end of the year. Job Responsibilities Undertake all team activities in line with client wider strategy, Crypto strategy and departmental goals. Ensure the integrity and availability of cryptographic and keymanagement services to business functions and applications. Maintain accurate environment documentation, process and device categorisation. Provide ongoing assurance that risk and compliance requirements are being conducted to a … satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH KeyManagement, Certificate management, HSM configuration/installation/support Incident management, Change management, ITIL Ensure the integrity and availability of cryptographic and keymanagement … activities undertaken to ensure an accurate audit trail required for attestation/Audit support. Take a proactive approach to improving operations and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Support with resourcing, scheduling and distribution of work requests for HSM and Key management. Work closely with More ❯
end of the year. Job Responsibilities Undertake all team activities in line with client wider strategy, Crypto strategy and departmental goals. Ensure the integrity and availability of cryptographic and keymanagement services to business functions and applications. Maintain accurate environment documentation, process and device categorisation. Provide ongoing assurance that risk and compliance requirements are being conducted to a … satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH KeyManagement, Certificate management, HSM configuration/installation/support Incident management, Change management, ITIL Ensure the integrity and availability of cryptographic and keymanagement … activities undertaken to ensure an accurate audit trail required for attestation/Audit support. Take a proactive approach to improving operations and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Support with resourcing, scheduling and distribution of work requests for HSM and Key management. Work closely with More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Networker Global Limited
The successful candidate will work on high-visibility project regarding SSH keys discovery, management and remediation across on-prem and the Cloud. We are looking for high quality candidates with significant experience and proven technical depth within SSH keymanagement, cryptography, and the Identity and Access Management space, including: Design and implement secure SSH keymanagement solutions for large scale hybrid (on-prem, Cloud) environments. Expertise in cryptographic risk management, including assessing the potential impact of security weaknesses and determining mitigations.? Experience leading remediation efforts, including planning, automation, access reconfiguration and operational handover. Deep expertise in Identity and access management, Privileged access management and secure access solutions (machine-to-machine … and human-to-machine) Knowledge/understanding of hardware security modules (HSMs) for storing cryptographic keys securely, including integration with enterprise applications for key generation and usage.? Familiarity with NIST's Post-Quantum Cryptography (PQC) standardization efforts and practical approaches for transitioning to quantum-resistant encryption schemes.? Knowledge of FIPS 140-2 and FIPS 140-3 validated cryptographic modules More ❯
Umbrella Only Overall purpose of role: Undertake all team activities in line with client wider strategy, Crypto strategy and departmental goals. Ensure the integrity and availability of cryptographic and keymanagement services to business functions and applications. Maintain accurate environment documentation, process and device categorisation. Provide ongoing assurance that risk and compliance requirements are being conducted to a … satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management. HSM configuration/installation/support. Incident management. Change management. ITIL. Ensure the integrity and availability of cryptographic and keymanagement services to business functions … and applications. Key Accountabilities: Cryptographic Hardware Management - including on site local configuration activities. Support with resourcing, scheduling and distribution of work requests for HSM and Key management. Work closely with dates set in cooperation with Service Management to ensure smooth continuity of services and operations. Deliver to the required SLAs for all service. Gather, distribute, store More ❯
Role: SSH Key Technical Solutions Delivery Engineer Grade: GCB4/3 Location: Edinburgh or Sheffield Technical Solutions Delivery Engineers are to manage end-to-end solution design and are responsible for delivering design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high-level designs, Technical Solutions Delivery Engineers … will be required to publish new architecture patterns, key decisions, design deviations, and technical risks and issues where appropriate. Technical Solutions Delivery Engineer should be comfortable presenting and sharing solutions at design authorities and senior leadership & stakeholders. Additionally, the Technical Solutions Delivery Engineer will provide technical thought leadership and direction to their aligned projects and may stand in as … subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Experience working in large-scale More ❯
Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance … Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams in support of evaluation activities. Preparation of TEMPEST Control Plans, advising development teams on appropriate implementation techniques, and liaising with TEMPEST test facilities. Advising development teams on suitable platform lockdown and configurations, and supporting Penetration … test activities. Analysing penetration test results and preparation of remedial action plans. Prepare and implement through life support and maintenance for product security including vulnerability and patch management plans Lead security incident management teams during incident/crisis situations in conjunction with Head of Product Security for EW/FCA Review and maintain corporate product security policies. Deliver More ❯
to support and enhance their security architecture within a regulated environment. This role is offered on a contract basis with remote working arrangements. Job Responsibilities Support the integration and management of the Venafi platform across enterprise environments Work closely with security and infrastructure teams to deliver key certificate life cycle management solutions Provide technical expertise on certificate … compliance standards Collaborate with stakeholders to define and implement PKI strategies aligned with business needs Contribute to process improvement for certificate issuance, renewal, and revocation Ensure best practices in keymanagement and secure communications across platforms Support troubleshooting and resolution of issues related to digital certificates and encryption Deliver documentation and knowledge transfer to internal teams as needed More ❯
to join their Enterprise Technology team. This hands-on role will focus on uplifting Ansible usage, enhancing automation workflows, and improving infrastructure security and reliability across a Linux environment. Key Responsibilities: Refactor and optimise Ansible playbooks and roles for maintainability, security, and robustness Improve pre-checks, conditional logic, error handling, and reporting Integrate with secret management systems such … as CyberArk and Ansible Vault Enhance Ansible inventory management and automation scheduling Build reusable templates for ad-hoc tasks and remediation Develop automation for CIS compliance and reporting Contribute to Molecule testing environments for Ansible roles Collaborate with Linux, Infrastructure, and InfoSec teams Essential Skills & Experience: Expert-level understanding of Ansible Core and CLI Strong background in Linux systems … engineering and automation Proven track record of writing secure, idempotent, and testable playbooks Experience with secret management tools (e.g. CyberArk, Ansible Vault) Knowledge of Linux patch management, system hardening, and CIS compliance Strong problem-solving, documentation, and communication skills Desirable: Experience with Molecule testing for Ansible roles Familiarity with Ansible Automation Platform (AAP) Understanding of SSH keyMore ❯
seeking a Platform Engineer (DevOps) with strong experience in CI/CD pipelines and Windows infrastructure. This role focuses on scripting, automation, and deployment in a Microsoft tech environment. Key Requirements: Strong DevOps experience with Windows Servers Proficiency in PowerShell or Python scripting Hands-on experience with TeamCity, Jenkins, SonarQube Familiarity with Docker for containerization Experience with Microsoft-based … particularly Market Risk Knowledge of Chef, Ansible, SQL, and Hadoop ecosystems (HDFS, Hive, Impala) Understanding of observability tools (Elasticsearch, Filebeat, Kibana) Familiarity with network protocols and certificate/SSH keymanagementMore ❯
Telford, Shropshire, West Midlands, United Kingdom
InfinityQuest Ltd,
Role Overview: We are seeking a highly experienced Privileged Access Management (PAM) Consultant to lead the assessment and strategic planning of PAM solutions within a complex hosting infrastructure. This role focuses on evaluating existing access control mechanisms, identifying risks associated with over-privileged accounts, and recommending scalable PAM solutions tailored to diverse operating systems and on-premises environments. Key … design and enforcement. Deep understanding of on-premises infrastructure and hosting environments. Hands-on experience with Windows, Linux, Solaris, and AIX server platforms. Familiarity with Active Directory, LDAP, SSH keymanagement, and service account governance. Experience with PAM tools such as CyberArk, BeyondTrust, Delinea, etc Experience with identity federation, directory services, and authentication. Thank you very much More ❯