with regulatory standards. The ideal candidate is a strategic thinker with deep expertise in security assurance, audit, and cloud security, and a passion for advancing Web3 and blockchain technologies. Key Responsibilities Design, conduct, and implement testing of security controls for identity management, keymanagement, and infrastructure (network and cloud) configurations. Support client assurance by preparing responses … platform. Requirements Minimum of 8 years of experience in security assurance, audit, compliance, or cloud security engineering. Proven expertise in testing and validating security controls across Identity and Access Management (IAM), keymanagement, and network/cloud environments. Strong understanding of IAM principles and their application in secure systems. In-depth knowledge of cryptographic keymanagement, Hardware Security Modules (HSMs), and KeyManagement Systems (KMS). Solid understanding of cloud and network security architecture and configurations. Demonstrated experience supporting external audits and assessments, such as SOC 1, SOC 2, ISO 27001, or PCI DSS. Hands-on experience with major cloud platforms (AWS, GCP, Azure) and infrastructure-as-code practices. Proficiency in preparing client More ❯
with regulatory standards. The ideal candidate is a strategic thinker with deep expertise in security assurance, audit, and cloud security, and a passion for advancing Web3 and blockchain technologies. Key Responsibilities Design, conduct, and implement testing of security controls for identity management, keymanagement, and infrastructure (network and cloud) configurations. Support client assurance by preparing responses … platform. Requirements Minimum of 8 years of experience in security assurance, audit, compliance, or cloud security engineering. Proven expertise in testing and validating security controls across Identity and Access Management (IAM), keymanagement, and network/cloud environments. Strong understanding of IAM principles and their application in secure systems. In-depth knowledge of cryptographic keymanagement, Hardware Security Modules (HSMs), and KeyManagement Systems (KMS). Solid understanding of cloud and network security architecture and configurations. Demonstrated experience supporting external audits and assessments, such as SOC 1, SOC 2, ISO 27001, or PCI DSS. Hands-on experience with major cloud platforms (AWS, GCP, Azure) and infrastructure-as-code practices. Proficiency in preparing client More ❯
Cryptography Engineer Manchester Area | 2-3x a week Role Description Join a global Cyber Security team as a Cryptography Specialist , ensuring the integrity and availability of cryptographic and keymanagement services across global systems. In this role you will help to develop the function further as one of the key technical components of this dedicated team. … Standard UK hours (9 AM – 5 PM) with one week on-call every four weeks. What You’ll Do Manage, configure, and support Hardware Security Modules (HSMs) and keymanagement infrastructure. Oversee key generation, distribution, and governance across multiple platforms. Maintain risk controls, compliance records, and security documentation to audit standards. Support incident, change, and problem management, driving service improvements. Essential Experience Proven expertise in cryptography, HSMs, and key/certificate management. ITIL Foundation certification and experience in operational security environments. Strong stakeholder management and communication skills. Bachelor’s degree in Computer Science or related discipline. Desirable: Security or project management certifications (e.g. CISSP, CISM, PMP). Familiarity with Unix/Windows, data More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Plexus Resource Solutions Ltd
DevOps Engineer Web3/Applied Cryptography/KeyManagement Remote £120k-150k Plexus are partnering with a VC-backed Web3 company building private keymanagement and cryptographic infrastructure. Our client enables apps to deploy secure, user-friendly key systems that power next-generation decentralized use cases. They are seeking a Senior DevOps Engineer in the More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
their established team. Youll be instrumental in embedding security into every stage of the software development lifecycleguiding engineers, shaping best practices, and driving secure, scalable solutions across our platform. Key Responsibilities: Security Advisory : Serve as the go-to expert for application security across engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement : Promote … and implement secure development practices across CI/CD pipelines, secrets and keymanagement, dependency management, and secure design. Vulnerability Management : Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. Tooling & Automation : Integrate security tools (e.g., SAST, DAST, SCA, secrets scanning) into developer workflows, ensuring automation is both scalable … Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secrets management, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis, and container More ❯
their established team. Youll be instrumental in embedding security into every stage of the software development lifecycleguiding engineers, shaping best practices, and driving secure, scalable solutions across our platform. Key Responsibilities: Security Advisory: Serve as the go-to expert for application security across engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement: Promote … and implement secure development practices across CI/CD pipelines, secrets and keymanagement, dependency management, and secure design. Vulnerability Management: Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. Tooling & Automation: Integrate security tools (e.g., SAST, DAST, SCA, secrets scanning) into developer workflows, ensuring automation is both scalable … Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secrets management, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis, and container More ❯
