Trenton, New Jersey, United States Hybrid / WFH Options
Technology Services LLC
to the Global Security Office (GSO). Roles and Responsibilities Act as initial point of contact and subject matter expert for topics related to Keymanagement and encryption Responsible for keymanagement life cycle, documentation and participate in internal audit. Support of all hardware related to … HSM/Appliances to support keymanagement Participate in deep architectural discussions with internal Business units to engineer solution when requiring HSM/Encryption Assist business leaders in understanding and implementing security solution related to keymanagement/encryption following industry standards Provide input to security … audits Experience managing the implementation or enhancement of security controls across a diverse business Experience with Implementation of HSM solution with Thales, Safenet, Azure key vaults and AWS will be a plus Experience with PCI, Sarbanes Oxley (SOX), NIST cybersecurity framework, ISO 27000 security standards, and data protection regulations More ❯
development, security, and operations. This is an individual contributor role, where you will spearhead initiatives and guide the team on best practices without direct management responsibilities. Key Responsibilities: Design, implement, and maintain secure cloud infrastructure in GCP. Develop and manage infrastructure as code (Terraform, Kubernetes) to ensure repeatable … and operational tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as keymanagement, vulnerability scanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the … such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerability scanning, encryption, authentication, and secrets management (Vault, KeyManagement Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when working More ❯
City, Aberdeen, United Kingdom Hybrid / WFH Options
Baker Hughes Gruppe
to business strategies and requirements. Assisting in the maintenance of M&A playbooks based on company security standards, procedures, and best practices including account management, tenant management, information/IP protection management, proxy server management, security ingress/egress management, domain trusts posture, SSL/… IPsec, security incident and event management (SIEM), data protection (DLP, encryption), and password/keymanagement, vulnerability/threat assessment. Collaborating with security team members to develop all M&A security requirements for all hardware and software computing platforms, environments and solutions including developing and or modifying … accredited university or college. Have experience in ITGC/GITC audits including interfaces, control reports configurable controls. Possess deep working knowledge of IT service management (e.g., ITIL-related disciplines). Have a solid working knowledge of OT security and how it aligns and differs from Enterprise IT Security. Demonstrate More ❯
Aldershot, Hampshire, United Kingdom Hybrid / WFH Options
DXC Technology Inc
Job Description: Our client offers multiple building blocks (Access Management, User Management, OAuth, Certificate Management, Datapower, KeyManagement, PAMaaS and LogaaS) to its customers. The Analyst will through identifying customer needs and requirements, translate them into technical requirements and integration sheet. The successful candidate will … play a key role ensuring the seamless integration of technology solutions. The analyst will join a team that values agile principles: sprint-based approach, onboarding meeting, intake meeting, file building, T&I build and testing, scheduling meeting, PRD build and testing. Location: Fully remote within Belgium is feasible, with … new applications, mapping functional and technical expectations. SPOC to relevant ACM/DEVOPS teams re onboarding of applications/projects. SPOC to support user management re incidents, customer queries from onboarding procedures. Working out the technical requirements of the user and access management projects based on direction from More ❯
met, and the business operates securely and efficiently. Since most colleagues and internal stakeholders are Dutch, strong command of the Dutch language is required. KEY ACCOUNTABILITIES In this role, your responsibilities will include: Guide and mentor the Infrastructure team to deliver quality IT products and services on time, focusing … a related field. Equivalent professional experience may also be considered. Proficiency in IT infrastructure and systems, with a comprehensive understanding of security protocols, network management, and automation processes. Strong leadership and team-supporting abilities, with experience in professionalizing and guiding teams. Experience with IT Architecture methodologies (TOGAF and Archimate … and/or Nutanix and/or Oracle Linux Virtualization Manager Microsoft Active Directory environments both on-premises and online (Azure AD) Identity Access Management, Multi-Factor Authentication and federation e.g. ADFS PKI setup and Certificate ManagementKeyManagement Systems (KMS) Hardware Security Modules (HSM) Observability More ❯
