Remote Key Management Jobs

1 to 25 of 31 Remote Key Management Jobs

Cryptographic Key Management Operations Engineer, Vice President, Hybrid (Hiring Immediately)

London, UK
Hybrid / WFH Options
State Street
Cryptographic Key Management Operations Engineer, Vice President, Hybrid Join to apply for the Cryptographic Key Management Operations Engineer, Vice President, Hybrid role at State Street Cryptographic Key Management Operations Engineer, Vice President, Hybrid 4 days ago Be among the first 25 applicants Join to … apply for the Cryptographic Key Management Operations Engineer, Vice President, Hybrid role at State Street Who We Are Looking For State Street is seeking a Cryptographic Key Operations Engineer to support the end-to-end lifecycle management of cryptographic keys across cloud, on-premises, infrastructure, and … environments. This role ensures the secure generation, distribution, rotation, revocation, and retirement of encryption keys while maintaining compliance with regulatory and security policies. The Key Operations Engineer will drive operational excellence and automation to enhance key lifecycle processes. This role requires close collaboration with security, IT, cloud, infrastructure More ❯
Employment Type: Full-time
Posted:

Sr Security Engineer

Trenton, New Jersey, United States
Hybrid / WFH Options
Technology Services LLC
to the Global Security Office (GSO). Roles and Responsibilities Act as initial point of contact and subject matter expert for topics related to Key management and encryption Responsible for key management life cycle, documentation and participate in internal audit. Support of all hardware related to … HSM/Appliances to support key management Participate in deep architectural discussions with internal Business units to engineer solution when requiring HSM/Encryption Assist business leaders in understanding and implementing security solution related to key management/encryption following industry standards Provide input to security … audits Experience managing the implementation or enhancement of security controls across a diverse business Experience with Implementation of HSM solution with Thales, Safenet, Azure key vaults and AWS will be a plus Experience with PCI, Sarbanes Oxley (SOX), NIST cybersecurity framework, ISO 27000 security standards, and data protection regulations More ❯
Employment Type: Any
Salary: USD Annual
Posted:

Lead DevOps Engineer

London, United Kingdom
Hybrid / WFH Options
QiH Group
development, security, and operations. This is an individual contributor role, where you will spearhead initiatives and guide the team on best practices without direct management responsibilities. Key Responsibilities: Design, implement, and maintain secure cloud infrastructure in GCP. Develop and manage infrastructure as code (Terraform, Kubernetes) to ensure repeatable … and operational tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as key management, vulnerability scanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the … such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerability scanning, encryption, authentication, and secrets management (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when working More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

M&A Cybersecurity and Compliance Analyst

City, Aberdeen, United Kingdom
Hybrid / WFH Options
Baker Hughes Gruppe
to business strategies and requirements. Assisting in the maintenance of M&A playbooks based on company security standards, procedures, and best practices including account management, tenant management, information/IP protection management, proxy server management, security ingress/egress management, domain trusts posture, SSL/… IPsec, security incident and event management (SIEM), data protection (DLP, encryption), and password/key management, vulnerability/threat assessment. Collaborating with security team members to develop all M&A security requirements for all hardware and software computing platforms, environments and solutions including developing and or modifying … accredited university or college. Have experience in ITGC/GITC audits including interfaces, control reports configurable controls. Possess deep working knowledge of IT service management (e.g., ITIL-related disciplines). Have a solid working knowledge of OT security and how it aligns and differs from Enterprise IT Security. Demonstrate More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Junior Integrator Analyst (graduates)

Aldershot, Hampshire, United Kingdom
Hybrid / WFH Options
DXC Technology Inc
Job Description: Our client offers multiple building blocks (Access Management, User Management, OAuth, Certificate Management, Datapower, Key Management, PAMaaS and LogaaS) to its customers. The Analyst will through identifying customer needs and requirements, translate them into technical requirements and integration sheet. The successful candidate will … play a key role ensuring the seamless integration of technology solutions. The analyst will join a team that values agile principles: sprint-based approach, onboarding meeting, intake meeting, file building, T&I build and testing, scheduling meeting, PRD build and testing. Location: Fully remote within Belgium is feasible, with … new applications, mapping functional and technical expectations. SPOC to relevant ACM/DEVOPS teams re onboarding of applications/projects. SPOC to support user management re incidents, customer queries from onboarding procedures. Working out the technical requirements of the user and access management projects based on direction from More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Enterprise Security Architect (Hiring Immediately)

