security, infrastructure as code (IaC) security, and cloud security posture management. Additionally, you will contribute to data security efforts, securing data at rest, managing keymanagement systems, and ensuring strong governance across data access. Responsibilities: Integrate security into the software development lifecycle, automating security practices into CI/… Implement automated security testing (SCA, SAST, DAST) to identify and remediate vulnerabilities at every stage of development. Secure IaC configurations, ensuring secure provisioning, configuration management, and continuous monitoring of infrastructure. Utilize CNAPP and CSPM tools to secure cloud-native environments, focusing on application security and cloud posture management. Design … and deploy PKI solutions for secure keymanagement, including key generation, key ceremonies, and certificate management. Required education None Preferred education Bachelor's Degree Required technical and professional expertise Proven experience in DevSecOps, integrating security into the software development lifecycle. Strong focus on automating security practices More ❯
Kingdom and Ireland, Reapit's market-leading technology product suite provides estate and lettings agents with powerful tools covering lead generation, sales, lettings, property management, block management, client accounts, keymanagement and analytics, underpinned by a robust, security infrastructure. Worldwide, Reapit technology is used by over … agents in more than 15,000 branches, with over a million properties under management; enabling them to run their businesses, identify opportunities for growth, manage their properties, collect rent, communicate with their clients, and deliver an outstanding customer experience, every time. What you'll be doing Reporting to the More ❯
team of PKI architects. You will support the delivery of highly secure network services into our customers within Defence and Central Government, performing a key role in a customer facing team. You will be working with the solution architects, security architects and project teams to deliver a high assurance … have established knowledge and skills in the following areas: A sound and extensive knowledge of PKI and Cryptography solution design Experience in MS Certificate Management Services (Certification Authority, Online Responder, Network Device Enrollment (NDES) Services, Certificate Enrollment Web Services (CEP/CES), Active Directory Domain Services and certificate management solutions. Expert level experience in SSL certificate management concepts, processes, solution management and tools including OpenSSL and Certutil. Hardware security module (HSM) technology and KeyManagement Server (KMS) technology. Direct experience with Thales HSM platforms is highly desirable. Expert level experience in cloud solution development More ❯
of the service it delivers both internally and externally. Be a part of the professional culture within the team where ownership and quality are key values. Main Responsibilities: Support & Infrastructure: Monitor and resolve issues affecting the delivery of services to our clients; Manage application licensing; Keep up to date … Security: Maintain an understanding of the regulatory and compliance issues driving Sequel's ISMS; With leaders across the business, assist with the maintenance and management of Sequel's Risk Registers; Gain an understanding of the key information risks to the business (systems, networks, data, human error, cyber-attacks … appreciate how the insurance industry works. Knowledge and Experience: Essential: A minimum of 2 years in an infrastructure, SysOps or Security role; Active Directory management; NTFS permission & Group Policy configuration & management; Microsoft RDS Architecture (RemoteApp/RDWeb Gateway/RDS Broker); Virtual Windows 2016 DC Servers/File More ❯
As a Security Software Engineer, your role involves architecting, designing, and implementing end-to-end security controls to impact the global user base. A key focus is on developing automated, scalable security solutions to enhance efficiency and protect Roku. This position requires expertise in creating and extending security automation … End Security solutions and controls. Your work will directly impact our global user base Focusing on Automation. Developing automated, scalable security solutions. Efficiency is key Administering HashiCorp Vault for secrets management Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure … security design principles to cloud environments Documenting playbooks, procedures, and architecture Providing subject matter expertise to software development groups to assist in cryptography and keymanagement/authentication API. We are excited if you have Passion for cybersecurity with an effective and passionate drive to protect digital assets. More ❯
