response Security Automation About the team Diverse Experiences: Amazon values diverse experiences. Even if you do not meet all More ❯
critical operational environment? Join a dedicated team managing a vital global network infrastructure for a leading organisation. This is an opportunity to become a key member of a small, established team of network professionals responsible for the management and support of a complex global network. You will play … remotely. If you thrive under pressure, can prioritise critical tasks effectively, and excel in a collaborative, time-sensitive environment, this role is for you. Key Responsibilities: Monitor, analyse, and report on all elements of the network infrastructure. Manage and process customer service requests efficiently. Develop, test, and deploy network … configurations for new services. Collaborate effectively with Service Management teams and key stakeholders to deliver services. Provide technical support and guidance to Managed Service Providers (MSPs). Maintain accurate network diagrams and documentation. Contribute to annual Crypto Keymanagement processes. Update and maintain the Configuration ManagementMore ❯
critical operational environment? Join a dedicated team managing a vital global network infrastructure for a leading organisation. This is an opportunity to become a key member of a small, established team of network professionals responsible for the management and support of a complex global network. You will play … remotely. If you thrive under pressure, can prioritise critical tasks effectively, and excel in a collaborative, time-sensitive environment, this role is for you. Key Responsibilities: Monitor, analyse, and report on all elements of the network infrastructure. Manage and process customer service requests efficiently. Develop, test, and deploy network … configurations for new services. Collaborate effectively with Service Management teams and key stakeholders to deliver services. Provide technical support and guidance to Managed Service Providers (MSPs). Maintain accurate network diagrams and documentation. Contribute to annual Crypto Keymanagement processes. Update and maintain the Configuration ManagementMore ❯
best-practice cryptography solutions Skills and Experience: Extensive experience in designing and implementing PKI solutions Strong understanding of cryptographic principles and protocols Experience in management and implementation of Microsoft Certificate management services and PKI infrastructure, including Active Directory Certificate Services (ADCS), Azure Key Vault, and Microsoft Certificate … Authority (CA) Experience in cloud cryptography solutions, including design and implementation of hardware security modules (HSM) and keymanagement servers (KMS) Strong knowledge and understanding of industry cryptographic frameworks, standards, and protocols Proficient skills in PowerShell and OpenSSL Expert problem-solving and analytical skills Strong written and oral More ❯
of the service it delivers both internally and externally. Be a part of the professional culture within the team where ownership and quality are key values. Main Responsibilities: Support & Infrastructure: Monitor and resolve issues affecting the delivery of services to our clients; Manage application licensing; Keep up to date … Security: Maintain an understanding of the regulatory and compliance issues driving Sequel's ISMS; With leaders across the business, assist with the maintenance and management of Sequel's Risk Registers; Gain an understanding of the key information risks to the business (systems, networks, data, human error, cyber-attacks … appreciate how the insurance industry works. Knowledge and Experience: Essential: A minimum of 2 years in an infrastructure, SysOps or Security role; Active Directory management; NTFS permission & Group Policy configuration & management; Microsoft RDS Architecture (RemoteApp/RDWeb Gateway/RDS Broker); Virtual Windows 2016 DC Servers/File More ❯
As a Security Software Engineer, your role involves architecting, designing, and implementing end-to-end security controls to impact the global user base. A key focus is on developing automated, scalable security solutions to enhance efficiency and protect Roku. This position requires expertise in creating and extending security automation … End Security solutions and controls. Your work will directly impact our global user base Focusing on Automation. Developing automated, scalable security solutions. Efficiency is key Administering HashiCorp Vault for secrets management Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure … security design principles to cloud environments Documenting playbooks, procedures, and architecture Providing subject matter expertise to software development groups to assist in cryptography and keymanagement/authentication API. We are excited if you have Passion for cybersecurity with an effective and passionate drive to protect digital assets. More ❯
Data Security Architect is responsible for developing and executing a global data security strategy, ensuring the protection of sensitive information across the JD Group. Key Responsibilities: Implement and lead the Data Security Architecture capability across JD Sports, formalising principles through reference architectures, diagrams, and procedures. Research, evaluate, and implement … in geographically dispersed and hybrid cloud environments. Hands-on experience with modern enterprise-level data protection tools, including Data Loss Prevention (DLP), Digital Rights Management (RMS), data encryption/tokenization, and data discovery. Strong familiarity with Microsoft security solutions, such as AD RMS, Azure RMS, and Microsoft Purview for … data governance, classification, and compliance monitoring. In-depth knowledge of PKI, including certificate lifecycle management, encryption protocols, and secure keymanagement practices. Ability to lead and execute large, complex projects related to data security (e.g. introduction of a global DLP solution, replacement of a PKI environment). More ❯