Leeds, UK
Hybrid / WFH Options
Cyber UK
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, Secrets Management, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from … responsible for defining and communicating Lloyds Banking Group’s security strategy and providing a range of critical Enterprise Security Services which not only operate key controls that keep the Group safe but also enable the digital transformation agenda of the wider organisation. The day to day Defining the target More ❯
Employment Type: Full-time
Posted:

Enterprise Security Architect (Hiring Immediately)

Edinburgh, UK
Hybrid / WFH Options
Cyber UK
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, Secrets Management, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from … responsible for defining and communicating Lloyds Banking Group’s security strategy and providing a range of critical Enterprise Security Services which not only operate key controls that keep the Group safe but also enable the digital transformation agenda of the wider organisation. The day to day Defining the target More ❯
Employment Type: Full-time
Posted:

Enterprise Security Architect (Hiring Immediately)

London, UK
Hybrid / WFH Options
Cyber UK
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, Secrets Management, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from … responsible for defining and communicating Lloyds Banking Group’s security strategy and providing a range of critical Enterprise Security Services which not only operate key controls that keep the Group safe but also enable the digital transformation agenda of the wider organisation. The day to day Defining the target More ❯
Employment Type: Full-time
Posted:

Enterprise Security Architect (Hiring Immediately)

Manchester, UK
Hybrid / WFH Options
Cyber UK
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, Secrets Management, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from … responsible for defining and communicating Lloyds Banking Group’s security strategy and providing a range of critical Enterprise Security Services which not only operate key controls that keep the Group safe but also enable the digital transformation agenda of the wider organisation. The day to day Defining the target More ❯
Employment Type: Full-time
Posted:

Enterprise Security Architect (Hiring Immediately)

Avonmouth, Bristol, UK
Hybrid / WFH Options
Cyber UK
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, Secrets Management, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from … responsible for defining and communicating Lloyds Banking Group’s security strategy and providing a range of critical Enterprise Security Services which not only operate key controls that keep the Group safe but also enable the digital transformation agenda of the wider organisation. The day to day Defining the target More ❯
Employment Type: Full-time
Posted:

Senior Systems Engineer - Infrastructure Operations (Dutch speaking)

Vlissingen, Zeeland, Netherlands
Hybrid / WFH Options
Damen Naval
met, and the business operates securely and efficiently. Since most colleagues and internal stakeholders are Dutch, strong command of the Dutch language is required. KEY ACCOUNTABILITIES In this role, your responsibilities will include: Guide and mentor the Infrastructure team to deliver quality IT products and services on time, focusing … a related field. Equivalent professional experience may also be considered. Proficiency in IT infrastructure and systems, with a comprehensive understanding of security protocols, network management, and automation processes. Strong leadership and team-supporting abilities, with experience in professionalizing and guiding teams. Experience with IT Architecture methodologies (TOGAF and Archimate … and/or Nutanix and/or Oracle Linux Virtualization Manager Microsoft Active Directory environments both on-premises and online (Azure AD) Identity Access Management, Multi-Factor Authentication and federation e.g. ADFS PKI setup and Certificate Management Key Management Systems (KMS) Hardware Security Modules (HSM) Observability More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

AWS CloudHSM SME - PKI Implementation (Contract)

Luton, England, United Kingdom
Hybrid / WFH Options
Queen Square Recruitment Ltd
Inside IR35] Sector: Secure Cloud & Infrastructure Projects We are seeking an experienced AWS CloudHSM Subject Matter Expert (SME) to support the design, deployment, and management of a secure Microsoft Active Directory Certificate Services (ADCS) Public Key Infrastructure (PKI) environment. This role is focused on implementing a robust AWS … HSM-backed cryptographic architecture aligned with strict compliance and security standards. The successful candidate will have deep expertise in AWS CloudHSM, cryptographic key management, and PKI implementations, and will work across multiple teams to ensure successful integration and operational stability in a secure cloud environment. Key Responsibilities … PKI Implementation: * Architect, deploy, and configure AWS CloudHSM to support Microsoft ADCS PKI environments. * Integrate HSM with Certificate Authorities (CAs), OCSP responders, and CRL management components. * Design secure key lifecycle management strategies – from generation to decommissioning. * Enable secure certificate issuance, revocation, and validation workflows. * Ensure high availability More ❯
Posted:

Director, Security Assurance and Remediation (Hiring Immediately)

London, UK
Hybrid / WFH Options
CLS-Group
reporting at relevant levels confirming direction of travel of risk improvement or decline. Collaborate with security and IT teams on monitoring vulnerability and patch management progress against standards and controls guidelines, with oversight of remediation and timing to reduce risk to an acceptable level. Direct, coach and rollout training … multiple internal and external audits and regulatory requirements. Stay updated on advancements in security technologies, policies, and regulatory changes, recommending and implementing necessary improvements. Key member of the function who regularly reviews Security Policies, Standards and Controls and optimize position on areas associated to regulations and company strategy. Integrate … to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies, aligning to a 3 lines of defence model and enforcing alignment of risk taxonomy to organizational cybersecurity risk management processes, procedures and More ❯
Employment Type: Full-time
Posted:

