blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures-and business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the … You can successfully interface and connect with skilled technologists and non-technical stakeholders, including members of the C-suite Ability to work in an Agile environment leveraging strong work management, organizational and planning skills You have an ability to work as part of a geographically dispersed team bringing a sense of urgency to the tasks at hand Must have … for hybrid and multi-cloud environments Strong background in secure, software-defined networking and micro-segmentation Hands-on with modern engineering practices-Agile, DevSecOps, automated testing Familiarity with secrets management/certificate lifecycle automation Solid grasp of cryptographic keymanagement and enterprise PKI operations Experience with Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platforms More ❯
encryption, access controls, and data masking. Manage data encryption solutions to ensure the confidentiality and integrity of sensitive data. Work with the Security Team to develop and implement encryption keymanagement processes and systems. Ensure security across the Data & Analytics technology stack, which primarily includes Oracle tools, Snowflake, Postgres, and various AWS services (SageMaker, Lambda, Step Functions, DMS More ❯
London, England, United Kingdom Hybrid / WFH Options
Stott and May
Responsibilities: Drive, develop, and contribute to a Cryptography Operations roadmap and strategy Enhance cryptographic capabilities through in-house and partner integrations Implement and manage cryptographic keys Oversee cryptography and keymanagement processes Facilitate onboarding of new services and manage existing ones Lead secure key storage implementation Establish cryptography processes across the team Manage lifecycle of cryptographic keys … including reviews and replacements Collaborate with Cyber and InfoSec teams to integrate keymanagement practices Lead Cryptography Engineer – Technical Skills: Experience with key handling, segregation of duties, and split knowledge in cryptography Understanding of software delivery pipelines and automation of keymanagement Knowledge of responding to cryptography incidents Familiarity with HSM technologies, especially Thales, or More ❯
within the region. You will be responsible for the entire sales cycle, from pipeline generation and proposal leadership to closing deals, focusing on our comprehensive suite of security solutions. Key Responsibilities: Lead and orchestrate the creation of compelling, high-quality, security-focused proposals and responses to Requests for Proposals (RFPs). Leverage deep technical understanding across diverse cybersecurity domains … including Security Operations Centers (SOC), Endpoint Detection and Response (EDR), Governance, Risk & Compliance (GRC), network security (including firewalls), cloud security, Operational Technology (OT) security, and data security (encryption, DLP, keymanagement). Revenue Generation & Customer Relationship Management: Develop and execute strategic sales plans to achieve revenue targets and expand our customer base within the assigned territory. Build … maintain, and nurture strong, long-lasting relationships with key stakeholders and decision-makers within target customer organizations. Proactively identify and pursue new business opportunities through various channels. Take ownership of key financial and sales performance metrics, including Total Contract Value (TCV), Annual Contract Value (ACV), sales funnel health, and pipeline development. Provide accurate forecasting and regular reporting on More ❯
PKI Engineer Remote 5 months - extensions £720 per day inside ir35 - umbrella only Role overview: Lead the architecture, design, and operations of Public Key Infrastructure (PKI) solutions. Manage Hardware Security Modules (HSMs), ensuring secure cryptographic key management. Oversee the migration of legacy PKI to a modern replacement solution. Implement Public-Key Cryptography Standards (PKCS), chains of trust … and Certificate Signing Requests (CSRs). Collaborate with cybersecurity teams to integrate PKI into broader security architecture. Provide hands-on expertise with HSMs, ensuring compliance with security standards. Key Skills & Experience: Strong expertise in PKI architecture, operations, and security best practices. Hands-on experience with HSMs in enterprise environments. Deep knowledge of PKCS, certificate management, and trust models. More ❯
PKI Engineer Remote 5 months - extensions £720 per day inside ir35 - umbrella only Role overview: Lead the architecture, design, and operations of Public Key Infrastructure (PKI) solutions. Manage Hardware Security Modules (HSMs), ensuring secure cryptographic key management. Oversee the migration of legacy PKI to a modern replacement solution. Implement Public-Key Cryptography Standards (PKCS#11), chains of trust … and Certificate Signing Requests (CSRs). Collaborate with cybersecurity teams to integrate PKI into broader security architecture. Provide hands-on expertise with HSMs, ensuring compliance with security standards. Key Skills & Experience: Strong expertise in PKI architecture, operations, and security best practices. Hands-on experience with HSMs in enterprise environments. Deep knowledge of PKCS#11, certificate management, and trust models. More ❯
London, England, United Kingdom Hybrid / WFH Options
NextEnergy Group
Architect, you will define the security vision and implement secure-by-design principles across all organizational layers — from Operational Technology networks in the field to corporate business systems. A key aspect of this role involves collaboration with: Data Protection Officer (DPO): integrating privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: translating architecture patterns into robust, monitored … and recoverable configurations External security advisors & key technology suppliers: aligning architectural controls with best practices and supply chain security requirements This strategic yet practical role requires balancing security principles with delivery across cloud, on-premises, and SaaS environments. Key Responsibilities Develop and evolve enterprise security architecture standards covering IT, OT, and hybrid-cloud environments Incorporate security & privacy requirements … modeling, risk assessments, and security analyses for new projects and platforms Lead architecture on secure network topologies, including segmentation and zero-trust models Define standards for IAM, encryption, secrets management, and keymanagement aligned with ISO 27001/27019 and NIS2 Evaluate and select third-party security solutions and conduct vendor due diligence Serve as SME for More ❯
