for a Technical Solution Design and Delivery Engineer to work with one of our financial services clients. This is to work on high profile project regarding SSH keys discovery, management and remediation across on-prem and the Cloud.We are looking for high quality candidates with significant experience and proven technical depth within SSH keymanagement, cryptography, and … the Identity and Access Management space, including: Design and implement secure SSH keymanagement solutions for large scale hybrid (on-prem, Cloud) environments. Expertise in cryptographic risk management, including assessing the potential impact of security weaknesses and determining mitigations. Experience leading remediation efforts, including planning, automation, access reconfiguration and operational handover. Deep expertise in Identity and … access management, Privileged access management and secure access solutions (machine-to-machine and human-to-machine) Knowledge/understanding of hardware security modules (HSMs) for storing cryptographic keys securely, including integration with enterprise applications for key generation and usage. Familiarity with NIST's Post-Quantum Cryptography (PQC) standardization efforts and practical approaches for transitioning to quantum-resistant More ❯
Acadian Asset Management LLC is a Boston-headquartered investment management firm with wholly owned affiliates located in Singapore, London, and Sydney. As of March 31, 2025, the firm managed approximately US$122 billion on behalf of major pension funds, endowments, foundations, governments and other investors based in the U.S. and abroad.Position Overview:The Senior Security Engineer, reporting to … consistently governing our AWS Platform-as-a-Service (PaaS) infrastructure. We are looking for candidates with deep experience and understanding of continuous delivery, container security, SAST/DAST, secrets management, Identity and Access Management (IAM) governance, privilege management, encryption and keymanagement, threat detection, logging, cloud infrastructure security and policy-as-code.What You'll Do … the Identity and Config team to ensure least privilege in Acadian's federated identity systems, utilizing tools such as Saviynt, Okta and Microsoft Entra ID. Assist with federation of key enterprise applications as necessary. Build Security infrastructure in AWS using Terraform and Cloudformation, leveraging best practices such as multi-region and multi-Availability zone architecture with autoscaling. Assist with More ❯
and implementation of cryptographic software libraries, secure protocols, and secure IP blocks optimised for PQC algorithms. Drive the design and integration of software for use cases such as secure keymanagement, secure communication protocols, and cryptographic agility. Ensure the software architecture supports scalable and high-performance designs suitable for embedded systems, mobile, cloud, and data centre applications. Project … Management & Process: Support the execution of software projects using Agile methodologies, overseeing sprint planning, daily stand-ups, sprint reviews, and retrospectives to ensure predictable delivery. Coordinate cross-functional teams, including cryptographers, hardware engineers, and external vendors to ensure seamless integration of software and cryptography solutions. Implement and enhance rigorous testing and verification methodologies, including a robust CI/CD … with external stakeholders, including open-source communities and enterprise customers, to manage the integration and deployment of PQC software IP. Communicate technical concepts and development progress to executives, product management, and customers in a clear and actionable way. Security & Compliance: Ensure all software products meet the latest security standards and regulations for post-quantum cryptography. Maintain and enforce robust More ❯
and diverse team that pushes boundaries and drives meaningful change in intelligence and communications. Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures … and diverse team that pushes boundaries and drives meaningful change in intelligence and communications. Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures … requirements forecasting and tracking future opportunities. You will feed in customer demands and competitive knowledge to ensure that Ultra's MAXAM suite remains at the forefront of secure communications. Key Responsibilities: Manage the production of international offers, including parallel bids, into international customers for the MAXAM product suite. Establish relationships with key customers internationally to qualify their demands More ❯
and diverse team that pushes boundaries and drives meaningful change in intelligence and communications. Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures … and diverse team that pushes boundaries and drives meaningful change in intelligence and communications. Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures … of 5-20 engineers, within the Cyber UK Business Unit, delivering multiple concurrent research, development and production programmes ranging from tens of £k to several £m. Responsible for/Key responsibilities Current: Implement software under the direction of the project's software lead and engineering software lead. SFIA Programming/software development: Level 2 Designs, codes, verifies, tests, documents More ❯
and diverse team that pushes boundaries and drives meaningful change in intelligence and communications. Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures … and diverse team that pushes boundaries and drives meaningful change in intelligence and communications. Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures … of 5-20 engineers, within the Cyber UK Business Unit, delivering multiple concurrent research, development and production programmes ranging from tens of £k to several £m. Responsible for/Key responsibilities Architect, specify requirements, design, implement and test embedded and application software in accordance with the project software development process to ensure high quality and timely software deliverables. Apply More ❯
