Remote Key Management Jobs in England

1 to 25 of 79 Remote Key Management Jobs in England

DevOps/Cloud PKI Engineer

London, England, United Kingdom
Hybrid / WFH Options
Sky
Design, build, and operate PKI solutions and environments. Manage Certificate Authority Administration, including Certificate Enrolment Web Service & Policy Web Service, and monitor Active Directory Certificate Services (ADCS). Manage Key Management Systems (KMS) to ensure robust cryptographic key security. Support and manage the PKI and Certificate deployment, automation, and Thales HSMs. Understand existing certificate use-cases and … of the PKI managed service for Sky and Comcast users, including certificate checks, issuing, and revoking. Work with App Service managed certificates, private and public certificates, and certificates from Key Vault. What You'll Bring Technical and professional leadership across the discipline. Deep knowledge of Information and/or Cyber Security, understanding of cybersecurity principles, practices, and frameworks like … with Certificate Authority Administration, ADCS monitoring. Familiarity with Data-in-motion and Data-at-rest Encryption techniques. Knowledge of PKI machine identity technologies like SSH, SSL, TLS. Experience managing Key Management Systems (KMS). Beneficial experience with PKI and Certificate deployment automation and Thales HSMs. Team Overview Cyber Security Our products, platforms, and technologies are constantly evolving. Protecting More ❯
Posted:

PKI Architect

Basingstoke, England, United Kingdom
Hybrid / WFH Options
Fujitsu
seeking a PKI Architect to join our established team. You will support the delivery of highly secure network services to our customers within Defence and Central Government, playing a key role in a customer-facing team. You will collaborate with solution architects, security architects, and project teams to deliver high assurance services from design to deployment. Responsibilities You will … major technical projects, strategies, and architectures. You should have established knowledge and skills in the following areas: Extensive knowledge of PKI and cryptography solution design. Experience with MS Certificate Management Services, including Certification Authority, Online Responder, Network Device Enrollment Services (NDES), Certificate Enrollment Web Services (CEP/CES), Active Directory Domain Services, and certificate management solutions. Expertise in … SSL certificate management, including concepts, processes, solutions, and tools such as OpenSSL and Certutil. Knowledge of Hardware Security Module (HSM) technology and Key Management Server (KMS) technology, with direct experience with Thales HSM platforms being highly desirable. Experience in cloud solution development with Azure or AWS architectures related to PKI management. Extensive cryptography and PKI solution design More ❯
Posted:

Cloud Security Engineer

Liverpool, England, United Kingdom
Hybrid / WFH Options
SW Group
As Cloud Security Engineer, your responsibilities will include among others Managing, implementing, and maintaining technical security controls for IAAS, PAAS and SAAS based services which support Financial Planning, Investment Management, Tax Advice and a range of Professional Services. Building out and improving capabilities around M365 utilising E5 licensing. Ensuring E5 security capabilities are being fully utilised and are correctly … date as services continue to mature and develop. Provide risk analysis and end to end control design, implementation for new services using cloud-based solutions. Supporting Agile based project management and iteration - squad-based delivery. Ensure that the vision for cloud-based service is built out on security best practice Familiarity in interpreting highly technical detail, being able to … enhancements to the cloud security strategy by identifying and alerting on appropriate event types. Identify and define system security requirements at a detailed technical level including controls for encryption, key management, IAAS design and segregation. Deep technical experience of implementing security features within Azure including DDOS protection, encryption, and appropriate monitoring controls. Implement technical controls and make recommendations. More ❯
Posted:

Director, Security Assurance and Remediation

London, England, United Kingdom
Hybrid / WFH Options
CLS-Group
to remediation plans, producing regular reporting at relevant levels confirming direction of travel of risk improvement or decline. Collaborate with security and IT teams on monitoring vulnerability and patch management progress against standards and controls guidelines, with oversight of remediation and timing to reduce risk to an acceptable level. Direct, coach and rollout training for team to understanding security … and security artefacts that support multiple internal and external audits and regulatory requirements. Stay updated on advancements in security technologies, policies, and regulatory changes, recommending and implementing necessary improvements. Key member of the function who regularly reviews Security Policies, Standards and Controls and optimize position on areas associated to regulations and company strategy. Integrate processes with Cyber Threat Intelligence … to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies, aligning to a 3 lines of defence model and enforcing alignment of risk taxonomy to organizational cybersecurity risk management processes, procedures and activities are identified across all security functions. Leadership Leads by More ❯
Posted:

