3 of 3 Contract Key Management Jobs in the Midlands

Content & Detection Engineer

Hiring Organisation
Stackstudio Digital Ltd
Location
Leamington Spa, Warwickshire, West Midlands, United Kingdom
Employment Type
Contract, Work From Home
Contract Rate
From £450 to £500 per day
strategy of cryptographic products or features, ensuring they align with customer needs, industry standards, and regulatory requirements. Heres an overview of the roles key responsibilities and competencies: Your Responsibilities Product Vision and Roadmap Define the product vision and roadmap for cryptography-related products or features. Identify market needs … communicating updates, timelines, and risk factors. Your Profile Essential Skills/Knowledge/Experience Cryptography Knowledge: Understanding of encryption algorithms, digital signatures, PKI, HSMs, key management, etc. Experience: Minimum 38 years of experience required in cryptography. Product Management Skills: Experience in agile product management, defining roadmaps ...

Cyber Security Engineer

Hiring Organisation
Murray McIntosh & Associates Limited
Location
Derby, Derbyshire, United Kingdom
Employment Type
Contract
Contract Rate
GBP 35 - 50 Hourly
Murray McIntosh is seeking an Automotive Cyber Security Engineer to start work for a key client on a 12 month contract as detailed below: Responsibilities and experience: Sound understanding of cyber software measures (encryption key management, CAN message authentication, hardware implementations like HSM, etc) Requirements capture - Threat ...

Cyber Security Engineer

Hiring Organisation
Murray McIntosh & Associates Limited
Location
Derby, Derbyshire, East Midlands, United Kingdom
Employment Type
Contract
Contract Rate
£35 - £50 per hour + Outside IR35
Murray McIntosh is seeking an Automotive Cyber Security Engineer to start work for a key client on a 12 month contract as detailed below: Responsibilities and experience: Sound understanding of cyber software measures (encryption key management, CAN message authentication, hardware implementations like HSM, etc) Requirements capture - Threat ...