with regulatory standards. The ideal candidate is a strategic thinker with deep expertise in security assurance, audit, and cloud security, and a passion for advancing Web3 and blockchain technologies. Key Responsibilities Design, conduct, and implement testing of security controls for identity management, keymanagement, and infrastructure (network and cloud) configurations. Support client assurance by preparing responses … platform. Requirements Minimum of 8 years of experience in security assurance, audit, compliance, or cloud security engineering. Proven expertise in testing and validating security controls across Identity and Access Management (IAM), keymanagement, and network/cloud environments. Strong understanding of IAM principles and their application in secure systems. In-depth knowledge of cryptographic keymanagement, Hardware Security Modules (HSMs), and KeyManagement Systems (KMS). Solid understanding of cloud and network security architecture and configurations. Demonstrated experience supporting external audits and assessments, such as SOC 1, SOC 2, ISO 27001, or PCI DSS. Hands-on experience with major cloud platforms (AWS, GCP, Azure) and infrastructure-as-code practices. Proficiency in preparing client More ❯
with regulatory standards. The ideal candidate is a strategic thinker with deep expertise in security assurance, audit, and cloud security, and a passion for advancing Web3 and blockchain technologies. Key Responsibilities Design, conduct, and implement testing of security controls for identity management, keymanagement, and infrastructure (network and cloud) configurations. Support client assurance by preparing responses … platform. Requirements Minimum of 8 years of experience in security assurance, audit, compliance, or cloud security engineering. Proven expertise in testing and validating security controls across Identity and Access Management (IAM), keymanagement, and network/cloud environments. Strong understanding of IAM principles and their application in secure systems. In-depth knowledge of cryptographic keymanagement, Hardware Security Modules (HSMs), and KeyManagement Systems (KMS). Solid understanding of cloud and network security architecture and configurations. Demonstrated experience supporting external audits and assessments, such as SOC 1, SOC 2, ISO 27001, or PCI DSS. Hands-on experience with major cloud platforms (AWS, GCP, Azure) and infrastructure-as-code practices. Proficiency in preparing client More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid / WFH Options
Searchability NS&D
cryptographic technologies Exposure to enterprise-level environments and global teams THE CRYPTOGRAPHY ANALYST ROLE As a Cryptography Analyst , you will ensure the integrity, availability, and compliance of cryptographic and keymanagement services across the organisation. You will be hands-on in managing HSMs (Thales, Entrust, Gemalto, or similar), automating operational tasks, and supporting incident, change, and configuration management. … information security Hands-on experience managing HSMs (Thales, Entrust, or Gemalto) Proficiency with HSM monitoring tools and automation Coding skills in Python or similar scripting languages Knowledge of SSH key and certificate management ITIL Foundation qualification Excellent attention to detail and stakeholder management Hold active BPSS clearance TO BE CONSIDERED: Please apply through this advert or email … applying for this role, you give express consent for us to process and submit (subject to required skills) your application to our client in conjunction with this vacancy only. KEY SKILLS: Cryptography Analyst, HSM Management, Python, Automation, Information Security, ITIL, Certificate Management, KeyManagement, Security Operations, Risk and Compliance, NSD More ❯
Cryptography Engineer Manchester Area | 2-3x a week Role Description Join a global Cyber Security team as a Cryptography Specialist , ensuring the integrity and availability of cryptographic and keymanagement services across global systems. In this role you will help to develop the function further as one of the key technical components of this dedicated team. … Standard UK hours (9 AM – 5 PM) with one week on-call every four weeks. What You’ll Do Manage, configure, and support Hardware Security Modules (HSMs) and keymanagement infrastructure. Oversee key generation, distribution, and governance across multiple platforms. Maintain risk controls, compliance records, and security documentation to audit standards. Support incident, change, and problem management, driving service improvements. Essential Experience Proven expertise in cryptography, HSMs, and key/certificate management. ITIL Foundation certification and experience in operational security environments. Strong stakeholder management and communication skills. Bachelor’s degree in Computer Science or related discipline. Desirable: Security or project management certifications (e.g. CISSP, CISM, PMP). Familiarity with Unix/Windows, data More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Plexus Resource Solutions Ltd