help our customers push the limits of their processes and products to meet the demanding requirements they face, from higher process temperatures to higher product performance to increasing miniaturisation. Key Figures: Revenue £1,114.7m (2023), 8,500 employees, manufacturing in 20+ countries, and a global customer portfolio. A UK PLC with head office located in Windsor, Berkshire UK. Listed … and develop security reference architectures for new solutions. This includes defining security controls (document security requirements and applicable design options) to apply in delivering business value while reducing risk. Key Responsibilities OT Security Architecture & Design Define and design OT security architecture patterns including network segregation and segmentation for industrial control systems (ICS), SCADA, and IIoT equipment Develop and enforce … Azure, ensuring alignment with best practices such as Microsoft CAF and Zero Trust principles. Work with cloud engineering teams to enforce security configurations for Azure services, including Identity & Access Management (IAM), Secure Networking, KeyManagement (Azure Key Vault), and Data Protection (DLP, encryption). Design logging, monitoring, and incident response strategies for Azure workloads using Microsoft More ❯
Role: SSH Key Technical Solutions Delivery Engineer Grade: GCB4/3 Location: Edinburgh or Sheffield Technical Solutions Delivery Engineers are to manage end-to-end solution design and are responsible for delivering design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high-level designs, Technical Solutions Delivery Engineers … will be required to publish new architecture patterns, key decisions, design deviations, and technical risks and issues where appropriate. Technical Solutions Delivery Engineer should be comfortable presenting and sharing solutions at design authorities and senior leadership & stakeholders. Additionally, the Technical Solutions Delivery Engineer will provide technical thought leadership and direction to their aligned projects and may stand in as … subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Experience working in large-scale More ❯
Role: SSH Key Technical Solutions Delivery Engineer Grade: GCB4/3 Location: Edinburgh or Sheffield Technical Solutions Delivery Engineers are to manage end-to-end solution design and are responsible for delivering design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high-level designs, Technical Solutions Delivery Engineers … will be required to publish new architecture patterns, key decisions, design deviations, and technical risks and issues where appropriate. Technical Solutions Delivery Engineer should be comfortable presenting and sharing solutions at design authorities and senior leadership & stakeholders. Additionally, the Technical Solutions Delivery Engineer will provide technical thought leadership and direction to their aligned projects and may stand in as … subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Experience working in large-scale More ❯
Role: SSH Key Technical Solutions Delivery Engineer Grade: GCB4/3 Location: Edinburgh or Sheffield Technical Solutions Delivery Engineers are to manage end-to-end solution design and are responsible for delivering design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high-level designs, Technical Solutions Delivery Engineers … will be required to publish new architecture patterns, key decisions, design deviations, and technical risks and issues where appropriate. Technical Solutions Delivery Engineer should be comfortable presenting and sharing solutions at design authorities and senior leadership & stakeholders. Additionally, the Technical Solutions Delivery Engineer will provide technical thought leadership and direction to their aligned projects and may stand in as … subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Experience working in large-scale More ❯
Role: SSH Key Technical Solutions Delivery Engineer Grade: GCB4/3 Location: Edinburgh or Sheffield Technical Solutions Delivery Engineers are to manage end-to-end solution design and are responsible for delivering design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high-level designs, Technical Solutions Delivery Engineers … will be required to publish new architecture patterns, key decisions, design deviations, and technical risks and issues where appropriate. Technical Solutions Delivery Engineer should be comfortable presenting and sharing solutions at design authorities and senior leadership & stakeholders. Additionally, the Technical Solutions Delivery Engineer will provide technical thought leadership and direction to their aligned projects and may stand in as … subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Experience working in large-scale More ❯
and diverse team that pushes boundaries and drives meaningful change in intelligence and communications. Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures … member, to escalate more complex challenges and opportunities. This role is expected to act independently with minimal guidance, and may mentor project managers/early careers. Responsible for/Key responsibilities Responsible for assuring the Systems Engineering (in-process verification and validation) and delivery of conclusive evidence via System Integration, Verification and Validation (IV&V) processes and activities. Ensure … development and in-service test events. Responsible for all safety and security aspects relating to IV&V events and facilities used by the project. Actively participates, and is a key stakeholder, at engineering design reviews and project gates/reviews, owning the preparation, delivery and resulting actions of TRR. To support the Qualification activities, to include in house and More ❯
ensure system resilience through structured evaluations. You will also engage in proposal development, solution scoping, and roadmap planning for security-centric projects in line with mission and operational requirements. Key Responsibilities Product Security Evaluation Perform architecture and implementation reviews of embedded, cloud-based, or mission-critical systems. Analyze and validate secure boot flows, cryptographic controls, and firmware integrity mechanisms. … aligned frameworks (e.g., NIST SP 800-53, NIST RMF, Common Criteria, NATO NIAG, ISO 15408). Evaluate usage of post-quantum and hybrid cryptographic algorithms in secure communication and keymanagement schemes. Conduct security testing of control systems, secure enclaves, radios, mission payload platforms, or ICS/SCADA endpoints. Defense Industry Compliance & Assurance Map system security evaluations to … mission objectives and operational constraints into viable secure-by-design implementation pathways. Conduct technical workshops and demos to engage with defense primes, integrators, and government clients. Project and Stakeholder Management Lead technical execution of security engagements with clear milestones, deliverables, and resourcing plans. Maintain ongoing communication with client technical leads and internal engineering teams. Ensure deliverables meet both compliance More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
