Cryptography Analyst - Knutsford - £40,000 We're seeking a technically strong and highly logical Cryptography & KeyManagement Specialist to join our tightly knit team. This is a critical position in a high-security environment, supporting enterprise-level cryptographic services and secure keymanagement across physical infrastructure and applications. You'll be part of a small, agile … crypto (think quantum), and are keen to bridge technical expertise with business logic, we want to hear from you. Responsibilities Manage and support Hardware Security Modules (HSMs) and associated keymanagement processes. Contribute to secure cryptographic practices including PKI, SSH, symmetric/asymmetric encryption. Assist with application connectivity and infrastructure related to secure traffic flow and encryption. Perform … or support secure key ceremonies and data centre activities. Collaborate closely with cross-functional teams to translate technical requirements into practical, secure solutions. Your Experience: Must-Have Skills & Experience: Minimum 2 years of hands-on cryptography experience (graduates will not be considered). Understanding of cryptographic principles, including Strong IT background - especially in one or more of the following More ❯
opportunity, then make sure to apply today. (MUST) o Working experience with cryptographic algorithms like 3DES, AES, RSA, ECC etc. (MUST) o Deep understanding of Global Platform card content management and keymanagement processes (MUST) o Knowledge of EMV Common Personalization Specification and processes. (MUST) o Nice to have working knowledge of different KeyManagementMore ❯
Burgess Hill, Sussex, United Kingdom Hybrid / WFH Options
N Consulting Limited
Hill, UK (Hybrid, 2-3 days onsite) Industry: Financial Services Interview: Single client roundWe are looking for 1-2 subcontractor profiles with niche skills in the Payments domain . Key Must-Have Skills: JavaCard/HCE application developmentCryptographic algorithms (3DES, AES, RSA, ECC)Global Platform card content & keymanagement processesEMV Common Personalization Specification Nice to Have: Keymanagement principlesAndroid/iOS development for payment processingEnterprise mobile application development experience This is a highly specialized role requiring strong expertise in JavaCard (not standard Java), EMV, and cryptography .If you're interested or know someone suitable, please DM me or share your profile at your email/contact . More ❯
This role ensures secure provisioning, rotation, storage, and decommissioning of sensitive credentials across enterprise systems, while leading a team of engineers and analysts to maintain compliance and operational excellence. Key Responsibilities: Leadership & Team Management Lead a team responsible for managing enterprise KCS infrastructure. Assign tasks, monitor performance, and provide mentorship and training. Foster a culture of security, accountability … and continuous improvement. Operational Oversight Oversee the deployment, monitoring, and maintenance of keymanagement systems (KMS), certificate authorities (CA), and secrets management platforms. Manage Certificate Authorities (CAs), Registration Authorities (RAs), OCSP responders, CRLs, and HSMs. Ensure timely rotation and renewal of certificates and secrets to prevent outages or vulnerabilities. Manage access controls and audit trails for all … internal policies and external standards (e.g., NIST, ISO 27001, PCI-DSS). Support internal and external audits by maintaining accurate documentation and logs. Implement and enforce policies for secure key generation, storage, and destruction. Incident Response & Troubleshooting Act as the escalation point for KCS-related incidents. Lead root cause analysis and remediation efforts for certificate expirations, key compromise More ❯
On-site - Corsham/Farnborough Clearance Required: DV (Developed Vetting) Role Summary We're seeking a skilled PKI Support/Operator to provide 2nd-4th line support for Public Key Infrastructure (PKI) services and supporting infrastructure. This on-site role involves troubleshooting, maintenance, certificate life-cycle management, and ensuring compliance with security best practices in a high-assurance … environment. Key Responsibilities Operational Support & Incident Management Provide 2nd/3rd line support for PKI systems including root, subordinate, and issuing CAs. Troubleshoot certificate issues (issuance, revocation, validation, auto-enrolment). Manage incidents, service requests, and changes within defined SLAs. Infrastructure Maintenance Support identity and security services (e.g. AzureAD, Intune, SSO). Monitor and respond to alerts (e.g. … Microsoft Defender). Maintain server health, backups, patching, and updates. Certificate Lifecycle Management Handle certificate requests, renewals, and revocations. Maintain inventory and ensure timely renewals to avoid service disruption. Compliance & Documentation Adhere to CP/CPS and security policies. Manage CA audit logs and role-based access controls. Maintain detailed technical and procedural documentation. Required Skills & Experience Technical: Solid More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or related fields within Public Sector and MOD and will … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering KeyManagement in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering KeyManagement in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering KeyManagement in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