DevOps Engineer Web3/Applied Cryptography/KeyManagement Remote £120k-150k Plexus are partnering with a VC-backed Web3 company building private keymanagement and cryptographic infrastructure. Our client enables apps to deploy secure, user-friendly key systems that power next-generation decentralized use cases. They are seeking a Senior DevOps Engineer in the More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
their established team. Youll be instrumental in embedding security into every stage of the software development lifecycleguiding engineers, shaping best practices, and driving secure, scalable solutions across our platform. Key Responsibilities: Security Advisory : Serve as the go-to expert for application security across engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement : Promote … and implement secure development practices across CI/CD pipelines, secrets and keymanagement, dependency management, and secure design. Vulnerability Management : Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. Tooling & Automation : Integrate security tools (e.g., SAST, DAST, SCA, secrets scanning) into developer workflows, ensuring automation is both scalable … Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secrets management, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis, and container More ❯
their established team. Youll be instrumental in embedding security into every stage of the software development lifecycleguiding engineers, shaping best practices, and driving secure, scalable solutions across our platform. Key Responsibilities: Security Advisory: Serve as the go-to expert for application security across engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement: Promote … and implement secure development practices across CI/CD pipelines, secrets and keymanagement, dependency management, and secure design. Vulnerability Management: Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. Tooling & Automation: Integrate security tools (e.g., SAST, DAST, SCA, secrets scanning) into developer workflows, ensuring automation is both scalable … Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secrets management, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis, and container More ❯
providers worldwide. This is a high-visibility role: you will interact with national tax authorities, regulators, international stakeholders, and internal leadership to drive trust and resilience across all operations. Key Responsibilities Strategy & Vision Define and lead a global information security vision aligned with the mission to support fair and secure digital taxation across jurisdictions. Translate business objectives, regulatory frameworks … . Lead periodic risk and security assessments (e.g. penetration testing, threat modeling, audit readiness) for all product modules (registration, returns, payment, analytics). Oversee third-party/vendor risk management, especially for integrations with government tax systems or external data sources. Serve as the principal liaison with regulators, audit bodies, and government clients on security posture, compliance audits, certifications … certifications for the business. Security Architecture & Operations Oversee secure design, architecture, and deployment of Digital Infrastructure Products across cloud, hybrid and on-premise infrastructure. Ensure strong identity and access management, encryption (in transit and at rest), and cryptographic key management. Lead security operations functions: threat detection, incident response, forensic investigations, resiliency planning, and business continuity across geographies. Integrate More ❯
with a strong focus on containerisation, cloud security, and automation . You will work closely with development, security, and operations teams to deliver reliable, secure, and scalable cloud solutions. Key Responsibilities: Design and implement cloud architectures on Azure, leveraging services such as AKS, SQL PaaS , and other Microsoft cloud technologies. Collaborate with development, security, and operations teams to ensure … like Prisma Cloud and App Check . Integrate security best practices into CI/CD pipelines in collaboration with DevOps and Infrastructure teams. Apply expertise in cloud networking, identity management, and encryption to ensure robust and secure environments. Manage identity and access management (IAM) , keymanagement systems, and encryption mechanisms across Azure. Maintain and optimise AKS More ❯
dartford, south east england, united kingdom Hybrid / WFH Options
Europa Worldwide Group
