end of the year. Job Responsibilities Undertake all team activities in line with client wider strategy, Crypto strategy and departmental goals. Ensure the integrity and availability of cryptographic and keymanagement services to business functions and applications. Maintain accurate environment documentation, process and device categorisation. Provide ongoing assurance that risk and compliance requirements are being conducted to a … satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH KeyManagement, Certificate management, HSM configuration/installation/support Incident management, Change management, ITIL Ensure the integrity and availability of cryptographic and keymanagement … activities undertaken to ensure an accurate audit trail required for attestation/Audit support. Take a proactive approach to improving operations and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Support with resourcing, scheduling and distribution of work requests for HSM and Key management. Work closely with More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Networker Global Limited
The successful candidate will work on high-visibility project regarding SSH keys discovery, management and remediation across on-prem and the Cloud. We are looking for high quality candidates with significant experience and proven technical depth within SSH keymanagement, cryptography, and the Identity and Access Management space, including: Design and implement secure SSH keymanagement solutions for large scale hybrid (on-prem, Cloud) environments. Expertise in cryptographic risk management, including assessing the potential impact of security weaknesses and determining mitigations.? Experience leading remediation efforts, including planning, automation, access reconfiguration and operational handover. Deep expertise in Identity and access management, Privileged access management and secure access solutions (machine-to-machine … and human-to-machine) Knowledge/understanding of hardware security modules (HSMs) for storing cryptographic keys securely, including integration with enterprise applications for key generation and usage.? Familiarity with NIST's Post-Quantum Cryptography (PQC) standardization efforts and practical approaches for transitioning to quantum-resistant encryption schemes.? Knowledge of FIPS 140-2 and FIPS 140-3 validated cryptographic modules More ❯
Umbrella Only Overall purpose of role: Undertake all team activities in line with client wider strategy, Crypto strategy and departmental goals. Ensure the integrity and availability of cryptographic and keymanagement services to business functions and applications. Maintain accurate environment documentation, process and device categorisation. Provide ongoing assurance that risk and compliance requirements are being conducted to a … satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management. HSM configuration/installation/support. Incident management. Change management. ITIL. Ensure the integrity and availability of cryptographic and keymanagement services to business functions … and applications. Key Accountabilities: Cryptographic Hardware Management - including on site local configuration activities. Support with resourcing, scheduling and distribution of work requests for HSM and Key management. Work closely with dates set in cooperation with Service Management to ensure smooth continuity of services and operations. Deliver to the required SLAs for all service. Gather, distribute, store More ❯
Acadian Asset Management LLC is a Boston-headquartered investment management firm with wholly owned affiliates located in Singapore, London, and Sydney. As of March 31, 2025, the firm managed approximately US$122 billion on behalf of major pension funds, endowments, foundations, governments and other investors based in the U.S. and abroad.Position Overview:The Senior Security Engineer, reporting to … consistently governing our AWS Platform-as-a-Service (PaaS) infrastructure. We are looking for candidates with deep experience and understanding of continuous delivery, container security, SAST/DAST, secrets management, Identity and Access Management (IAM) governance, privilege management, encryption and keymanagement, threat detection, logging, cloud infrastructure security and policy-as-code.What You'll Do … the Identity and Config team to ensure least privilege in Acadian's federated identity systems, utilizing tools such as Saviynt, Okta and Microsoft Entra ID. Assist with federation of key enterprise applications as necessary. Build Security infrastructure in AWS using Terraform and Cloudformation, leveraging best practices such as multi-region and multi-Availability zone architecture with autoscaling. Assist with More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Proactive Appointments
such as patching and upgrades, as required Managing and maintain the remote monitoring systems for onsite and cloud-based platforms. This includes automated script development and monitoring. Proactive client management by providing telephone and remote assistance to ensure that client systems and Enterprise Cloud for IBMi are fully optimised. Record incidents that are either reported by the clients or … . Required experience: Demonstrable high-level technical capability on IBM Power i. Demonstrable experience of working in a complex enterprise-level Power i environment IBM i OS, BRMS, Work Management, Performance Management SQL, CL, SSL, KeyManagement, Mimix, IBM Storewize (V5000/V7000 for example) Power VM, Flash and virtualisation, Halcyon and Zabbix (Desirable) Skill in … solving technically challenging problems involving Power i based application and hardware issues. Excellent documentation and record management skills and attention to detail, must be able to write clear and understandable procedures. Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Proactive Appointments