providers worldwide. This is a high-visibility role: you will interact with national tax authorities, regulators, international stakeholders, and internal leadership to drive trust and resilience across all operations. Key Responsibilities Strategy & Vision Define and lead a global information security vision aligned with the mission to support fair and secure digital taxation across jurisdictions. Translate business objectives, regulatory frameworks … . Lead periodic risk and security assessments (e.g. penetration testing, threat modeling, audit readiness) for all product modules (registration, returns, payment, analytics). Oversee third-party/vendor risk management, especially for integrations with government tax systems or external data sources. Serve as the principal liaison with regulators, audit bodies, and government clients on security posture, compliance audits, certifications … certifications for the business. Security Architecture & Operations Oversee secure design, architecture, and deployment of Digital Infrastructure Products across cloud, hybrid and on-premise infrastructure. Ensure strong identity and access management, encryption (in transit and at rest), and cryptographic key management. Lead security operations functions: threat detection, incident response, forensic investigations, resiliency planning, and business continuity across geographies. Integrate More ❯
with a strong focus on containerisation, cloud security, and automation . You will work closely with development, security, and operations teams to deliver reliable, secure, and scalable cloud solutions. Key Responsibilities: Design and implement cloud architectures on Azure, leveraging services such as AKS, SQL PaaS , and other Microsoft cloud technologies. Collaborate with development, security, and operations teams to ensure … like Prisma Cloud and App Check . Integrate security best practices into CI/CD pipelines in collaboration with DevOps and Infrastructure teams. Apply expertise in cloud networking, identity management, and encryption to ensure robust and secure environments. Manage identity and access management (IAM) , keymanagement systems, and encryption mechanisms across Azure. Maintain and optimise AKS More ❯
dartford, south east england, united kingdom Hybrid / WFH Options
Europa Worldwide Group
Cloud and App Check. Work with DevOps and Infrastructure teams to embed security best practices into CI/CD pipelines. Apply strong knowledge of cloud networking, security, and identity management to ensure robust and secure environments. Manage identity and access management (IAM), encryption mechanisms, and keymanagement systems across Azure. Maintain and optimise AKS environments, ensuring … best practices for cluster configuration, container lifecycle management, and operational resilience. Ensure adherence to organisational security policies, regulatory requirements, and industry best practices. Stay up to date with emerging Azure, cloud security, and containerisation technologies to drive continuous improvement. Our Ideal Person 3+ years of experience in cloud engineering or a related technical role. Strong, hands-on experience with More ❯
Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Sanderson
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Hampshire, South East, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Hampshire, South East, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
monitoring and protection tools such as Firewalls, IDS/IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience in designing and implementing Identity and Access Management (IAM) solutions and maintaining secure authentication practices. Proficiency with Windows and Linux systems , as well as network scanning and diagnostic tools (e.g., Wireshark, IP scanner). A solid understanding … of Public Key Infrastructure (PKI) and encryption fundamentals. Excellent collaboration, communication, and organisational skills , with the ability to work both independently and as part of a cross-functional team. Proven ability to handle sensitive information with discretion, professionalism, and sound judgment. Relevant certifications such as AWS Certified Security - Speciality, CISSP, CCSP, or Terraform Associate (or equivalent experience). Preferred … Qualifications Exposure to threat intelligence and security analytics , particularly within cloud environments. Bachelor's degree in Computer Science, Information Technology, or Information Security , or equivalent practical experience. Familiarity with key security frameworks and standards such as PCI, ISO 27001, NIST, and CIS, along with experience supporting audits and compliance initiatives. Strong understanding of networking protocols, systems architecture , and secure More ❯
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering KeyManagement in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering KeyManagement in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
Experis