in bridging the gap between development, security, and operations. This is an individual contributor role, where you will spearhead initiatives and guide the team on best practices without direct management responsibilities. Key Responsibilities: Design, implement, and maintain secure cloud infrastructure in GCP. Develop and manage infrastructure as code (Terraform, Kubernetes) to ensure repeatable, scalable, and secure environments. Automate … workflows, build scripts, and operational tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as keymanagement, vulnerability scanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration and delivery (CI/CD … depth knowledge of DevSecOps tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerability scanning, encryption, authentication, and secrets management (Vault, KeyManagement Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when working as part of a team More ❯
work with teams and communicate complex technical concepts to all partners. What you will do Provide implementation and operations support for security event and information monitoring, digital certificate and keymanagement processes, endpoint security, and web application security. Perform infrastructure security platform implementation, patching, and lifecycle management. Provide guidance to all lines of business on security related to … s degree in computer science, Information Security, or equivalent system security engineering experience. 2+ years of experience. 1-2 years in an engineering role focusing on endpoint protection, certificate management, SEIM, or web application security. Experience supporting multiple operating systems including Windows Server and Linux/UNIX. Hands-on experience with cybersecurity products and concepts such as EDR/… XDR, endpoint protection, SEIM, PKI, CA, HSM, key vaults, encryption services, web application security/web application firewall/bot protection, ATOs. Support projects including product upgrades, deployment of new capabilities, tools, enhancements, and daily operational support. Ability to present technical issues to non-technical audiences. What We Offer Open and dynamic working atmosphere. Attractive remuneration model. Flexible working More ❯
and diverse team that pushes boundaries and drives meaningful change in intelligence and communications. Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate in the innovation that ensures … member, to escalate more complex challenges and opportunities. This role is expected to act independently with minimal guidance, and may mentor project managers/early careers. Responsible for/Key responsibilities Responsible for the assuring the Systems Engineering (in-process verification and validation) and delivery of conclusive evidence via System Integration, Verification and Validation (IV&V) processes and activities. … development and in-service test events. Responsible for all safety and security aspects relating to IV&V events and facilities used by the project. Actively participates, and is a key stakeholder, at engineering design reviews and project gates/reviews, owning the preparation, delivery and resulting actions of TRR. To support the Qualification activities, to include in house and More ❯
to assist others with future debugging and contribute supportability enhancement requests for our program of ongoing product improvement. become a specialist in our Data Loss Prevention and Insider Risk Management solution, and be able to provide expert advice to our customers and partners. We Are Looking For: An insightful and influential collaborator to join our team. We encourage you … domain administration. Working knowledge of Linux and associated tools. A practical understanding of how data is protected at rest and in transit, including the particulars of TLS, PKI, encryption, keymanagement, identity management and RBAC. Experience with Kubernetes, Google Cloud, or Amazon Web Services (AWS) is a plus. Why Join Us: At Fortinet, we embrace diversity and More ❯
outputs to generate insights that inform service blueprints. Ensure the user experience aligns with the latest UX technologies, pushing technical boundaries to deliver optimal experiences. Use prototyping as a key step in the design and validation process. Document technical details, including architectural flows and sequence diagrams. Lead technical discussions with clients and partners regarding UX and technical flows. Stay … ability to develop large-scale, high-availability applications. Strong analytical and problem-solving skills. Experience with Identity solutions (OAuth, OpenID Connect, SAML, security tokens). Knowledge of cryptography and key management. Experience with API testing tools like Postman. Familiarity with Design Thinking and product management tools like Jira Align. Knowledge of project management principles and Agile methodologies. More ❯
work with teams and communicate complex technical concepts to all partners. What you will do Provide implementation and operations support for security event and information monitoring, digital certificate and keymanagement processes, endpoint security, and web application security. Perform infrastructure security platform implementation, patching, and lifecycle management. Provide guidance to all lines of business on security related to … in computer science, Information Security, or equivalent system security engineering experience. 2+ years of experience. 1-2 years in an engineering role with a focus on endpoint protection, certificate management, SEIM, or web application security. Experience supporting/working with multiple operating systems including Windows Server and Linux/UNIX. Hands-on experience with cybersecurity products and concepts such … as EDR/XDR, endpoint protection, SEIM, PKI, CA, HSM, key vaults, encryption services, web application security/web application firewall/bot protection, ATOs. Support projects including product upgrades and deployment of new capabilities, tools, and enhancements and daily operational support. Ability to present technical issues to non-technical audiences. What We Offer Open and dynamic working atmosphere. More ❯