call one week every four weeks About the Role Are you passionate about cybersecurity and cryptography? Our client in the Financial Services industry is looking for a Cryptography HSM & KeyManagement Specialist to join their global team. In this role, you'll help protect the their most sensitive data by managing encryption systems and digital keys that keep … our information secure.You'll work with cutting-edge cryptographic hardware, collaborate with teams across the business, and play a key role in maintaining the integrity and availability of our security infrastructure. What You'll Be Doing * Managing Hardware Security Modules (HSMs)and cryptographic infrastructure* Creating, storing, and retiring encryption keyssecurely across multiple platforms* Supporting incident and change managementprocesses* Collaborating … Contributing to project deliveryand continuous improvement initiatives What We're Looking For * Experience in cryptography and information security* Hands-on knowledge of HSM configuration and support* Familiarity with SSH key and certificate management* Understanding of Unix/Windows environments* Strong attention to detail and ability to work under pressure* Excellent communication and stakeholder management skills Nice to More ❯
Macclesfield, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
call one week every four weeks About the Role Are you passionate about cybersecurity and cryptography? Our client in the Financial Services industry is looking for a Cryptography HSM & KeyManagement Specialist to join their global team. In this role, you'll help protect the their most sensitive data by managing encryption systems and digital keys that keep … our information secure.You'll work with cutting-edge cryptographic hardware, collaborate with teams across the business, and play a key role in maintaining the integrity and availability of our security infrastructure. What You'll Be Doing * Managing Hardware Security Modules (HSMs)and cryptographic infrastructure* Creating, storing, and retiring encryption keyssecurely across multiple platforms* Supporting incident and change managementprocesses* Collaborating … Contributing to project deliveryand continuous improvement initiatives What We're Looking For * Experience in cryptography and information security* Hands-on knowledge of HSM configuration and support* Familiarity with SSH key and certificate management* Understanding of Unix/Windows environments* Strong attention to detail and ability to work under pressure* Excellent communication and stakeholder management skills Nice to More ❯
Warrington, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
AM-5 PM) + on-call one week every four weeks About the Role Are you passionate about cybersecurity and cryptography? Our client is looking for a Cryptography HSM & KeyManagement Specialist to join their global team. In this role, you'll help protect the their most sensitive data by managing encryption systems and digital keys that keep … our information secure.You'll work with cutting-edge cryptographic hardware, collaborate with teams across the business, and play a key role in maintaining the integrity and availability of our security infrastructure. What You'll Be Doing Managing Hardware Security Modules (HSMs)and cryptographic infrastructure Creating, storing, and retiring encryption keyssecurely across multiple platforms Supporting incident and change managementprocesses Collaborating … project deliveryand continuous improvement initiatives What We're Looking For Experience in cryptography and information security Ideally some hands-on experience of HSM configuration and support Familiarity with SSH key and certificate management Understanding of Unix/Windows environments Strong attention to detail and ability to work under pressure Excellent communication and stakeholder management skills Nice to More ❯
work as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … that they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerability management, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes to simplify … Service (PaaS), and Infrastructure as a Service (IaaS) so that the Department and its partners can embrace the government's Cloud First policy. Create and sustain modern deployment and management standards, practices, and techniques for our cloud resources. Lead, support, coach, and mentor less experienced Infrastructure Engineers in managing, supporting and maintaining the Department's infrastructure. Advocate user-centric More ❯
work as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … that they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerability management, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes to simplify … Service (PaaS), and Infrastructure as a Service (IaaS) so that the Department and its partners can embrace the government's Cloud First policy. Create and sustain modern deployment and management standards, practices, and techniques for our cloud resources. Lead, support, coach, and mentor less experienced Infrastructure Engineers in managing, supporting and maintaining the Department's infrastructure. Advocate user-centric More ❯
work as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … that they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerability management, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes to simplify … Service (PaaS), and Infrastructure as a Service (IaaS) so that the Department and its partners can embrace the government's Cloud First policy. Create and sustain modern deployment and management standards, practices, and techniques for our cloud resources. Lead, support, coach, and mentor less experienced Infrastructure Engineers in managing, supporting and maintaining the Department's infrastructure. Advocate user-centric More ❯
work as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … that they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerability management, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes to simplify … Service (PaaS), and Infrastructure as a Service (IaaS) so that the Department and its partners can embrace the government's Cloud First policy. Create and sustain modern deployment and management standards, practices, and techniques for our cloud resources. Lead, support, coach, and mentor less experienced Infrastructure Engineers in managing, supporting and maintaining the Department's infrastructure. Advocate user-centric More ❯