or DV Clearance is required for eligibility. In this role, you will be at the forefront of designing, implementing, and supporting cutting-edge Public Key Infrastructure (PKI) solutions for high-profile clients. You will be involved in the entire solution lifecycle-from pre-sales architecture to implementation and ongoing … internal improvements-driving strategic initiatives while ensuring technical excellence and a strong focus on client satisfaction. Key Responsibilities: Pre-Sales & Client Engagement: Lead technical discussions, develop proposals, and educate stakeholders on PKI. Solution Architecture & Delivery: Design and implement PKI solutions, oversee CA/RA setups, and ensure compliance. Innovation … hiring through your network. Requirements: Expertise in PKI technologies and standards (X.509, SSL/TLS, S/MIME). Strong understanding of cryptographic algorithms, keymanagement, and code signing. Hands-on experience with tools such as Keyfactor Command, Venafi TLS Protect, AppViewX CERT+, EJBCA, Microsoft AD CS, and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
Incident Response & Forensic Analysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance - Proficiency in identifying potential security risks, conducting risk assessments, and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing … implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure keymanagement, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
GTSC Talent Solutions
customer in the Annapolis Junction, MD area. The ideal candidate will bring a wealth of experience and knowledge to ensure the design, implementation, and management of secure, robust, and compliant IT systems. This position requires expertise in Zero Trust principles, security monitoring, vulnerability analysis, and enterprise security architecture. Mission … eligible for TS/SCI with further polygraph testing. Bachelor's degree in system engineering, Computer Science, Computer Engineering, Information Systems, Engineering Science, Engineering Management, or related discipline from an accredited institution. Design, build, and maintain secure IT systems following Zero Trust principles. Implement, monitor, and manage security solutions … Server, and System Configuration Center Manager (SCCM). Collaborate on security operations and network monitoring efforts, identifying and mitigating risks. Implement encryption protocols and keymanagement to safeguard data. Support enterprise security architecture and provide recommendations for improvements. Stay up to date with the latest trends in cybersecurity More ❯
Location: Remote UK, United Kingdom Thales people architect identity management and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billions of digital interactions they have with people. Our technologies and services help banks exchange funds, people cross … and Army, Strategic Command and Defence Digital) with wider areas such as intelligence agencies in due course. The SCD will build and develop new key business relationships, managing all aspects of the sales process with the end customer, focusing on new business opportunities and developing existing business contacts. This … individual will report into the Sales Director, UK Government and Defence, contributing to building a wider government/public sector business in the UK. Key Areas of Responsibility Day-to-day management of a small number of Strategic/Target Accounts in line with the wider UK Government More ❯
Reston, Virginia, United States Hybrid / WFH Options
CGI
that support the enterprise goals, implement efficient end to end processes and leverage use of existing IT assets. Align strategic goals and objectives with key business and IT initiatives. Work to develop an integrated view of the enterprise using a repeatable approach, cohesive framework, industry standard techniques and best … deploy and support deployment of tools in AWS. Strong experience in AWS EC2, ESC, S3, Cloudformation Solid understanding of Cloud Security Tools like IAM, KeyManagement Services, Cloudwatch, RDS, DDoS etc Worked on NOSQL/DynamoDB, Oracle, RDS Experience with Python - good to have. Experiences in full life … cycle application/system development Experience developing in distributed application environments (Database, Transaction Management) Experience writing conceptual and detailed design documents, and developing large scale enterprise applications following an Agile execution model Experience with Application integrations (SOAP/REST Web Services, ESB, JMS, File/Data transfers, etc.) Familiar More ❯
Fairfax, Virginia, United States Hybrid / WFH Options
Perficient
