boundaries and drives meaningful change in intelligence and communications. Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate More ❯
forward companies. You will lead conversations with customers about everything related to security and governance on the custody platform. This includes deployment models with KeyManagement Systems (HSMs and MPC), permission models, and features related to entitlements and policies. WHAT YOU'LL DO: Identify and secure commercial relationships … managers, and crypto natives who require digital asset custody solutions. 10+ years of experience in Sales/Business Development, Software/IT System product management, Technical Sales, Solution Architecture, or equivalent. 5+ years of relevant experience advising and selling to financial institutions. Demonstrated track record of successful sales or More ❯
technologies. You will work closely with developers, security engineers, and DevSecOps teams to integrate security into the entire software development lifecycle and enterprise infrastructure. Key Responsibilities: Develop and maintain comprehensive security architecture documentation aligned with business goals, enterprise target architecture, and industry standards. Design and implement security frameworks for … architecture or a related role, with expertise in cloud platforms (GCP preferred) and enterprise security. Strong knowledge of cloud-native security principles, including identity management, encryption, and network security. Proven experience architecting security solutions in microservice-based architectures and containerized environments (e.g., Kubernetes). Expertise in application security, including … services (IAM, VPC, Cloud KMS, Cloud Armor) and other cloud-native security tools. Solid understanding of data security practices, including encryption, access control, and key management. Experience in threat modelling, risk assessment, and defining security controls to mitigate risks in digital products and services. What's in it for More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
RWE AG
Extensive experience understanding, impact assessing and implementing Azure IAM roles, policies, security groups, NACLs, encryption etc. Extensive experience using data-in-transit/certificate management, data-at-rest and key management. Experienced in use of Azure PaaS. Excellent experience using Azure logging. Experience of data centres and remote … decisions. Responsibility for IT services used by all RWE staff globally. Dynamic environment with opportunity to own digital change and improvements. Daily interaction with key customers across all RWE OpCos. Working closely with multi-national external service providers. Competitive salary and benefits package plus annual discretionary bonus. Open and More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thales Group
customers, solving technical problems and operating in a fast-paced environment. Good working knowledge in Unix/Linux, Windows and MacOS. Good understanding and management of Windows Operating systems (Windows roles, MS Domain Services, MSCA, IIS, Credential Providers, ). Familiarity with virtual environments (VMware or equivalent), Microsoft security solutions … and Client-Server architectures. Good knowledge of database servers (MSSQL, Oracle RAC, or MySQL). Good understanding of networking. Good knowledge of cryptography and key management. Strong written and oral communication skills. Self-driven and motivated individuals. You should have a good understanding of authentication and authorization traffic flows … such as: Strong Authentication solutions based on One-time Password algorithms. Authentication solutions based on Public Key Infrastructures and certificates. Authentication solutions based on biometrics features. It would be preferred if you have familiarity with FIPS (Federal Information Processing Standards), Common Criteria, PKCS, Smartcards and Tokens. The successful candidate More ❯
and external project communications (meeting minutes, dashboards, etc.), providing regular and consistent updates to appropriate parties. Report on client project accomplishments and deliverables to management and different stakeholders. Lead the User Acceptance Test strategy. Define product/technical requirements which involve writing clear, thorough, and detailed user stories for … of relevant experience with an Advanced Degree in the job offered or in a related Product Manager, Systems Analyst, or Software Engineer occupation. Product management software tools such as Rally and Jira Align. Software development lifecycle in an e-commerce or web environment. Technical implementations of medium-large scale … and challenges. Experience in Identity solutions like oAuth, OpenID Connect, SAML, security tokens (JWS, JWE, access token, id token) or other IAM. Cryptographic knowledge & Key Management. Basic Understanding of B2B API integration. Analytical mind - Curious mindset with an interest in solving problems alongside strong analytical and quantitative skills, driving More ❯