Security Architect

England, United Kingdom
Hybrid / WFH Options
iO Associates
or DV Clearance is required for eligibility. In this role, you will be at the forefront of designing, implementing, and supporting cutting-edge Public Key Infrastructure (PKI) solutions for high-profile clients. You will be involved in the entire solution lifecycle-from pre-sales architecture to implementation and ongoing … internal improvements-driving strategic initiatives while ensuring technical excellence and a strong focus on client satisfaction. Key Responsibilities: Pre-Sales & Client Engagement: Lead technical discussions, develop proposals, and educate stakeholders on PKI. Solution Architecture & Delivery: Design and implement PKI solutions, oversee CA/RA setups, and ensure compliance. Innovation … hiring through your network. Requirements: Expertise in PKI technologies and standards (X.509, SSL/TLS, S/MIME). Strong understanding of cryptographic algorithms, key management, and code signing. Hands-on experience with tools such as Keyfactor Command, Venafi TLS Protect, AppViewX CERT+, EJBCA, Microsoft AD CS, and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Engineer

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Sparta Global Limited
Incident Response & Forensic Analysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance - Proficiency in identifying potential security risks, conducting risk assessments, and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing … implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. More ❯
Employment Type: Permanent
Salary: £35,000
Posted:

Zero Trust System Engineer Level II with Security Clearance

Annapolis Junction, Maryland, United States
Hybrid / WFH Options
GTSC Talent Solutions
customer in the Annapolis Junction, MD area. The ideal candidate will bring a wealth of experience and knowledge to ensure the design, implementation, and management of secure, robust, and compliant IT systems. This position requires expertise in Zero Trust principles, security monitoring, vulnerability analysis, and enterprise security architecture. Mission … eligible for TS/SCI with further polygraph testing. Bachelor's degree in system engineering, Computer Science, Computer Engineering, Information Systems, Engineering Science, Engineering Management, or related discipline from an accredited institution. Design, build, and maintain secure IT systems following Zero Trust principles. Implement, monitor, and manage security solutions … Server, and System Configuration Center Manager (SCCM). Collaborate on security operations and network monitoring efforts, identifying and mitigating risks. Implement encryption protocols and key management to safeguard data. Support enterprise security architecture and provide recommendations for improvements. Stay up to date with the latest trends in cybersecurity More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Strategic Client Director (SCD) UK Defence

United Kingdom
Hybrid / WFH Options
Thales Group
Location: Remote UK, United Kingdom Thales people architect identity management and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billions of digital interactions they have with people. Our technologies and services help banks exchange funds, people cross … and Army, Strategic Command and Defence Digital) with wider areas such as intelligence agencies in due course. The SCD will build and develop new key business relationships, managing all aspects of the sales process with the end customer, focusing on new business opportunities and developing existing business contacts. This … individual will report into the Sales Director, UK Government and Defence, contributing to building a wider government/public sector business in the UK. Key Areas of Responsibility Day-to-day management of a small number of Strategic/Target Accounts in line with the wider UK Government More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Mid-level AWS Full Stack Programmer with Security Clearance

Reston, Virginia, United States
Hybrid / WFH Options
CGI
that support the enterprise goals, implement efficient end to end processes and leverage use of existing IT assets. Align strategic goals and objectives with key business and IT initiatives. Work to develop an integrated view of the enterprise using a repeatable approach, cohesive framework, industry standard techniques and best … deploy and support deployment of tools in AWS. Strong experience in AWS EC2, ESC, S3, Cloudformation Solid understanding of Cloud Security Tools like IAM, Key Management Services, Cloudwatch, RDS, DDoS etc Worked on NOSQL/DynamoDB, Oracle, RDS Experience with Python - good to have. Experiences in full life … cycle application/system development Experience developing in distributed application environments (Database, Transaction Management) Experience writing conceptual and detailed design documents, and developing large scale enterprise applications following an Agile execution model Experience with Application integrations (SOAP/REST Web Services, ESB, JMS, File/Data transfers, etc.) Familiar More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