Data Security Architect is responsible for developing and executing a global data security strategy, ensuring the protection of sensitive information across the JD Group. Key Responsibilities: Implement and lead the Data Security Architecture capability across JD Sports, formalising principles through reference architectures, diagrams, and procedures. Research, evaluate, and implement … in geographically dispersed and hybrid cloud environments. Hands-on experience with modern enterprise-level data protection tools, including Data Loss Prevention (DLP), Digital Rights Management (RMS), data encryption/tokenization, and data discovery. Strong familiarity with Microsoft security solutions, such as AD RMS, Azure RMS, and Microsoft Purview for … data governance, classification, and compliance monitoring. In-depth knowledge of PKI, including certificate lifecycle management, encryption protocols, and secure keymanagement practices. Ability to lead and execute large, complex projects related to data security (e.g. introduction of a global DLP solution, replacement of a PKI environment). More ❯
South West London, London, United Kingdom Hybrid / WFH Options
La Fosse
environment as well as experience in firewall upgrades, network upgrades and wifi upgrades. This role will also manage a couple of junior engineers (no management experience necessary). The role is based in Westminster with 1-2 days working from home. Further detail: To configure, maintain, secure & develop the … models for membership services, commercial activities, Events & Charity. To provide technical infrastructure support of all server, cloud, security and networking platforms. Maintain effective data management, backup and DR capabilities, and provide elevated support assistance to helpdesk where needed, both within local offices and remote sites to enable all users … daily job functions to the optimum level. To manage the MIS Servicedesk. Responsible for the configuration and maintenance of the group helpdesk ticketing platform. Management of ticket lifecycles, technician work load balancing and reporting. IT Infrastructure Management : Oversee the smooth operation of the Group IT infrastructure, ensuring stability More ❯
Developing and maintaining the PKI infrastructure Developing/maintaining a secure cloud PKI platform PKI\ cryptography solution documentation Developing best in class Cryptography solutions Key skills needed: Extensive experience in designing and implementing PKI solutions SME understanding of cryptographic principles and protocols Experience in management and implementation of … Microsoft Certificate management services and PKI infrastructure, including Active Directory Certificate Services (ADCS), Azure Key Vault and Microsoft Certificate authority (CA) Experience in the design and implementation of Hardware security modules (HSM) and Keymanagement servers (KMS) Demonstrable experience in developing HSM solution designs for global More ❯
Developing and maintaining the PKI infrastructure Developing/maintaining a secure cloud PKI platform PKI\ cryptography solution documentation Developing best in class Cryptography solutions Key skills needed: Extensive experience in designing and implementing PKI solutions SME understanding of cryptographic principles and protocols Experience in management and implementation of … Microsoft Certificate management services and PKI infrastructure, including Active Directory Certificate Services (ADCS), Azure Key Vault and Microsoft Certificate authority (CA) Experience in the design and implementation of Hardware security modules (HSM) and Keymanagement servers (KMS) Demonstrable experience in developing HSM solution designs for global More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
Incident Response & Forensic Analysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance - Proficiency in identifying potential security risks, conducting risk assessments, and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing … implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure keymanagement, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
Incident Response & Forensic Analysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance - Proficiency in identifying potential security risks, conducting risk assessments, and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing … implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure keymanagement, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. More ❯
best-practice cryptography solutions Skills and Experience: Extensive experience in designing and implementing PKI solutions Strong understanding of cryptographic principles and protocols Experience in management and implementation of Microsoft Certificate management services and PKI infrastructure, including Active Directory Certificate Services (ADCS), Azure Key Vault, and Microsoft Certificate … Authority (CA) Experience in cloud cryptography solutions, including design and implementation of hardware security modules (HSM) and keymanagement servers (KMS) Strong knowledge and understanding of industry cryptographic frameworks, standards, and protocols Proficient skills in PowerShell and OpenSSL Expert problem-solving and analytical skills Strong written and oral More ❯
min contract Luton, Bedfordshire - 90% onsite We are seeking to recruit an experienced Lead Security Engineer with expertise in developing and maintaining product security management systems for defence and government customers. This position will report to the Head of Engineering Projects and will take responsibility for all security aspects … plans, deriving security requirements and working with product development teams to design, implement and maintain appropriate security controls and production of Product Security Artefacts. Key Responsibility Areas: Production of Security Managements Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk … assessments, risk mitigation plans, mitigation gap analysis and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance Coordinators in support of security accreditation. Preparation of More ❯