Cryptographic Key Management Operations Lead, Vice President, Hybrid

London, England, United Kingdom
Hybrid / WFH Options
State Street
Who we are looking for State Street is seeking an experienced Cryptographic Key Operations Lead to oversee the end-to-end lifecycle management of cryptographic keys across cloud, on-premises, infrastructure and IoT environments. This role ensures the secure generation, distribution, rotation, revocation, and retirement of encryption keys while maintaining compliance with regulatory and security policies. Additionally, the … Key Operations Lead will manage and mentor a team of Key Management Engineers, driving operational excellence and automation to enhance key lifecycle processes. This role requires close collaboration with security, IT, cloud, infrastructure, and application teams to maintain the availability, reliability, and security of key management services, supporting business-critical operations and financial transactions. … model, where you can balance work from home and office to match your needs and role requirements. What you will be responsible for Lead and manage a team of Key Management Engineers, providing guidance, mentoring, and technical leadership to ensure effective cryptographic key lifecycle management. Oversee the daily operations and security of cryptographic key management More ❯
Posted:

Security and Information Security Architect

City of London, London, United Kingdom
Hybrid / WFH Options
NextEnergy Group
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
Posted:

Security and Information Security Architect

London Area, United Kingdom
Hybrid / WFH Options
NextEnergy Group
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
Posted:

Security and Information Security Architect

london, south east england, united kingdom
Hybrid / WFH Options
NextEnergy Group
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
Posted:

Security and Information Security Architect

london (city of london), south east england, united kingdom
Hybrid / WFH Options
NextEnergy Group
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
Posted:

Security and Information Security Architect

Slough, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
Posted:

Security Operations Manager

London, England, United Kingdom
Hybrid / WFH Options
Barclay Simpson
regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including: Security Command Center VPC Service Controls IAM (Identity & Access Management) Cloud Logging and Monitoring Workload Identity Federation Automate security response using Python, Terraform, or XSOAR. Collaborate with infrastructure and DevOps teams to embed security into CI/CD pipelines … Experience as SOC lead, cyber operations manager, or similar role. Hands-on experience in securing Google Cloud Platform (GCP) environments across multiple projects/accounts. Strong expertise in: SIEM management (Chronicle, Splunk, Elastic) Incident response and recovery Security orchestration (SOAR), preferably Chronicle + XSOAR IAM, policy enforcement, logging, and access reviews in GCP Proven experience working in FinTech or … OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and Key Management Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. Influence More ❯
Posted:

Security Operations Manager

London, England, United Kingdom
Hybrid / WFH Options
Barclay Simpson
regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including: Security Command Center VPC Service Controls IAM (Identity & Access Management) Cloud Logging and Monitoring Workload Identity Federation Automate security response using Python, Terraform, or XSOAR. Collaborate with infrastructure and DevOps teams to embed security into CI/CD pipelines … Experience as SOC lead, cyber operations manager, or similar role. Hands-on experience in securing Google Cloud Platform (GCP) environments across multiple projects/accounts. Strong expertise in: SIEM management (Chronicle, Splunk, Elastic) Incident response and recovery Security orchestration (SOAR), preferably Chronicle + XSOAR IAM, policy enforcement, logging, and access reviews in GCP Proven experience working in FinTech or … OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and Key Management Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. Influence More ❯
Posted:

Senior Cloud Architect, ML/AI Remote UK

London, England, United Kingdom
Hybrid / WFH Options
Doit Intl
and SageMaker Pipelines. Proficiency in monitoring and maintaining AI systems with Amazon CloudWatch and SageMaker Model Monitor. AI Governance and Security: Strong understanding of AI governance, incorporating IAM, AWS Key Management Service (KMS), and compliance frameworks. Knowledgeable in AI ethics, bias detection, and accountability using tools like SageMaker Clarify. Emerging AI Trends: Up-to-date on Generative AI More ❯
Posted:

Lead Security Engineer

Luton, England, United Kingdom
Hybrid / WFH Options
LHH
Key Responsibility Areas The successful candidate will report to the Head of Engineering Products and be responsible for providing security advice to product development teams in a range areas including: Production of Security Managements Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis … and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams … supporting Penetration test activities. Analysing penetration test results and preparation of remedial action plans. Prepare and implement through life support and maintenance for product security including vulnerability and patch management plans Lead security incident management teams during incident/crisis situations in conjunction with Head of Product Security for EW/FCA Review and maintain corporate product security More ❯
Posted:

Lead Security Engineer

bedford, east anglia, united kingdom
Hybrid / WFH Options
LHH
Key Responsibility Areas The successful candidate will report to the Head of Engineering Products and be responsible for providing security advice to product development teams in a range areas including: Production of Security Managements Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis … and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams … supporting Penetration test activities. Analysing penetration test results and preparation of remedial action plans. Prepare and implement through life support and maintenance for product security including vulnerability and patch management plans Lead security incident management teams during incident/crisis situations in conjunction with Head of Product Security for EW/FCA Review and maintain corporate product security More ❯
Posted:

Lead Security Engineer

watford, hertfordshire, east anglia, united kingdom
Hybrid / WFH Options
LHH
Key Responsibility Areas The successful candidate will report to the Head of Engineering Products and be responsible for providing security advice to product development teams in a range areas including: Production of Security Managements Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis … and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams … supporting Penetration test activities. Analysing penetration test results and preparation of remedial action plans. Prepare and implement through life support and maintenance for product security including vulnerability and patch management plans Lead security incident management teams during incident/crisis situations in conjunction with Head of Product Security for EW/FCA Review and maintain corporate product security More ❯
Posted:

Lead Security Engineer

luton, bedfordshire, east anglia, united kingdom
Hybrid / WFH Options
LHH
Key Responsibility Areas The successful candidate will report to the Head of Engineering Products and be responsible for providing security advice to product development teams in a range areas including: Production of Security Managements Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis … and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams … supporting Penetration test activities. Analysing penetration test results and preparation of remedial action plans. Prepare and implement through life support and maintenance for product security including vulnerability and patch management plans Lead security incident management teams during incident/crisis situations in conjunction with Head of Product Security for EW/FCA Review and maintain corporate product security More ❯
Posted:

PKI Encryption Lead - IAM Support

London, England, United Kingdom
Hybrid / WFH Options
Eteam Workforce Limited
on-site) Contract :06 months (with possibility of extension) Job Description: The PKI Migration Technical Lead will be responsible for leading the migration of Microsoft and Digicert Public Key Infrastructure (PKI) solutions. This role involves overseeing the planning and implementation of PKI migration projects, ensuring that all security and compliance requirements are met. The Technical Lead will work closely … with various stakeholders, including IAM, security, and business teams, to ensure a smooth and secure migration process. Key Responsibilities: Lead the planning and implementation of the Micorosoft and Digicert PKI migration project. Ensure compliance with security policies and standards. Collaborate with IAM, security, and business teams to gather requirements and develop migration strategies. Oversee the configuration and deployment of … Develop and maintain documentation related to PKI migration processes and procedures. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. 5+ years of experience in management and migration of Microsoft and Digicert PKI solutions. Strong understanding of PKI concepts, digital certificates, encryption algorithms, and key management practices. Experience in M&A projects. Knowledge More ❯
Posted:

PKI Encryption Lead - IAM Support

London, England, United Kingdom
Hybrid / WFH Options
Experis - ManpowerGroup
the evolving world of cloud, digital and platforms. Role purpose/summary The PKI Migration Technical Lead will be responsible for leading the migration of Microsoft and Digicert Public Key Infrastructure (PKI) solutions. This role involves overseeing the planning and implementation of PKI migration projects, ensuring that all security and compliance requirements are met. The Technical Lead will work … closely with various stakeholders, including IAM, security, and business teams, to ensure a smooth and secure migration process. Key Responsibilities: Lead the planning and implementation of the Microsoft and Digicert PKI migration project. Ensure compliance with security policies and standards. Collaborate with IAM, security, and business teams to gather requirements and develop migration strategies. Oversee the configuration and deployment … Develop and maintain documentation related to PKI migration processes and procedures. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. 5+ years of experience in management and migration of Microsoft and Digicert PKI solutions. Strong understanding of PKI concepts, digital certificates, encryption algorithms, and key management practices. Experience in M&A projects. Knowledge More ❯
Posted:

Senior Security Consultant

Newcastle upon Tyne, England, United Kingdom
Hybrid / WFH Options
Leonardo
by a team of consultants, engineers, and specialists. The role may involve a hybrid working model, combining remote work and on-site collaboration at one of Leonardo's offices. Key Responsibilities Work with a team to deliver cyber and information security across the engineering lifecycle. Interpret customer requirements into security management plans, statements of work, and activities. Oversee … certification. Experience should include: 3+ years in a cyber/engineering role. Involvement in MOD accreditation and secure design processes. Knowledge of standards like NIST SP 800-series. Risk management in compliance with regulations. Experience with proprietary and open-source software, firmware, hardware. Design analysis and security design development. Cyber risk assessment, threat modeling, vulnerability analysis. Security verification, validation … and remedial planning. Collaboration with engineers and architects for secure solutions. Nice to have: Understanding of engineering lifecycle. Knowledge of cryptographic technologies, key management, COMSEC, MOD/NCSC standards. Knowledge of Cyber Security & Airworthiness standards. Security Clearance Eligible for full security clearance. More info: UK Security Clearance Levels Life at Leonardo Benefits include flexible working, private healthcare, generous More ❯
Posted:

Chief Technology Officer

London, United Kingdom
Hybrid / WFH Options
Crypto UK
a comparable senior leadership role within a technology-driven organization Deep expertise in blockchain technologies, ideally staking mechanisms and consensus algorithms Background in on-premise infrastructure design, implementation, and management, with expert knowledge of data center technologies, virtualization, server hardware, and networking Expertise in data engineering, including the design and deployment of scalable data pipelines, data warehousing solutions, and … integration strategies In-depth understanding of cryptographic principles and secure key management practices Familiarity with infrastructure cybersecurity principles and best practices for securing distributed systems A consistent track record of successfully delivering complex, infrastructure-focused technology solutions on time and within budget fast-paced environment What makes you stand out: Extensive experience with cloud computing platforms (AWS, Azure More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead Cryptography Engineer

London, England, United Kingdom
Hybrid / WFH Options
Stott and May
Responsibilities: Drive, develop, and contribute to a Cryptography Operations roadmap and strategy Enhance cryptographic capabilities through in-house and partner integrations Implement and manage cryptographic keys Oversee cryptography and key management processes Facilitate onboarding of new services and manage existing ones Lead secure key storage implementation Establish cryptography processes across the team Manage lifecycle of cryptographic keys … including reviews and replacements Collaborate with Cyber and InfoSec teams to integrate key management practices Lead Cryptography Engineer – Technical Skills: Experience with key handling, segregation of duties, and split knowledge in cryptography Understanding of software delivery pipelines and automation of key management Knowledge of responding to cryptography incidents Familiarity with HSM technologies, especially Thales, or More ❯
Posted:

Lead Security Engineer

Luton, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
Security Engineer, Luton, Bedfordshire Client: LHH Location: Luton, Bedfordshire, United Kingdom Job Category: Other EU work permit required: Yes Job Views: 3 Posted: 10.06.2025 Expiry Date: 25.07.2025 Job Description: Key Responsibility Areas The successful candidate will report to the Head of Engineering Products and be responsible for providing security advice to product development teams in a range of areas … including: Production of Security Management Plans, work package descriptions, and cost estimates in support of product bids, services, and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis, and preparation of security management documentation for system accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques, and overseeing product development activities. Liaison … with Security Accreditors and Security Assurance Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets, and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams in support of evaluation activities. Preparation of TEMPEST Control Plans, advising development teams on appropriate implementation techniques, and liaising with TEMPEST test facilities. Advising development teams on suitable platform More ❯
Posted:

Lead Security Engineer

Watford, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
LHH Location: watford, hertfordshire, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 3 Posted: 10.06.2025 Expiry Date: 25.07.2025 col-wide Job Description: Key Responsibility Areas The successful candidate will report to the Head of Engineering Products and be responsible for providing security advice to product development teams in a range areas including … Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance … Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams in support of evaluation activities. Preparation of TEMPEST Control Plans, advising development teams on appropriate implementation techniques and liaising with TEMPEST test facilities. Advising development teams on suitable platform lockdown and configurations, and supporting Penetration More ❯
Posted:

Security & Information Security Architect

London, England, United Kingdom
Hybrid / WFH Options
NextEnergy Group
Architect, you will define the security vision and implement secure-by-design principles across all organizational layers — from Operational Technology networks in the field to corporate business systems. A key aspect of this role involves collaboration with: Data Protection Officer (DPO): integrating privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: translating architecture patterns into robust, monitored … and recoverable configurations External security advisors & key technology suppliers: aligning architectural controls with best practices and supply chain security requirements This strategic yet practical role requires balancing security principles with delivery across cloud, on-premises, and SaaS environments. Key Responsibilities Develop and evolve enterprise security architecture standards covering IT, OT, and hybrid-cloud environments Incorporate security & privacy requirements … modeling, risk assessments, and security analyses for new projects and platforms Lead architecture on secure network topologies, including segmentation and zero-trust models Define standards for IAM, encryption, secrets management, and key management aligned with ISO 27001/27019 and NIS2 Evaluate and select third-party security solutions and conduct vendor due diligence Serve as SME for More ❯
Posted:
Key Management
England
10th Percentile
£55,625
25th Percentile
£60,000
Median
£77,500
75th Percentile
£100,125
90th Percentile
£123,750