AWS Senior Solutions Architect - Pre-sales - REMOTE

Fairfax, Virginia, United States
Hybrid / WFH Options
Perficient
utilizing programming languages like Java, Node, Python, etc. - required. AWS native tools Familiarity with AWS products including compute, storage, database, analytics, networking, developer tools, management tools, security, and enterprise applications. Tools: EC2, EKS, ECS, Fargate RDS, DynamoDB, Redshift Amazon EMR Kafka AWS Directory Service AWS IAM Identity Center AWS … Certificate and Key Management AWS Networking Advanced technical skills and experience designing and implementing AWS and hybrid IT network architectures at scale. As a networking specialist, candidate will design a secure, scalable, and highly available network infrastructure on AWS while addressing requirements like network security, hybrid IT connectivity More ❯
Employment Type: Permanent
Salary: USD 97 Hourly
Posted:

Embedded Security Manager with Security Clearance

El Segundo, California, United States
Hybrid / WFH Options
Aerospace Corporation
Force's Space Systems Command (SSC), the Space Development Agency, the National Reconnaissance Office (NRO), and other civil customers ( e.g. NASA). While previous management experience is helpful, this role also provides an opportunity for technical contributors to explore leadership experience . This role is approximately 75% individual contributor … model that combines 4 regular onsite workdays and remote flexibility as the business needs allow. What You'll Be Doing This is a dual management and engineering role: Lead project teams and directly contribute to technical design and research efforts while ensuring your team's success. Work with Department … proposals. Deep understanding in several of the following technical disciplines: embedded systems, PCB development, FPGA design, software development, or embedded security. Previous experience with key embedded security tenants such as Root of Trust, Secure Boot, encryption and key management, and common attack vectors. Demonstrated expertise in building More ❯
Employment Type: Permanent
Salary: USD 221,400 Annual
Posted:

Technical Manager - Product Security

Crewe, Cheshire, United Kingdom
Hybrid / WFH Options
Bentley Motors
security standards and legislations (all regions, e.g., GB44495, ISO/SAE21434, UNECE WP29/R155, GDPR, Data security). Proven experience in technical project management, particularly in planning and rolling out security functions. Technical knowledge of product security countermeasures, including Intrusion Detection Systems (IDS), Secure Onboard Communication (SOK), Vehicle … Key Management Systems (VKMS), TLS, etc. Excellent communication and collaboration skills. Strong problem-solving and analytical skills. Software/Programming knowledge (C, C++). Encryption algorithms knowledge. Ability to influence colleagues within your area of responsibility. Engineering degree or equivalent is essential. What Bentley Offers Hybrid working options More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Chief Product Security Engineer

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
leonardo company
line capability wherever and whenever required. We are looking for an experienced product security practitioner with expertise in developing and maintaining robust product security management systems for defence and government customers. The Chief Product Security Engineer will take responsibility for ensuring that all security aspects of the design, development … teams, including in terms of: Deriving security requirements Undertaking security risk assessments for products Preparing security risk mitigation plans Review and approval of Security Management plans Security policy maintenance and monitoring Production of LoB security metrics Management of attendance at external security forums Attendance and support to the … Security Special Interest Group Lead security incident management teams during incident/crisis situations in conjunction with the Lead Product Security Engineer(s) The Chief Product Security Engineer has delegated authority within the independent Design Integrity function, responsible for the following elements: Security process maintenance and monitoring Security competence More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Database Engineer / Oracle DBA with Security Clearance

Annapolis Junction, Maryland, United States
Hybrid / WFH Options
Wood Consulting Services, Inc
or experience. Overview: Join our dynamic Agile team as a Senior Database Engineer, specializing as an Oracle Database Administrator, to support a critical cryptographic key management program that impacts national security. You'll work in a fast-paced environment, leveraging DEVOPS best practices and cutting-edge tools.The selected More ❯
Employment Type: Permanent
Salary: USD 200,000 Annual
Posted:

Database Engineer with Security Clearance

Annapolis Junction, Maryland, United States
Hybrid / WFH Options
WOOD Consulting Services, Inc
or experience. Overview: Join our dynamic Agile team as a Senior Database Engineer, specializing as an Oracle Database Administrator, to support a critical cryptographic key management program that impacts national security. You'll work in a fast-paced environment, leveraging DEVOPS best practices and cutting-edge tools. The More ❯
Employment Type: Permanent
Salary: USD 200,000 Annual
Posted:

Specialized Embedded Engineer with Security Clearance

Chantilly, Virginia, United States
Hybrid / WFH Options
Aerospace Corporation
if you have one or more of these: Experience implementing artificial intelligence/machine learning algorithms onto edge based compute platforms Previous experience with key embedded security tenants such as Root of Trust, Secure Boot, encryption and key management, and common attack vectors Previous experience designing electronics More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Key Management
Work from Home
Median
£60,000
75th Percentile
£67,500
90th Percentile
£114,200