min contract Luton, Bedfordshire - 90% onsite We are seeking to recruit an experienced Lead Security Engineer with expertise in developing and maintaining product security management systems for defence and government customers. This position will report to the Head of Engineering Projects and will take responsibility for all security aspects … plans, deriving security requirements and working with product development teams to design, implement and maintain appropriate security controls and production of Product Security Artefacts. Key Responsibility Areas: Lead Security Engineer Production of Security Managements Plans, work package descriptions and cost estimates in support of product bids, services and proposals. … Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance Coordinators in support of security More ❯
min contract Luton, Bedfordshire - 90% onsite We are seeking to recruit an experienced Lead Security Engineer with expertise in developing and maintaining product security management systems for defence and government customers. This position will report to the Head of Engineering Projects and will take responsibility for all security aspects … plans, deriving security requirements and working with product development teams to design, implement and maintain appropriate security controls and production of Product Security Artefacts. Key Responsibility Areas: Lead Security Engineer Production of Security Managements Plans, work package descriptions and cost estimates in support of product bids, services and proposals. … Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance Coordinators in support of security More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
leonardo company
line capability wherever and whenever required. We are looking for an experienced product security practitioner with expertise in developing and maintaining robust product security management systems for defence and government customers. The Chief Product Security Engineer will take responsibility for ensuring that all security aspects of the design, development … teams, including in terms of: Deriving security requirements Undertaking security risk assessments for products Preparing security risk mitigation plans Review and approval of Security Management plans Security policy maintenance and monitoring Production of LoB security metrics Management of attendance at external security forums Attendance and support to the … Security Special Interest Group Lead security incident management teams during incident/crisis situations in conjunction with the Lead Product Security Engineer(s) The Chief Product Security Engineer has delegated authority within the independent Design Integrity function, responsible for the following elements: Security process maintenance and monitoring Security competence More ❯
and security. You will work with cutting-edge technologies and participate in an on-call rota to support business-critical systems 24/7. Key Responsibilities: -Provide technical support for VMware platform, Tanzu, Dell VxRail, and Dell Data Domain. -Troubleshoot keymanagement systems like HashiCorp Vault and … Thales HSM. -Support privileged access management solutions (BeyondTrust) and SSO systems (KeyCloak). -Have a foundational knowledge of network principles. System Maintenance: -Administer and maintain Windows Server 2022 and Hyper-V. -Monitor system performance and conduct routine maintenance. -Contribute to disaster recovery and business continuity strategies. Collaboration & Documentation: -Work More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
leonardo company
In broad terms, you should have as many of the following as possible: Experience of owning a security risk management system for highly regulated products based on recognised frameworks such as aerospace, nuclear, automotive, rail or oil & gas; People management, mentoring and development skills Practical experience of the … be desirable, but not essential , if you also had one or more of: Practical experience of ISO27001/27004/27005 or NIST Risk Management Framework (RMF); Knowledge of UK/NATO Information Assurance/Accreditation frameworks; Knowledge of EASA/FAA Airworthiness Certification frameworks; Awareness of current crypto … technologies, KeyManagement Systems & practical COMSEC; Chartered Engineer status with a recognised body; Awarded or looking to achieve an NCSC Certified Cyber Professional (CCP) recognition; Awareness of Information Security (INFOSEC), Communications Security (COMSEC), Transmission Security (TRANSEC), Product Safety and their inter-relationship; Experience of producing and delivering training More ❯
to join our team. This role is ideal for professionals who excel in supporting, maintaining, and optimizing critical IT infrastructure. You will play a key role in ensuring the high availability, security, and performance of our systems while troubleshooting complex issues efficiently. Additionally, you will participate in an on … call rota to provide 24/7 support for mission-critical systems. Key Responsibilities: Advanced Support & Troubleshooting: - Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. - Troubleshoot and resolve issues related to keymanagement systems, including HashiCorp Vault and Thales … Hardware Security Module. - Manage and support privileged access management solutions (BeyondTrust) and SSO systems (KeyCloak). - Have a strong foundation in networking principles. System Maintenance & Optimisation: - Administer and optimise Windows Server 2022 and Hyper-V environments. - Perform proactive monitoring and maintenance to ensure system performance and reliability. - Implement and More ❯
