Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
and continuous improvement initiatives To be successful in the role you will have: Experience in cryptography and information security Hands-on experience with HSM configuration and support Familiarity with SSH key and certificate management Understanding of Unix and Windows environments This is a hybrid role with flexibility to work remotely, though occasional office presence may be required. Some of the More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
DXC Technology
and region. Set up NFS mount points, update network settings like bonding and MTU, apply kernel tuning parameters, configure user limits and mail settings. Check/Add users, Add SSH Keys, check disks and automate other post build tasks as required. Filesystem creation on free disk, creating VG and LV, adding entries to fstab Skills/Experience Required: Several years More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Networker Global Limited
The successful candidate will work on high-visibility project regarding SSH keys discovery, management and remediation across on-prem and the Cloud. We are looking for high quality candidates with significant experience and proven technical depth within SSH key management, cryptography, and the Identity and Access Management space, including: Design and implement secureSSH key management solutions for large scale … and practical approaches for transitioning to quantum-resistant encryption schemes.? Knowledge of FIPS 140-2 and FIPS 140-3 validated cryptographic modules and their integration with enterprise applications.? Role: SSH Key Technical Solutions Delivery Engineer Grade: GCB4/3 Location: Edinburgh, Sheffield Technical Solutions Delivery Engineers are to manage end-to-end solution design and are responsible for delivering design … subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Experience working in large-scale IT transformation programmes More ❯