such as patching and upgrades, as required Managing and maintain the remote monitoring systems for onsite and cloud-based platforms. This includes automated script development and monitoring. Proactive client management by providing telephone and remote assistance to ensure that client systems and Enterprise Cloud for IBMi are fully optimised. Record incidents that are either reported by the clients or … . Required experience: Demonstrable high-level technical capability on IBM Power i. Demonstrable experience of working in a complex enterprise-level Power i environment IBM i OS, BRMS, Work Management, Performance Management SQL, CL, SSL, KeyManagement, Mimix, IBM Storewize (V5000/V7000 for example) Power VM, Flash and virtualisation, Halcyon and Zabbix (Desirable) Skill in … solving technically challenging problems involving Power i based application and hardware issues. Excellent documentation and record management skills and attention to detail, must be able to write clear and understandable procedures. Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
call one week every four weeks About the Role Are you passionate about cybersecurity and cryptography? Our client in the Financial Services industry is looking for a Cryptography HSM & KeyManagement Specialist to join their global team. In this role, you'll help protect the their most sensitive data by managing encryption systems and digital keys that keep … our information secure.You'll work with cutting-edge cryptographic hardware, collaborate with teams across the business, and play a key role in maintaining the integrity and availability of our security infrastructure. What You'll Be Doing * Managing Hardware Security Modules (HSMs)and cryptographic infrastructure* Creating, storing, and retiring encryption keyssecurely across multiple platforms* Supporting incident and change managementprocesses* Collaborating … Contributing to project deliveryand continuous improvement initiatives What We're Looking For * Experience in cryptography and information security* Hands-on knowledge of HSM configuration and support* Familiarity with SSH key and certificate management* Understanding of Unix/Windows environments* Strong attention to detail and ability to work under pressure* Excellent communication and stakeholder management skills Nice to More ❯
Macclesfield, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
call one week every four weeks About the Role Are you passionate about cybersecurity and cryptography? Our client in the Financial Services industry is looking for a Cryptography HSM & KeyManagement Specialist to join their global team. In this role, you'll help protect the their most sensitive data by managing encryption systems and digital keys that keep … our information secure.You'll work with cutting-edge cryptographic hardware, collaborate with teams across the business, and play a key role in maintaining the integrity and availability of our security infrastructure. What You'll Be Doing * Managing Hardware Security Modules (HSMs)and cryptographic infrastructure* Creating, storing, and retiring encryption keyssecurely across multiple platforms* Supporting incident and change managementprocesses* Collaborating … Contributing to project deliveryand continuous improvement initiatives What We're Looking For * Experience in cryptography and information security* Hands-on knowledge of HSM configuration and support* Familiarity with SSH key and certificate management* Understanding of Unix/Windows environments* Strong attention to detail and ability to work under pressure* Excellent communication and stakeholder management skills Nice to More ❯
Warrington, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
AM-5 PM) + on-call one week every four weeks About the Role Are you passionate about cybersecurity and cryptography? Our client is looking for a Cryptography HSM & KeyManagement Specialist to join their global team. In this role, you'll help protect the their most sensitive data by managing encryption systems and digital keys that keep … our information secure.You'll work with cutting-edge cryptographic hardware, collaborate with teams across the business, and play a key role in maintaining the integrity and availability of our security infrastructure. What You'll Be Doing Managing Hardware Security Modules (HSMs)and cryptographic infrastructure Creating, storing, and retiring encryption keyssecurely across multiple platforms Supporting incident and change managementprocesses Collaborating … project deliveryand continuous improvement initiatives What We're Looking For Experience in cryptography and information security Ideally some hands-on experience of HSM configuration and support Familiarity with SSH key and certificate management Understanding of Unix/Windows environments Strong attention to detail and ability to work under pressure Excellent communication and stakeholder management skills Nice to More ❯