who is capable of developing a high performing team and driving transformational change. An exceptional problem solver, with a focus on commercially focused risk management who can confidently communicate with senior executives across the company, as well Capital One's UK and US regulators. What you'll do Lead … to the UK Card business, including leaning in and helping the business solve problems Look for ways to enhance and evolve the compliance risk management framework and function to ensure it is set up to effectively support Capital One deliver its strategy Actively promote a culture of proportionate and … effective compliance risk management and balanced risk taking Act as a strategic compliance advisor to the UK Card Leadership Team and the UK Board on complex compliance matters, including relating to new products, planned changes in policies and process and issues and events Be an active participant in keyMore ❯
Newquay, Cornwall, United Kingdom Hybrid / WFH Options
Huntington Ingalls Industries
integrates and manages the sensors, systems and other assets necessary to support integrated ISR operations and accelerated decision-making. With data fusion and mission management capabilities for the Department of Defense, the combatant commands and the intelligence community, HII advances the mission around the globe. Meet HII's Mission … or equivalent and 6 years relevant experience. Must have a background in Electronic Maintenance, Information Systems or Telecommunication disciplines. Must have experience with the management of electronic equipment for preventive and corrective maintenance, configuration, and calibration. Must have experience in Safety Procedures when working with electronic equipment. Must have … DC and high/low voltage theory and application. Thorough knowledge of the installation and maintenance of electrical/electronic components; working knowledge of KeyManagement Infrastructure. Experience and operational knowledge of various Test Equipment. Develop, review, and implementation of Policies and Standard Operating Procedures (SOP). Experience More ❯
Built and/or made substantial contributions to a common controls framework. Knowledge of infrastructure as code, CI/CD, orchestration tools, and private key management. Familiarity with security capabilities for major cloud service providers (e.g. AWS, Azure, GCP). Ability to white-board architectures and technical process flows. More ❯
information and ensuring upgrade processes are planned and executed seamlessly Directing and assisting the Support team where required with upgrade processes or for other key routine items Ensuring that inbound support requests are clearly defined, categorised and prioritised, in collaboration with support teams in other geographies Ensuring good response … customers and partners there may be an occasional requirement to assist the Extended Support team in handling complex issues and need careful nurturing and management Providing training as needed to customers and partners (LMS will replace this need) Validating, documenting and logging of enhancement requests coming from clients and … architecture and deployment guides, (b) training slides and (c) any other useful materials are updated and maintained Hosting scheduled calls and remote sessions with key customer and partner accounts to assist and maintain service calls, provide further advice, guidance where needed Learning and understanding Ascertia’s products, PKI, and More ❯
Thales, Entrust, Utimaco Attala o SME in at least 1 or more of the following Cryptographic tools (CipherTrust Manager, Symantec Encryption Manager, Venafi) o KeyManagement o Automation using Ansible o Expertise on Linux Must Have: • It is expected that the Engineer will have sound technical knowledge in … knowledge and previous experience or Storage (SAN, NAS) • In-depth knowledge of various cryptographic and encryption technologies and standards (Symmetric/Asymmetric cryptography, Public Key cryptography, Digital signing service, Message Digest and Certificate Authority). • Detailed understanding of firewalls, intrusion detection systems, authentication mechanisms, and networking protocols including SMTP More ❯
evolving spoofing techniques. In addition to your technical acumen, your track record in leading security initiatives and mentoring junior team members, will play a key role in fostering a proactive security culture. Preferred Skills, Qualifications and Experience Demonstrated mastery in securing Android platforms, including advanced threat modelling and the … ability to lead, coach, and inspire security engineering teams, driving best practices and ensuring continuous knowledge sharing. In-depth understanding of encryption algorithms, secure keymanagement and cutting-edge approaches in secure coding and risk reduction. Forward-thinking hacker mindset, with a passion for identifying vulnerabilities before they More ❯