business teams to implement strong cryptographic controls. Drive improvements in secure key lifecycle management, encryption, and authentication processes. Ensure the operational reliability and security of cryptographic services through monitoring, incidentresponse, and proactive risk mitigation. Essential Skills & Experience Proven experience in Cryptography, Secure Key Management, and Information Security. Hands-on expertise with HSM configuration, installation, and support. Experience … and documentation tools (e.g., MS Office). Highly Valued Skills Security or cryptographic certifications (e.g., CISSP, CISM, CompTIA Security+, CEH, or equivalent). Experience in operational security environments, including incidentresponse, risk management, and change control. Familiarity with SharePoint, Confluence, JIRA, and Unix/Windows environments. Knowledge of data protection regulations, compliance standards, and privacy frameworks. Strong technical More ❯
posture and you'll be working closely with the engineering and product teams to enable security across the company. Key Requirements: AWS - Cloud Security Vulnerability Management Tools IAM CPSM IncidentResponse/small amounts of ISO27001 This role is 5 days a week on-site , you’ll enjoy the perks of a sleek new office, including in-house More ❯
deadlines and manage multiple priorities effectively. Proficiency in MS Office applications. Some other highly valued skills may include: Relevant security or project management certifications. Background in operational environments, including incidentresponse and change management. Strong documentation skills for operational procedures. Familiarity with SharePoint, Confluence, and JIRA. Unix/Windows operating system knowledge. Expertise in privacy, compliance, and data … being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. Incident management. Change management. ITIL. Ensure the integrity and availability of cryptographic and key management services to business functions and applications. Accountabilities Cryptographic Hardware Management - including on site local configuration … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of Monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance. Ensure governance and clear record keeping More ❯
is reliable, scalable, and secure. Ensure the reliability, availability, and scalability of the systems, platforms, and technology through the application of software engineering techniques, automation, and best practices in incident response. To be successful in this role as an Infrastructure Engineer - Production Network Engineering, you should possess the following skillsets: Extensive experience as an individual contributor in the design More ❯