platforms, you will provide technical leadership and strategic direction in building scalable, secure, and resilient cloud-native systems based on AWS, Kubernetes, Kafka, microservices, Java, and event-driven design. Key Responsibilities Cloud Architecture Design: Lead the design of cloud-based systems and solutions, utilising AWS and modern architectural patterns such as microservices, event-driven architectures, and serverless computing to … the development of CI/CD pipelines, infrastructure as code (IaC), and automation to enable fast and reliable delivery of cloud services. Work closely with DevOps, engineering teams, product management, and stakeholders to ensure that architectural strategies align with both technical and business objectives. Performance & Cost Optimisation: Drive performance tuning, cost optimisation, and cloud resource management strategies to … maximise efficiency and minimise cloud spend. Risk Management: Identify and mitigate technical risks in cloud-based systems and infrastructure. Documentation & Best Practices: Develop and maintain architectural standards, design patterns, and documentation, ensuring a shared understanding of technical solutions. Skills, Knowledge and Expertise Degree in Computer Science, Software Engineering, Information Technology, or a related field or professional equivalent maybe considered. More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
cybersecurity capabilities and looking for a Cryptography Specialist to join their team. This is a fantastic opportunity to work at the forefront of digital security, managing encryption systems and keymanagement processes that protect some of the organisation's most sensitive data. As part of this role, you will be responsible for some of the following areas: Manage … and maintain Hardware Security Modules (HSMs) and cryptographic infrastructure Create, store, rotate, and retire encryption keys securely across multiple platforms Support incident and change management processes related to cryptographic systems Collaborate with application, infrastructure, and support teams to ensure seamless integration Contribute to project delivery and continuous improvement initiatives To be successful in the role you will have: Experience … in cryptography and information security Hands-on experience with HSM configuration and support Familiarity with SSH key and certificate management Understanding of Unix and Windows environments This is a hybrid role with flexibility to work remotely, though occasional office presence may be required. Some of the benefits included with the role are listed below: Starting salary of More ❯
CSF, OWASP SAMM), and compliance frameworks (SOC 2, ISO 27001, GDPR). Secure SDLC & DevSecOps - Build and maintain guardrails for static/dynamic analysis, container and IaC scanning, SBOM management, and supply-chain security; automate enforcement through CI/CD pipelines. Cloud & Infrastructure Security - Design and implement robust controls for AWS (primary) and Azure/GCP (secondary): IAM, network … segmentation, KMS, secrets management, WAF, EDR, and zero-trust patterns. Identity & Access Management (IAM) - Own enterprise IAM strategy, including RBAC, least-privilege provisioning, SSO, federation (OIDC/SAML), and privileged-access workflows. Monitoring, Detection & Response - Define audit logging, metrics, and telemetry requirements; integrate with SIEM/SOAR to deliver actionable alerts and playbooks for engineering-led incident response. … on software teams, especially for ISO27001 and SOC2. FedRAMP experience advantageous. Demonstrated experience performing threat modelling, penetration test scoping, and vulnerability management. Deep understanding of IAM concepts, encryption/key-management, and secure network design. Excellent communication skills with ability to translate technical risk to non-technical stakeholders. Preferred, but not essential Certifications such as CISSP, CSSLP, AWS More ❯
Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance … Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams in support of evaluation activities. Preparation of TEMPEST Control Plans, advising development teams on appropriate implementation techniques, and liaising with TEMPEST test facilities. Advising development teams on suitable platform lockdown and configurations, and supporting Penetration … test activities. Analysing penetration test results and preparation of remedial action plans. Prepare and implement through life support and maintenance for product security including vulnerability and patch management plans Lead security incident management teams during incident/crisis situations in conjunction with Head of Product Security for EW/FCA Review and maintain corporate product security policies. Deliver More ❯
alignment across the organization. Design the security architecture for a state-of-the-art and future-proof PKI infrastructure, with adequate Certificate Authority (CA) topology, PKI technology, certificate lifecycle management tools and other components. Lead the strategic transition of the PKI infrastructure to Post-Quantum Cryptography (PQC), ensuring that cryptographic systems are designed with cryptographic agility in mind. Closely … collaborate with the IT and Operations teams in charge of deploying and operating the PKI infrastructure. Oversee critical PKI processes such as root key ceremonies and other essential CA processes to maintain the integrity and trust of our PKI systems. Develop and maintain detailed documentation of PKI processes. Ensure proper governance framework, certificate policies and practices statement are implemented … centre of expertise, providing specialized knowledge and guidance on all aspects of PKI systems. Keep abreast with the latest trends, technologies, and industry best practices and serve as a key advisor. What you need to be successful Master's degree in information technology, computer science, cybersecurity, or a related field. Over 10 years of professional experience, of which at More ❯