Developing and maintaining the PKI infrastructure Developing/maintaining a secure cloud PKI platform PKI\ cryptography solution documentation Developing best in class Cryptography solutions Key skills needed: Extensive experience in designing and implementing PKI solutions SME understanding of cryptographic principles and protocols Experience in management and implementation of … Microsoft Certificate management services and PKI infrastructure, including Active Directory Certificate Services (ADCS), Azure Key Vault and Microsoft Certificate authority (CA) Experience in the design and implementation of Hardware security modules (HSM) and Keymanagement servers (KMS) Demonstrable experience in developing HSM solution designs for global More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
Incident Response & Forensic Analysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance - Proficiency in identifying potential security risks, conducting risk assessments, and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing … implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure keymanagement, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
Incident Response & Forensic Analysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance - Proficiency in identifying potential security risks, conducting risk assessments, and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing … implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure keymanagement, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. More ❯
and security. You will work with cutting-edge technologies and participate in an on-call rota to support business-critical systems 24/7. Key Responsibilities: -Provide technical support for VMware platform, Tanzu, Dell VxRail, and Dell Data Domain. -Troubleshoot keymanagement systems like HashiCorp Vault and … Thales HSM. -Support privileged access management solutions (BeyondTrust) and SSO systems (KeyCloak). -Have a foundational knowledge of network principles. System Maintenance: -Administer and maintain Windows Server 2022 and Hyper-V. -Monitor system performance and conduct routine maintenance. -Contribute to disaster recovery and business continuity strategies. Collaboration & Documentation: -Work More ❯
mitigate the same. Participate in crisis calls for service recovery, MIRs and SIPs. Own the resolution of problems in hand, demonstrate analytical and problem management skills to drive the resolution and prevent recurrence. * Work on critical/complex incidents and ensure completion within agreed deadlines. Participate in POCs and … efficiencies and reduce toil. Enterprise focus * building solutions with an emphasis on sustainability, supportability, stability and robustness including disaster recovery features. * Knowledge of Service Management (Change, Incident and Problem) and Agile methodologies. * Ability to work independently with minimal supervision and with sense of ownership and accountability. * Strong written, verbal … External Authentication Server etc. * Excellent general knowledge of file transfer protocols (e.g. sFTP, AS2, C:D, FTPS, HTTPS) and products. * Knowledge of cryptography/keymanagement (SSL/TLS, SSH, PGP/GPG etc.) and data security * Ability to manage application support operations, resiliency and availability including monitoring More ❯
Crewe, Cheshire, United Kingdom Hybrid / WFH Options
Bentley Motors
security standards and legislations (all regions, e.g., GB44495, ISO/SAE21434, UNECE WP29/R155, GDPR, Data security). Proven experience in technical project management, particularly in planning and rolling out security functions. Technical knowledge of product security countermeasures, including Intrusion Detection Systems (IDS), Secure Onboard Communication (SOK), Vehicle … KeyManagement Systems (VKMS), TLS, etc. Excellent communication and collaboration skills. Strong problem-solving and analytical skills. Software/Programming knowledge (C, C++). Encryption algorithms knowledge. Ability to influence colleagues within your area of responsibility. Engineering degree or equivalent is essential. What Bentley Offers Hybrid working options More ❯
to join our team. This role is ideal for professionals who excel in supporting, maintaining, and optimizing critical IT infrastructure. You will play a key role in ensuring the high availability, security, and performance of our systems while troubleshooting complex issues efficiently. Additionally, you will participate in an on … call rota to provide 24/7 support for mission-critical systems. Key Responsibilities: Advanced Support & Troubleshooting: Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. Troubleshoot and resolve issues related to keymanagement systems, including HashiCorp Vault and Thales … Hardware Security Module. Manage and support privileged access management solutions (BeyondTrust) and SSO systems (KeyCloak). Have a strong foundation in networking principles. System Maintenance & Optimisation: Administer and optimise Windows Server 2022 and Hyper-V environments. Perform proactive monitoring and maintenance to ensure system performance and reliability. Implement and More ❯