utilizing programming languages like Java, Node, Python, etc. - required. AWS native tools Familiarity with AWS products including compute, storage, database, analytics, networking, developer tools, management tools, security, and enterprise applications. Tools: EC2, EKS, ECS, Fargate RDS, DynamoDB, Redshift Amazon EMR Kafka AWS Directory Service AWS IAM Identity Center AWS … Certificate and KeyManagement AWS Networking Advanced technical skills and experience designing and implementing AWS and hybrid IT network architectures at scale. As a networking specialist, candidate will design a secure, scalable, and highly available network infrastructure on AWS while addressing requirements like network security, hybrid IT connectivity More ❯
El Segundo, California, United States Hybrid / WFH Options
Aerospace Corporation
Force's Space Systems Command (SSC), the Space Development Agency, the National Reconnaissance Office (NRO), and other civil customers ( e.g. NASA). While previous management experience is helpful, this role also provides an opportunity for technical contributors to explore leadership experience . This role is approximately 75% individual contributor … model that combines 4 regular onsite workdays and remote flexibility as the business needs allow. What You'll Be Doing This is a dual management and engineering role: Lead project teams and directly contribute to technical design and research efforts while ensuring your team's success. Work with Department … proposals. Deep understanding in several of the following technical disciplines: embedded systems, PCB development, FPGA design, software development, or embedded security. Previous experience with key embedded security tenants such as Root of Trust, Secure Boot, encryption and keymanagement, and common attack vectors. Demonstrated expertise in building More ❯
Crewe, Cheshire, United Kingdom Hybrid / WFH Options
Bentley Motors
security standards and legislations (all regions, e.g., GB44495, ISO/SAE21434, UNECE WP29/R155, GDPR, Data security). Proven experience in technical project management, particularly in planning and rolling out security functions. Technical knowledge of product security countermeasures, including Intrusion Detection Systems (IDS), Secure Onboard Communication (SOK), Vehicle … KeyManagement Systems (VKMS), TLS, etc. Excellent communication and collaboration skills. Strong problem-solving and analytical skills. Software/Programming knowledge (C, C++). Encryption algorithms knowledge. Ability to influence colleagues within your area of responsibility. Engineering degree or equivalent is essential. What Bentley Offers Hybrid working options More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
leonardo company
line capability wherever and whenever required. We are looking for an experienced product security practitioner with expertise in developing and maintaining robust product security management systems for defence and government customers. The Chief Product Security Engineer will take responsibility for ensuring that all security aspects of the design, development … teams, including in terms of: Deriving security requirements Undertaking security risk assessments for products Preparing security risk mitigation plans Review and approval of Security Management plans Security policy maintenance and monitoring Production of LoB security metrics Management of attendance at external security forums Attendance and support to the … Security Special Interest Group Lead security incident management teams during incident/crisis situations in conjunction with the Lead Product Security Engineer(s) The Chief Product Security Engineer has delegated authority within the independent Design Integrity function, responsible for the following elements: Security process maintenance and monitoring Security competence More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Wood Consulting Services, Inc
or experience. Overview: Join our dynamic Agile team as a Senior Database Engineer, specializing as an Oracle Database Administrator, to support a critical cryptographic keymanagement program that impacts national security. You'll work in a fast-paced environment, leveraging DEVOPS best practices and cutting-edge tools.The selected More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
WOOD Consulting Services, Inc
or experience. Overview: Join our dynamic Agile team as a Senior Database Engineer, specializing as an Oracle Database Administrator, to support a critical cryptographic keymanagement program that impacts national security. You'll work in a fast-paced environment, leveraging DEVOPS best practices and cutting-edge tools. The More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Aerospace Corporation
if you have one or more of these: Experience implementing artificial intelligence/machine learning algorithms onto edge based compute platforms Previous experience with key embedded security tenants such as Root of Trust, Secure Boot, encryption and keymanagement, and common attack vectors Previous experience designing electronics More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
慨正橡扯