Goldman Sachs is a leading global investment banking, securities and investment management firm that provides a wide range of services worldwide to a substantial and diversified client base that includes corporations, financial institutions, governments and high net-worth individuals. Founded in 1869, it is one of the oldest and largest investment banking firms. Secrets and Encryption Services is part … of the Identity and Access Management (IAM) business unit within Core Engineering Division of Goldman Sachs. Our mission is to protect the firm and our clients from cyberthreats such as credential compromise through the services we deliver and operate. The S&ES team is on a journey to uplift credential management solutions across the enterprise with a transformational … adoption of HashiCorp Vault across environments. The Role Role Overview: We are looking for a motivated and skilled Platform Engineer with a developing interest in cyber security and secrets management to join our team. The ideal candidate will contribute to ensuring the reliability, performance, and scalability of our platform and infrastructure while learning and implementing security best practices. This More ❯
to join their Enterprise Technology team. This hands-on role will focus on uplifting Ansible usage, enhancing automation workflows, and improving infrastructure security and reliability across a Linux environment. Key Responsibilities: Refactor and optimise Ansible playbooks and roles for maintainability, security, and robustness Improve pre-checks, conditional logic, error handling, and reporting Integrate with secret management systems such … as CyberArk and Ansible Vault Enhance Ansible inventory management and automation scheduling Build reusable templates for ad-hoc tasks and remediation Develop automation for CIS compliance and reporting Contribute to Molecule testing environments for Ansible roles Collaborate with Linux, Infrastructure, and InfoSec teams Essential Skills & Experience: Expert-level understanding of Ansible Core and CLI Strong background in Linux systems … engineering and automation Proven track record of writing secure, idempotent, and testable playbooks Experience with secret management tools (e.g. CyberArk, Ansible Vault) Knowledge of Linux patch management, system hardening, and CIS compliance Strong problem-solving, documentation, and communication skills Desirable: Experience with Molecule testing for Ansible roles Familiarity with Ansible Automation Platform (AAP) Understanding of SSH keyMore ❯
Telford, England, United Kingdom Hybrid / WFH Options
Vallum Associates
Title: PAM Consultant- SC Cleared Location: Hybrid – Stafford Park 1, Telford TF3 3BD (3 days/week Onsite) Duration: 3months+ Description We are seeking a highly experienced Privileged Access Management (PAM) Consultant to lead the assessment and strategic planning of PAM solutions within a complex hosting infrastructure. This role focuses on evaluating existing access control mechanisms, identifying risks associated … with over-privileged accounts, and recommending scalable PAM solutions tailored to diverse operating systems and on-premises environments. Key Responsibilities: • Conduct comprehensive assessments of internal infrastructure to identify privileged access risks and gaps. • Analyze current access provisioning models, especially where elevated permissions (e.g., root, Admin access) are broadly granted. • Analyze existing access control models and recommend enhancements using RBAC … PAM strategies with business and technical requirements. • Support PoC and pilot deployments to validate solution effectiveness. • Provide technical guidance on session monitoring, credential vaulting, access workflows, and policy enforcement. Key Skills & Experience: • 10+ years of experience in PAM consulting and implementation, with a strong focus on environmental assessment and solution design. • Strong expertise in RBAC and ABAC models, including More ❯
languages such as PowerShell scripts, YAML, Python Experience of azure automation using arm templates Experience of Linux, Windows Server, Azure SQL Server, Azure Storage, CosmosDB Experience in cloud security management (IAM, Security Groups, certificates & keymanagement) Experience with logging, monitoring and alerting platforms such as app Insights Experience of working within an Agile and Scrum team Please More ❯
and diverse team that pushes boundaries and drives meaningful change in intelligence and communications. Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures … At Ultra I&C's Cyber business we have an exciting opening at our Cyber Centre of Excellence in Maidenhead. As the Procurement Lead, you will have direct line management of the Buyers and support all purchasing activities across the company to enable timely and cost-effective delivery from the supply chain. Candidates must be able to obtain and … maintain SC Security Clearance Key Responsibilities: Obtain timely quotations from the supply chain Purchase and expedite materials of the correct quality, at the agreed price and to the agreed delivery schedule Work to the MRP requirements and request quotations for needed items Place purchase orders at agreed price with approved suppliers selected from approved supplier listing in the ERP More ❯
