Permanent Key Management Jobs in the UK excluding London

1 to 25 of 26 Permanent Key Management Jobs in the UK excluding London

Cryptography Engineer

Manchester Area, United Kingdom
McGregor Boyall
Cryptography Engineer Manchester Area | 2-3x a week Role Description Join a global Cyber Security team as a Cryptography Specialist , ensuring the integrity and availability of cryptographic and key management services across global systems. In this role you will help to develop the function further as one of the key technical components of this dedicated team. … Standard UK hours (9 AM – 5 PM) with one week on-call every four weeks. What You’ll Do Manage, configure, and support Hardware Security Modules (HSMs) and key management infrastructure. Oversee key generation, distribution, and governance across multiple platforms. Maintain risk controls, compliance records, and security documentation to audit standards. Support incident, change, and problem management, driving service improvements. Essential Experience Proven expertise in cryptography, HSMs, and key/certificate management. ITIL Foundation certification and experience in operational security environments. Strong stakeholder management and communication skills. Bachelor’s degree in Computer Science or related discipline. Desirable: Security or project management certifications (e.g. CISSP, CISM, PMP). Familiarity with Unix/Windows, data More ❯
Posted:

AppSec Lead

South East, United Kingdom
Halian Technology Limited
their established team. Youll be instrumental in embedding security into every stage of the software development lifecycleguiding engineers, shaping best practices, and driving secure, scalable solutions across our platform. Key Responsibilities: Security Advisory: Serve as the go-to expert for application security across engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement: Promote … and implement secure development practices across CI/CD pipelines, secrets and key management, dependency management, and secure design. Vulnerability Management: Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. Tooling & Automation: Integrate security tools (e.g., SAST, DAST, SCA, secrets scanning) into developer workflows, ensuring automation is both scalable … Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secrets management, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis, and container More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud Engineer

Dartford, England, United Kingdom
Leap29
with a strong focus on containerisation, cloud security, and automation . You will work closely with development, security, and operations teams to deliver reliable, secure, and scalable cloud solutions. Key Responsibilities: Design and implement cloud architectures on Azure, leveraging services such as AKS, SQL PaaS , and other Microsoft cloud technologies. Collaborate with development, security, and operations teams to ensure … like Prisma Cloud and App Check . Integrate security best practices into CI/CD pipelines in collaboration with DevOps and Infrastructure teams. Apply expertise in cloud networking, identity management, and encryption to ensure robust and secure environments. Manage identity and access management (IAM) , key management systems, and encryption mechanisms across Azure. Maintain and optimise AKS More ❯
Posted:

Cloud Engineer

dartford, south east england, united kingdom
Hybrid / WFH Options
Europa Worldwide Group
Cloud and App Check. Work with DevOps and Infrastructure teams to embed security best practices into CI/CD pipelines. Apply strong knowledge of cloud networking, security, and identity management to ensure robust and secure environments. Manage identity and access management (IAM), encryption mechanisms, and key management systems across Azure. Maintain and optimise AKS environments, ensuring … best practices for cluster configuration, container lifecycle management, and operational resilience. Ensure adherence to organisational security policies, regulatory requirements, and industry best practices. Stay up to date with emerging Azure, cloud security, and containerisation technologies to drive continuous improvement. Our Ideal Person 3+ years of experience in cloud engineering or a related technical role. Strong, hands-on experience with More ❯
Posted:

Cyber Security - GRC Consultant DV Cleared

Cambridgeshire, England, United Kingdom
Hybrid / WFH Options
Sanderson
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, Key Management Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Cyber Security - GRC Consultant (DV Cleared)

Cambridgeshire, East Anglia, United Kingdom
Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, Key Management Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Employment Type: Permanent
Posted:

Cyber GRC Consultant (DV Cleared)

Hampshire, South East, United Kingdom
Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, Key Management Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Employment Type: Permanent
Posted:

Cyber Security - GRC Consultant (DV Cleared)

Hampshire, South East, United Kingdom
Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, Key Management Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Employment Type: Permanent
Posted:

Cloud Security Engineer

Manchester, Lancashire, United Kingdom
Vix Technology
monitoring and protection tools such as Firewalls, IDS/IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience in designing and implementing Identity and Access Management (IAM) solutions and maintaining secure authentication practices. Proficiency with Windows and Linux systems , as well as network scanning and diagnostic tools (e.g., Wireshark, IP scanner). A solid understanding … of Public Key Infrastructure (PKI) and encryption fundamentals. Excellent collaboration, communication, and organisational skills , with the ability to work both independently and as part of a cross-functional team. Proven ability to handle sensitive information with discretion, professionalism, and sound judgment. Relevant certifications such as AWS Certified Security - Speciality, CISSP, CCSP, or Terraform Associate (or equivalent experience). Preferred … Qualifications Exposure to threat intelligence and security analytics , particularly within cloud environments. Bachelor's degree in Computer Science, Information Technology, or Information Security , or equivalent practical experience. Familiarity with key security frameworks and standards such as PCI, ISO 27001, NIST, and CIS, along with experience supporting audits and compliance initiatives. Strong understanding of networking protocols, systems architecture , and secure More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Principal Security Engineer

Gloucestershire, United Kingdom
Synoptix
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering Key Management in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯
Employment Type: Permanent
Salary: GBP 70,000 - 85,000 Annual
Posted:

Principal Security Engineer

Bristol, Avon, South West, United Kingdom
Synoptix Limited
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering Key Management in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯
Employment Type: Permanent
Salary: £85,000
Posted:

PKI Architect - DV Cleared - Excellent Rates REMOTE WORKING

Basingstoke, Hampshire, United Kingdom
Hybrid / WFH Options
Experis
team as a PKI Architect , designing and delivering secure, high-assurance cryptographic solutions for Defence and Government clients. This is a unique opportunity to apply your expertise in Public Key Infrastructure (PKI) and cryptography to protect critical national systems and enable trusted digital services. About the Role - PKI Architect As a PKI Architect , you'll play a key … In-depth knowledge of Microsoft Certificate Services (CA, NDES, CEP/CES, AD DS) and tools such as OpenSSL and Certutil . Expertise with Hardware Security Modules (HSMs) and Key Management Systems (KMS) - experience with Thales HSM platforms highly desirable. Advanced understanding of SSL certificate management and related lifecycle processes. Experience designing PKI in cloud environments (Azure More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

PKI Architect

Berkshire, South East, United Kingdom
Sanderson Recruitment
s, DigiCert, OpenSSL. Familiarity with certificate usage in TLS, S/MIME, code signing, document signing, VPN, smart cards, and secure email. Understanding of encryption algorithms, hash functions, and key management practices. Experience in designing secure architectures in hybrid or cloud environments. Knowledge of compliance and regulatory standards such as PCI DSS, HIPAA, SOX, GDPR, NIST More ❯
Employment Type: Permanent
Posted:

PKI Architect

Melksham, Wiltshire, United Kingdom
Ncounter LTD
delivery of secure, large-scale infrastructure across both private and public cloud environments. This position focuses heavily on enterprise PKI and trust services, integrating modern authentication, federation, and certificate management capabilities across highly assured platforms. Youll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering practical … scalable solutions to complex mission systems. Key Responsibilities: Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities, and Certificate Lifecycle Management systems Develop high-quality design artefacts, standards, and documentation for PKI, identity, and cross-domain architectures Provide technical guidance on Active Directory integration, federation services, and certificate-based … PKI and trust infrastructures (Root/Issuing CAs, RA, VA, CLM). Familiarity with Defence or government PKI ecosystems is advantageous Strong understanding of Active Directory, federation and identity management platforms, and certificate-based access controls Experience designing secure cloud solutions within private (VCF) and hyperscale (AWS, Azure, GCP) environments Knowledge of certificate auto-enrolment, key management More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Test Engineer

cumbernauld, central scotland, united kingdom
Emerson
with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.) Detailed understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network … support to thrive Whether through mentorship, training, or leadership opportunities, we invest in your success so you can make a lasting impact. We believe diverse teams, working together are key to driving growth and delivering business results. We recognise the importance of employee well-being. We prioritise in providing competitive benefit plans, including Private Medical cover, Employee Assistance Program More ❯
Posted:

Security Engineer

Cumbernauld, North Lanarkshire, UK
McNally Recruitment Ltd
with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network More ❯
Posted:

Security Engineer

Cumbernauld, Scotland, United Kingdom
McNally Recruitment Ltd
with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network More ❯
Posted:

Solutions Architect

Belfast, United Kingdom
Hybrid / WFH Options
Thales Group
Location: BELFAST ARNOTT HOUSE, United KingdomThales people architect identity management and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange funds, people cross borders, energy become smarter and much more. More than … will also work to understand at a macro-level how customers are leveraging Imperva's product offerings, identify new emerging business and technical trends, and work closely with Product Management (PM) and Product Development (PD) to ensure the strategic product roadmaps align with evolving customer requirements and expectations. Key Areas of Responsibility: Drive product adoption, expansion, and customer … Contribute to the creation of content for the Digital CSM organization, Community, and other value-added collateral that can be shared with our customers at scale. Liaise with Product Management and Product Engineering teams to ensure a closed loop feedback model. Partner with services team members for health checks and value assessments. Build engagement playbooks and reach out to More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Frontend Developer

Cumbernauld, North Lanarkshire, UK
McNally Recruitment Ltd
web applications Engineering degree in Software, Computer Science, Cybersecurity or equivalent demonstrated knowledge. Strong C++ programming skills and/or web application framework , i.e. Angular Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.). Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and More ❯
Posted:

Embedded Software Engineer

Cumbernauld, North Lanarkshire, UK
McNally Recruitment Ltd
years of experience in developing embedded firmware Engineering degree in Software, Computer Science, Cybersecurity or equivalent demonstrated knowledge. Strong C/C++ programming skills Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25) Familiarity with Linux, Windows, RTOS and network protocols More ❯
Posted:

Frontend Developer

Cumbernauld, Scotland, United Kingdom
McNally Recruitment Ltd
web applications Engineering degree in Software, Computer Science, Cybersecurity or equivalent demonstrated knowledge. Strong C++ programming skills and/or web application framework , i.e. Angular Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.). Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and More ❯
Posted:

Embedded Software Engineer

Cumbernauld, Scotland, United Kingdom
McNally Recruitment Ltd
years of experience in developing embedded firmware Engineering degree in Software, Computer Science, Cybersecurity or equivalent demonstrated knowledge. Strong C/C++ programming skills Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25) Familiarity with Linux, Windows, RTOS and network protocols More ❯
Posted:

Cyber Defence Analyst L2

Newport, UK
Airbus Protect Limited
We provide a global cyber defence approach that aims to protect, detect and respond to cyber threats with a portfolio including managed security services, industrial control system offerings, encryption, key management and consultancy services. Our goal: Protect our customers and support their needs with cyber security products. We are passionate about cyber security. If you share our passion … technical level, often being required to attend technical workshops and customer briefings/service reviews. All Analysts are expected to be able to present and write professional reports to key stakeholders and exercise good time management. *This position can offer you:* Are you looking for challenging tasks in a company with some of the most creative cyber security technology … BTL1/BTL2 * PJMR * CREST (Registered Intrusion Analyst) (CRIA) *Soft Skills/Qualifications* * The 2nd Line Analyst is expected to be able to present and write professional reports to key stakeholders * All staff are expected to exercise good time management and work as part of a team You will work from Airbus Protect offices, Newport, South Wales, with More ❯
Employment Type: Full-time
Posted:

Senior Software Engineer

Thatcham, Berkshire, United Kingdom
Jonathan Lee Recruitment
levels of security and trust for customers operating in critical environments. Your work will contribute to the company's mission of engineering excellence, helping to develop advanced cryptographic and key management solutions that protect vital information at both tactical and strategic levels. Location: This role is based in a highly collaborative and innovative environment in Maidenhead or Farnborough. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Principal Software Engineer

Berkshire, United Kingdom
Jonathan Lee Recruitment Ltd
to delivering highly differentiated solutions by applying cutting-edge electronic, mechanical, and software technologies. As a Principal Software Engineer, you will contribute to the development of pioneering cryptographic and key management solutions, ensuring the secure exchange of vital information for its customers. This role is an opportunity to join a team that thrives on innovation, collaboration, and excellence More ❯
Employment Type: Permanent
Salary: GBP 70,000 - 80,000 Annual
Posted:
Key Management
the UK excluding London
10th Percentile
£46,875
25th Percentile
£68,438
Median
£82,500
75th Percentile
£96,875
90th Percentile
£102,500