Job Description: In broad terms, you should have as many of the following as possible: Experience of owning a security risk management system for highly regulated products based on recognised frameworks such as aerospace, nuclear, automotive, rail or oil & gas; People management, mentoring and development skills; Practical experience … be desirable, but not essential , if you also had one or more of: Practical experience of ISO27001/27004/27005 or NIST Risk Management Framework (RMF); Knowledge of UK/NATO Information Assurance/Accreditation frameworks; Knowledge of EASA/FAA Airworthiness Certification frameworks; Awareness of current crypto … technologies, KeyManagement Systems & practical COMSEC; Chartered Engineer status with a recognised body; Awarded or looking to achieve an NCSC Certified Cyber Professional (CCP) recognition; Awareness of Information Security (INFOSEC), Communications Security (COMSEC), Transmission Security (TRANSEC), Product Safety and their inter-relationship; Experience of producing and delivering training More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Wood Consulting Services, Inc
with a passion for maintaining the integrity and security of critical data systems? Join our dynamic team and contribute to a nationally significant cryptographic keymanagement program. As part of our high-performing agile team, you'll work in a fast-paced environment using the Scaled Agile Framework … disaster recovery, performance tuning, and data monitoring, while also administering and implementing robust security policies. Your expertise will help us evaluate and recommend database management systems, optimize system performance, and ensure compliance with business requirements. Application Process: Interested candidates should submit their resume detailing their qualifications and experience. Security More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
WOOD Consulting Services, Inc
with a passion for maintaining the integrity and security of critical data systems? Join our dynamic team and contribute to a nationally significant cryptographic keymanagement program. As part of our high-performing agile team, you'll work in a fast-paced environment using the Scaled Agile Framework … disaster recovery, performance tuning, and data monitoring, while also administering and implementing robust security policies. Your expertise will help us evaluate and recommend database management systems, optimize system performance, and ensure compliance with business requirements. Qualifications • Must have at least three (3) years of demonstrated experience as a database More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
RWE AG
Extensive experience understanding, impact assessing and implementing Azure IAM roles, policies, security groups, NACLs, encryption etc. Extensive experience using data-in-transit/certificate management, data-at-rest and key management. Experienced in use of Azure PaaS. Excellent experience using Azure logging. Experience of data centres and remote … decisions. Responsibility for IT services used by all RWE staff globally. Dynamic environment with opportunity to own digital change and improvements. Daily interaction with key customers across all RWE OpCos. Working closely with multi-national external service providers. Competitive salary and benefits package plus annual discretionary bonus. Open and More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thales Group
customers, solving technical problems and operating in a fast-paced environment. Good working knowledge in Unix/Linux, Windows and MacOS. Good understanding and management of Windows Operating systems (Windows roles, MS Domain Services, MSCA, IIS, Credential Providers, ). Familiarity with virtual environments (VMware or equivalent), Microsoft security solutions … and Client-Server architectures. Good knowledge of database servers (MSSQL, Oracle RAC, or MySQL). Good understanding of networking. Good knowledge of cryptography and key management. Strong written and oral communication skills. Self-driven and motivated individuals. You should have a good understanding of authentication and authorization traffic flows … such as: Strong Authentication solutions based on One-time Password algorithms. Authentication solutions based on Public Key Infrastructures and certificates. Authentication solutions based on biometrics features. It would be preferred if you have familiarity with FIPS (Federal Information Processing Standards), Common Criteria, PKCS, Smartcards and Tokens. The successful candidate More ❯
Columbia, Maryland, United States Hybrid / WFH Options
Leidos
talented team is at the forefront in Security Engineering, Computer Network Operations (CNO), Mission Software, Analytical Methods and Modeling, Signals Intelligence (SIGINT), and Cryptographic Key Management. At Leidos, we offer competitive benefits, including Paid Time Off, 11 paid Holidays, 401K with a 6% company match and immediate vesting, Flexible … enhances complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real-time systems, and business management information systems) based upon documented requirements. Works individually or as part of a team. Reviews and tests software components for adherence to the design More ❯