and diverse team that pushes boundaries and drives meaningful change in intelligence and communications. Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures … engineering team of 5-20 engineers, within the Cyber UK Business Unit, delivering multiple concurrent research, development and production programmes ranging from tens of £k to several £m. Line management of up to 5 software engineers. Responsible for/Key responsibilities Architect, specify requirements, design, implement and test embedded and/or application software in accordance with the More ❯
and diverse team that pushes boundaries and drives meaningful change in intelligence and communications. Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures … the highest security and trust worldwide. Job Description • Provision of engineering leadership and management of concurrent engineering to ensure that assigned projects and tasking are delivered to scope, cost and schedule. • Responsible for the executing the engineering delivery of projects of a variety of sizes in accordance with business, management and technical processes. • Lead all project engineering activities … of the engineering to satisfaction of the budget, schedule and governance stakeholders. • Assure and govern the implementation and application of engineering in accordance with the agreed plans and processes. Key Responsibilities: Own, lead and assure the execution of agreed scope of engineering for delivery of projects of a variety of sizes/scale. Leads, defines, delegates and monitors the More ❯
Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures the highest security and trust worldwide. Job Description Provision of engineering leadership and management of … assigned projects and tasking are delivered to scope, cost and schedule. Responsible for the executing the engineering delivery of projects of a variety of sizes in accordance with business, management and technical processes. Lead all project engineering activities and the team, aligned to ISO 15288 and ISO 24748 processes, defining and continuous implementation of a systems approach. Effectively delegate … responsibilities, monitoring and managing progress to achieve the scope of the engineering to satisfaction of the budget, schedule and governance stakeholders. Key Responsibilities: Own, lead and assure the execution of agreed scope of engineering for delivery of projects of a variety of sizes/scale. Leads, defines, delegates and monitors the tasking and the dependencies relating to engineering activities More ❯
SL6, Woolley Green, Royal Borough of Windsor and Maidenhe, Berkshire, United Kingdom
Ultra Cyber Limited
Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures the highest security and trust worldwide. Job Description Provision of engineering leadership and management of … assigned projects and tasking are delivered to scope, cost and schedule. Responsible for the executing the engineering delivery of projects of a variety of sizes in accordance with business, management and technical processes. Lead all project engineering activities and the team, aligned to ISO 15288 and ISO 24748 processes, defining and continuous implementation of a systems approach. Effectively delegate … responsibilities, monitoring and managing progress to achieve the scope of the engineering to satisfaction of the budget, schedule and governance stakeholders. Key Responsibilities: Own, lead and assure the execution of agreed scope of engineering for delivery of projects of a variety of sizes/scale. Leads, defines, delegates and monitors the tasking and the dependencies relating to engineering activities More ❯
as a Subject Matter Expert (SME) in Windows-based enterprise infrastructures. You'll play a central role in the design, deployment, and support of high-security systems that underpin key defence and aerospace operations. Your Impact Take ownership of complex technical issues through to resolution, collaborating with users and other IT teams. Provide expert-level troubleshooting for incidents escalated … Endpoint & Configuration: Windows 10 & 11 Microsoft Endpoint Configuration Manager (MECM) Monitoring & Observability: Microsoft System Centre Operations Manager (SCOM) PKI Technologies: Microsoft Certificate Services, Hardware Security Modules (HSMs), and lifecycle keymanagement Security Clearance This role is subject to pre-employment screening in line with the UK Government's Baseline Personnel Security Standard (BPSS). An additional range of … to mental health support, financial advice, and employee-led networks championing inclusion and diversity (Enable, Pride, Equalise, Armed Forces, Carers, Wellbeing and Ethnicity). Rewarding Performance : All employees at management level and below are eligible for our bonus scheme. Never Stop Learning : Free access to 4,000+ online courses via Coursera and LinkedIn Learning. Refer a friend: Receive a More ❯
Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures the highest security and trust worldwide. Job Description To be responsible for and assure … enables and assures (add quality & value) the realisation of the stakeholder requirements, the production the required products and demonstrates compliance to the satisfaction of our customers. Responsible for/Key responsibilities Represents the Systems discipline as a senior member/leads SE for the totality of the Systems assigned work packages and tasking to deliver obligations and commitments on … firmware and software architects to ensure consistency, design for modularity and re-use, and technical excellence. Plan, co-ordinate and present at internal and external design reviews, to senior management and customers, to ensure a successful event. Lead, manages and reports on defined aspects of the project to achieve optimal balance between requirements, schedule and cost. Manage customers and More ❯