to join our team. This role is ideal for professionals who excel in supporting, maintaining, and optimizing critical IT infrastructure. You will play a key role in ensuring the high availability, security, and performance of our systems while troubleshooting complex issues efficiently. Additionally, you will participate in an on … call rota to provide 24/7 support for mission-critical systems. Key Responsibilities: Advanced Support & Troubleshooting: -Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. -Troubleshoot and resolve issues related to keymanagement systems, including HashiCorp Vault and Thales … Hardware Security Module. -Manage and support privileged access management solutions (BeyondTrust) and SSO systems (KeyCloak). -Have a strong foundation in networking principles. System Maintenance & Optimisation: -Administer and optimise Windows Server 2022 and Hyper-V environments. -Perform proactive monitoring and maintenance to ensure system performance and reliability. -Implement and More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
leonardo company
line capability wherever and whenever required. We are looking for an experienced product security practitioner with expertise in developing and maintaining robust product security management systems for defence and government customers. The Chief Product Security Engineer will take responsibility for ensuring that all security aspects of the design, development … teams, including in terms of: Deriving security requirements Undertaking security risk assessments for products Preparing security risk mitigation plans Review and approval of Security Management plans Security policy maintenance and monitoring Production of LoB security metrics Management of attendance at external security forums Attendance and support to the … Security Special Interest Group Lead security incident management teams during incident/crisis situations in conjunction with the Lead Product Security Engineer(s) The Chief Product Security Engineer has delegated authority within the independent Design Integrity function, responsible for the following elements: Security process maintenance and monitoring Security competence More ❯
makes you a great fit: University Degree (e.g. Bachelor or Masters) in Embedded Systems, Computer Science or similar. Understanding of microcontroller architecture, Cryptography and KeyManagement Fluent in reviewing source code written in one of these languages: C, C++, Assembly Understanding of secure communications (e.g. USB, Serial, Ethernet … workshops, reading professional publications, participating in technical working groups and cross-departmental task forces. Share knowledge and expertise through internal and external trainings. Time management, prioritization and task switching. Qualifications University Degree (Equivalent to Bachelors Degree) in Electronic/Computer Science/Computer Engineering/Electrical Engineering or a More ❯
Developer !! Location: Cardiff UK Job ID: 32973 The Operations Solutions team delivers software solutions used throughout the manufacturing organization targeting the industrialization and production management of HID products. Those solutions are deployed across the globe, at HID sites, and also at suppliers and contract manufacturer production sites. As a … Knowledge of electronic design & hardware is appreciated. Knowledge of communication interfaces over JTAG, SWD, UART, SPI, I2C is appreciated. Knowledge in applied cryptography and keymanagement is appreciated. Knowledge of Agile/SCRUM is appreciated. Knowledge of RFID industry standards such as ISO7816, ISO14443, ISO15693 is appreciated. Why More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
慨正橡扯
Job Description: In broad terms, you should have as many of the following as possible: Experience of owning a security risk management system for highly regulated products based on recognised frameworks such as aerospace, nuclear, automotive, rail or oil & gas; People management, mentoring and development skills; Practical experience … be desirable, but not essential , if you also had one or more of: Practical experience of ISO27001/27004/27005 or NIST Risk Management Framework (RMF); Knowledge of UK/NATO Information Assurance/Accreditation frameworks; Knowledge of EASA/FAA Airworthiness Certification frameworks; Awareness of current crypto … technologies, KeyManagement Systems & practical COMSEC; Chartered Engineer status with a recognised body; Awarded or looking to achieve an NCSC Certified Cyber Professional (CCP) recognition; Awareness of Information Security (INFOSEC), Communications Security (COMSEC), Transmission Security (TRANSEC), Product Safety and their inter-relationship; Experience of producing and delivering training More ❯
to lead the team and practice, which speaks volumes about the organisation and how they treat and develop their staff. Our client is a key player in the financial services space, and they are looking to hire two Cryptographic Engineers, so it’s an exciting time to join their … business. To be successful in this role, you must be able to demonstrate experience across secure keymanagement, HSMs, and cryptographic infrastructure. This is important as you will be stepping into a high-impact, global environment that places security and innovation at the forefront. The key skills … technical delivery role or infrastructure team where you are working on ITIL processes and can demonstrate experience across HSMs, PKI, and certificate/SSH key management. What’s on offer: £37,000--£45,000 + bonus and excellent benefits. Locations: Manchester with two days per week onsite. I know More ❯