team as a PKI Architect , designing and delivering secure, high-assurance cryptographic solutions for Defence and Government clients. This is a unique opportunity to apply your expertise in Public Key Infrastructure (PKI) and cryptography to protect critical national systems and enable trusted digital services. About the Role - PKI Architect As a PKI Architect , you'll play a key … In-depth knowledge of Microsoft Certificate Services (CA, NDES, CEP/CES, AD DS) and tools such as OpenSSL and Certutil . Expertise with Hardware Security Modules (HSMs) and KeyManagement Systems (KMS) - experience with Thales HSM platforms highly desirable. Advanced understanding of SSL certificate management and related lifecycle processes. Experience designing PKI in cloud environments (Azure More ❯
s, DigiCert, OpenSSL. Familiarity with certificate usage in TLS, S/MIME, code signing, document signing, VPN, smart cards, and secure email. Understanding of encryption algorithms, hash functions, and keymanagement practices. Experience in designing secure architectures in hybrid or cloud environments. Knowledge of compliance and regulatory standards such as PCI DSS, HIPAA, SOX, GDPR, NIST More ❯
s, DigiCert, OpenSSL. Familiarity with certificate usage in TLS, S/MIME, code signing, document signing, VPN, smart cards, and secure email. Understanding of encryption algorithms, hash functions, and keymanagement practices. Experience in designing secure architectures in hybrid or cloud environments. Knowledge of compliance and regulatory standards such as PCI DSS, HIPAA, SOX, GDPR, NIST More ❯
troubleshooting technical challenges, and improving cloud performance and reliability. You’ll work closely with senior engineers and cross-functional teams to ensure cloud infrastructure remains scalable, secure, and efficient. Key Responsibilities Assist in deploying, configuring, and maintaining cloud infrastructure (e.g., AWS, Azure, GCP). Support the monitoring of cloud resources to ensure availability, performance, and cost efficiency. Help implement … security best practices including identity management, access control, encryption, and compliance. Troubleshoot cloud-related issues and escalate where needed. Contribute to automation workflows using scripting or IaC tools (e.g., Terraform, CloudFormation). Support the creation and maintenance of technical documentation (SOPs, configurations, architecture diagrams). Collaborate with cross-functional teams to support application deployments. Participate in performance testing, incident … logging, and alerting tools (CloudWatch, Datadog, Splunk). Understanding of Infrastructure as Code (Terraform, CloudFormation). Awareness of cloud cost optimization strategies. Basic security knowledge (IAM, role-based access, keymanagement). Success Attributes Curious and eager to upskill Detail-oriented and proactive Able to collaborate effectively Strong troubleshooting mindset Adaptable and open to feedback Benefits Hands-on More ❯
delivery of secure, large-scale infrastructure across both private and public cloud environments. This position focuses heavily on enterprise PKI and trust services, integrating modern authentication, federation, and certificate management capabilities across highly assured platforms. Youll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering practical … scalable solutions to complex mission systems. Key Responsibilities: Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities, and Certificate Lifecycle Management systems Develop high-quality design artefacts, standards, and documentation for PKI, identity, and cross-domain architectures Provide technical guidance on Active Directory integration, federation services, and certificate-based … PKI and trust infrastructures (Root/Issuing CAs, RA, VA, CLM). Familiarity with Defence or government PKI ecosystems is advantageous Strong understanding of Active Directory, federation and identity management platforms, and certificate-based access controls Experience designing secure cloud solutions within private (VCF) and hyperscale (AWS, Azure, GCP) environments Knowledge of certificate auto-enrolment, keymanagementMore ❯
with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, keymanagement, and secure protocols (TLS, SSH, etc.) Detailed understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network … support to thrive Whether through mentorship, training, or leadership opportunities, we invest in your success so you can make a lasting impact. We believe diverse teams, working together are key to driving growth and delivering business results. We recognise the importance of employee well-being. We prioritise in providing competitive benefit plans, including Private Medical cover, Employee Assistance Program More ❯
with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, keymanagement, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network More ❯
with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, keymanagement, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network More ❯
Location: BELFAST ARNOTT HOUSE, United KingdomThales people architect identity management and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange funds, people cross borders, energy become smarter and much more. More than … will also work to understand at a macro-level how customers are leveraging Imperva's product offerings, identify new emerging business and technical trends, and work closely with Product Management (PM) and Product Development (PD) to ensure the strategic product roadmaps align with evolving customer requirements and expectations. Key Areas of Responsibility: Drive product adoption, expansion, and customer … Contribute to the creation of content for the Digital CSM organization, Community, and other value-added collateral that can be shared with our customers at scale. Liaise with Product Management and Product Engineering teams to ensure a closed loop feedback model. Partner with services team members for health checks and value assessments. Build engagement playbooks and reach out to More ❯