Cloud and App Check. Work with DevOps and Infrastructure teams to embed security best practices into CI/CD pipelines. Apply strong knowledge of cloud networking, security, and identity management to ensure robust and secure environments. Manage identity and access management (IAM), encryption mechanisms, and keymanagement systems across Azure. Maintain and optimise AKS environments, ensuring … best practices for cluster configuration, container lifecycle management, and operational resilience. Ensure adherence to organisational security policies, regulatory requirements, and industry best practices. Stay up to date with emerging Azure, cloud security, and containerisation technologies to drive continuous improvement. Our Ideal Person 3+ years of experience in cloud engineering or a related technical role. Strong, hands-on experience with More ❯
Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Sanderson
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Hampshire, South East, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Hampshire, South East, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
solutions, ensuring alignment with business risk appetites and transformation goals. You'll be part of a knowledge-sharing culture, working alongside expert peers in Secure Architecture and Risk Planning. Key Responsibilities Deliver Secure by Design risk and security assurance functions within MOD/Public Sector. Lead and advise on risk management frameworks, ISMS, and Enterprise Security Risk Management. … Facilitate security and risk workshops with Authority departments. Produce clear reporting on vulnerabilities, risks, controls, and treatment activities. Provide pragmatic remediation and risk management guidance. Support secure design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
Telford, Shropshire, West Midlands, United Kingdom
InfinityQuest Ltd,
Key Skills & Experience: 10+ years of experience in PAM consulting and implementation, with a strong focus on environmental assessment and solution design. Strong expertise in RBAC and ABAC models, including policy design and enforcement. Deep understanding of on-premises infrastructure and hosting environments. Hands-on experience with Windows, Linux, Solaris, and AIX server platforms. Familiarity with Active Directory, LDAP … SSH keymanagement, and service account governance. Experience with PAM tools such as CyberArk, BeyondTrust, Delinea, etc Experience with identity federation, directory services, and authentication. More ❯
monitoring and protection tools such as Firewalls, IDS/IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience in designing and implementing Identity and Access Management (IAM) solutions and maintaining secure authentication practices. Proficiency with Windows and Linux systems , as well as network scanning and diagnostic tools (e.g., Wireshark, IP scanner). A solid understanding … of Public Key Infrastructure (PKI) and encryption fundamentals. Excellent collaboration, communication, and organisational skills , with the ability to work both independently and as part of a cross-functional team. Proven ability to handle sensitive information with discretion, professionalism, and sound judgment. Relevant certifications such as AWS Certified Security - Speciality, CISSP, CCSP, or Terraform Associate (or equivalent experience). Preferred … Qualifications Exposure to threat intelligence and security analytics , particularly within cloud environments. Bachelor's degree in Computer Science, Information Technology, or Information Security , or equivalent practical experience. Familiarity with key security frameworks and standards such as PCI, ISO 27001, NIST, and CIS, along with experience supporting audits and compliance initiatives. Strong understanding of networking protocols, systems architecture , and secure More ❯
Farnborough, Hampshire, South East, United Kingdom
Sanderson Government and Defence
this role, you'll be: Providing the Secure by Design risk and security assurance function within MOD as part of a managed service. Have an excellent understanding of risk management and assessment principles and frameworks, such as ISO27005 and the NIST Cyber Security Framework. Produce informative and succinct reporting that clearly articulates any identified vulnerabilities, associated risks, controls and … risk treatment activity. Facilitate security and risk workshops with the various Authority departments, to align with wider customer transformational Security and risk management outcomes. Provide accurate and pragmatic remediation/risk management guidance/advice in balance with Business objectives and risk appetites. Have an understanding of risk assessment in an agile delivery environment. Exceptional team working ethic … implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, KeyManagement Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application Firewalls Physical Network Infrastructure, Anti-Patterns, Network Firewalls, IDS/IPS, DMZs AI use cases, secure configuration More ❯
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering KeyManagement in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering KeyManagement in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯
based PKI solutions tailored to client needs using Azure or AWS architectures. Required Skills & Qualifications: Extensive knowledge and experience in PKI and Cryptography solution design. Proficiency in MS Certificate Management Services including Certification Authority, Online Responder, NDES Services, CEP/CES, and Active Directory Domain Services. Expert level experience in SSL certificate management, OpenSSL, and Certutil. Experience with … Hardware Security Module (HSM) technology and KeyManagement Server (KMS) technology, preferably with Thales HSM platforms. Expertise in cloud solution development with Azure or AWS, specifically related to PKI management. Strong background in Cryptography & PKI solution design (HLD & LLD). More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
Experis
team as a PKI Architect , designing and delivering secure, high-assurance cryptographic solutions for Defence and Government clients. This is a unique opportunity to apply your expertise in Public Key Infrastructure (PKI) and cryptography to protect critical national systems and enable trusted digital services. About the Role - PKI Architect As a PKI Architect , you'll play a key … In-depth knowledge of Microsoft Certificate Services (CA, NDES, CEP/CES, AD DS) and tools such as OpenSSL and Certutil . Expertise with Hardware Security Modules (HSMs) and KeyManagement Systems (KMS) - experience with Thales HSM platforms highly desirable. Advanced understanding of SSL certificate management and related lifecycle processes. Experience designing PKI in cloud environments (Azure More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Experis
team as a PKI Architect , designing and delivering secure, high-assurance cryptographic solutions for Defence and Government clients. This is a unique opportunity to apply your expertise in Public Key Infrastructure (PKI) and cryptography to protect critical national systems and enable trusted digital services. About the Role - PKI Architect As a PKI Architect , you'll play a key … In-depth knowledge of Microsoft Certificate Services (CA, NDES, CEP/CES, AD DS) and tools such as OpenSSL and Certutil . Expertise with Hardware Security Modules (HSMs) and KeyManagement Systems (KMS) - experience with Thales HSM platforms highly desirable. Advanced understanding of SSL certificate management and related lifecycle processes. Experience designing PKI in cloud environments (Azure More ❯
s, DigiCert, OpenSSL. Familiarity with certificate usage in TLS, S/MIME, code signing, document signing, VPN, smart cards, and secure email. Understanding of encryption algorithms, hash functions, and keymanagement practices. Experience in designing secure architectures in hybrid or cloud environments. Knowledge of compliance and regulatory standards such as PCI DSS, HIPAA, SOX, GDPR, NIST More ❯
delivery of secure, large-scale infrastructure across both private and public cloud environments. This position focuses heavily on enterprise PKI and trust services, integrating modern authentication, federation, and certificate management capabilities across highly assured platforms. Youll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering practical … scalable solutions to complex mission systems. Key Responsibilities: Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities, and Certificate Lifecycle Management systems Develop high-quality design artefacts, standards, and documentation for PKI, identity, and cross-domain architectures Provide technical guidance on Active Directory integration, federation services, and certificate-based … PKI and trust infrastructures (Root/Issuing CAs, RA, VA, CLM). Familiarity with Defence or government PKI ecosystems is advantageous Strong understanding of Active Directory, federation and identity management platforms, and certificate-based access controls Experience designing secure cloud solutions within private (VCF) and hyperscale (AWS, Azure, GCP) environments Knowledge of certificate auto-enrolment, keymanagementMore ❯
delivery of secure, large-scale infrastructure across both private and public cloud environments. This position focuses heavily on enterprise PKI and trust services, integrating modern authentication, federation, and certificate management capabilities across highly assured platforms. Youll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering practical … scalable solutions to complex mission systems. Key Responsibilities: Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities, and Certificate Lifecycle Management systems Develop high-quality design artefacts, standards, and documentation for PKI, identity, and cross-domain architectures Provide technical guidance on Active Directory integration, federation services, and certificate-based … PKI and trust infrastructures (Root/Issuing CAs, RA, VA, CLM). Familiarity with Defence or government PKI ecosystems is advantageous Strong understanding of Active Directory, federation and identity management platforms, and certificate-based access controls Experience designing secure cloud solutions within private (VCF) and hyperscale (AWS, Azure, GCP) environments Knowledge of certificate auto-enrolment, keymanagementMore ❯