platforms, you will provide technical leadership and strategic direction in building scalable, secure, and resilient cloud-native systems based on AWS, Kubernetes, Kafka, microservices, Java, and event-driven design. Key Responsibilities Cloud Architecture Design: Lead the design of cloud-based systems and solutions, utilising AWS and modern architectural patterns such as microservices, event-driven architectures, and serverless computing to … the development of CI/CD pipelines, infrastructure as code (IaC), and automation to enable fast and reliable delivery of cloud services. Work closely with DevOps, engineering teams, product management, and stakeholders to ensure that architectural strategies align with both technical and business objectives. Performance & Cost Optimisation: Drive performance tuning, cost optimisation, and cloud resource management strategies to … maximise efficiency and minimise cloud spend. Risk Management: Identify and mitigate technical risks in cloud-based systems and infrastructure. Documentation & Best Practices: Develop and maintain architectural standards, design patterns, and documentation, ensuring a shared understanding of technical solutions. Skills, Knowledge and Expertise Degree in Computer Science, Software Engineering, Information Technology, or a related field or professional equivalent maybe considered. More ❯
and working on site at one of our Leonardo offices to ensure close collaboration with the wider team and with our customers. Talk to us to find out more. Key Responsibility Areas Leading a team or operating independently to meet all aspects of the cyber and information security delivery across an engineering lifecycle. Interpreting customer requirements into actionable security … management plans, statements of work, and activities to be delivered across the lifecycle. Become the lead security subject matter expert for the product being delivered. Oversight and delivery of associated statements of work and artefacts to time, cost and quality constraints. Identification, management and escalation of technical and delivery risks and issues. Management of the customer relationships … for the cyber and information security workstream, both internal and external. Line management and mentoring of consultants within your team as required. Skills, Qualifications, Knowledge & Experience Required In addition to a passion for cyber and information security, you really must have Skills Ability to work independently without supervision and be able make sound decisions based on information available. Excellent More ❯
victories together. About the Role As a Security Software Engineer, your role involves architecting, designing, and implementing end-to-end security controls to impact the global user base. A key focus is on developing automated, scalable security solutions to enhance efficiency and protect Roku. This position requires expertise in creating and extending security automation tools, including detection and process … designing, and implementing End-to-End Security solutions and controls. Your work will directly impact our global user base Focusing on Automation. Developing automated, scalable security solutions. Efficiency is key Administering HashiCorp Vault for secrets management Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure Applying cryptography and security design … principles to cloud environments Documenting playbooks, procedures, and architecture Providing subject matter expertise to software development groups to assist in cryptography and keymanagement/authentication API. We are excited if you have Passion for cybersecurity with an effective and passionate drive to protect digital assets. Experience implementing custom, cloud-agnostic IAM at scale Navigate the complexities of More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
cybersecurity capabilities and looking for a Cryptography Specialist to join their team. This is a fantastic opportunity to work at the forefront of digital security, managing encryption systems and keymanagement processes that protect some of the organisation's most sensitive data. As part of this role, you will be responsible for some of the following areas: Manage … and maintain Hardware Security Modules (HSMs) and cryptographic infrastructure Create, store, rotate, and retire encryption keys securely across multiple platforms Support incident and change management processes related to cryptographic systems Collaborate with application, infrastructure, and support teams to ensure seamless integration Contribute to project delivery and continuous improvement initiatives To be successful in the role you will have: Experience … in cryptography and information security Hands-on experience with HSM configuration and support Familiarity with SSH key and certificate management Understanding of Unix and Windows environments This is a hybrid role with flexibility to work remotely, though occasional office presence may be required. Some of the benefits included with the role are listed below: Starting salary of More ❯
in fast-paced, product-focused environments. You will play a critical role in shaping secure architecture, implementing scalable protection mechanisms, and driving a security-first culture across the company. Key Responsibilities Security Architecture & Design Design and implement secure infrastructure across cloud, web, and distributed application environments. Provide architectural guidance for cryptographic keymanagement, signing workflows, and secure … APIs. Evaluate and enhance security of components related to digital asset management, identity systems, or transaction flows. Risk Management & Threat Modelling Conduct comprehensive threat modelling and risk assessments, especially around distributed or high-value transaction systems. Define controls for securing sensitive operations such as wallet integrations, off-chain/on-chain data flows, and internal tooling. Develop and … and optimise detection mechanisms and playbooks for novel attack vectors, including abuse prevention and fraud detection. Governance, Compliance & Best Practices Help define internal standards for security development practices, secrets management, and infrastructure hardening. Maintain compliance with relevant frameworks (e.g., SOC 2, ISO 27001, GDPR), and support any industry-specific due diligence. Cross-Functional Collaboration Partner with engineering, product, and More ❯