work with teams and communicate complex technical concepts to all partners. What you will do Provide implementation and operations support for security event and information monitoring, digital certificate and keymanagement processes, endpoint security, and web application security. Perform infrastructure security platform implementation, patching, and lifecycle management. Provide guidance to all lines of business on security related to … in computer science, Information Security, or equivalent system security engineering experience. 2+ years of experience. 1-2 years in an engineering role with a focus on endpoint protection, certificate management, SEIM, or web application security. Experience supporting/working with multiple operating systems including Windows Server and Linux/UNIX. Hands-on experience with cybersecurity products and concepts such … as EDR/XDR, endpoint protection, SEIM, PKI, CA, HSM, key vaults, encryption services, web application security/web application firewall/bot protection, ATOs. Support projects including product upgrades and deployment of new capabilities, tools, and enhancements and daily operational support. Ability to present technical issues to non-technical audiences. What We Offer Open and dynamic working atmosphere. More ❯
infrastructure systems, ensuring their reliability and security. You will work with cutting-edge technologies and participate in an on-call rota to support business-critical systems 24/7. Key Responsibilities: - Provide technical support for VMware platform, Tanzu, Dell VxRail, and Dell Data Domain. - Troubleshoot keymanagement systems like HashiCorp Vault and Thales HSM. - Support privileged access … management solutions (BeyondTrust) and SSO systems (KeyCloak). - Have a foundational knowledge of network principles. System Maintenance: - Administer and maintain Windows Server 2022 and Hyper-V. - Monitor system performance and conduct routine maintenance. - Contribute to disaster recovery and business continuity strategies. Collaboration & Documentation: - Work with senior engineers and cross-functional teams to enhance infrastructure. - Maintain thorough documentation for systems More ❯
infrastructure systems, ensuring their reliability and security. You will work with cutting-edge technologies and participate in an on-call rota to support business-critical systems 24/7. Key Responsibilities: - Provide technical support for VMware platform, Tanzu, Dell VxRail, and Dell Data Domain. - Troubleshoot keymanagement systems like HashiCorp Vault and Thales HSM. - Support privileged access … management solutions (BeyondTrust) and SSO systems (KeyCloak). - Have a foundational knowledge of network principles. System Maintenance: - Administer and maintain Windows Server 2022 and Hyper-V. - Monitor system performance and conduct routine maintenance. - Contribute to disaster recovery and business continuity strategies. Collaboration & Documentation: - Work with senior engineers and cross-functional teams to enhance infrastructure. - Maintain thorough documentation for systems More ❯
across our SaaS and IoT platforms. Job Responsibilities Design and implement secure cloud architecture across Azure/AWS/GCP. Manage identity and access controls (IAM), network segmentation, and keymanagement systems. Develop and enforce cloud security policies, standards, and guidelines. Collaborate with DevOps and engineering teams to integrate security into CI/CD pipelines (e.g., IaC scanning … frameworks and standards (e.g., CIS benchmarks, NIST 800-53, SOC 2). Relevant certifications are a plus (e.g., AWS Security Specialty, CCSP, CISSP). What we offer Play a key role in shaping the cloud and infrastructure security landscape of a global SaaS and IoT product environment. Work closely with cloud and security experts across the UK, India, and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance - Proficiency in identifying potential security risks, conducting risk assessments, and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT … infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure keymanagement, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. Security Automation & Scripting - Familiarity with scripting languages (such as Python, PowerShell, or Bash) to automate More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Pepper Mill
Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance - Proficiency in identifying potential security risks, conducting risk assessments, and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT … infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure keymanagement, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. Security Automation & Scripting - Familiarity with scripting languages (such as Python, PowerShell, or Bash) to automate More ❯
Databases, Common Coding practices, Experience creating technical security policies and standards Expertise in building application-level Security, Risk and Privacy controls into cloud applications Knowledge of data encryption and keymanagement Knowledge of Identity and Access Management systems Ability to perform risk assessments and threat modeling (like STRIDE model) Must be able to function in a dynamic More ❯
of working in a financial services environment and in cryptographic projects will be required. The role will also involve the creation of high-level designs, publishing new architecture patterns, key decisions, design deviations, and technical risks and issues where appropriate. Cybersecurity Expertise: Architect secure, multi-tenant HSMaaS platforms for cryptographic keymanagement and operations Define cryptographic service … HSMs Design scalable, compliant HSM infrastructures Integrate and optimize cloud and on-prem HSMs Develop secure APIs and interfaces for HSM provisioning, access, and automation Implement strong access controls, key isolation, and secure lifecycle management Establish cryptographic policies for key creation, usage, rotation, and destruction Embed monitoring, logging, and attestation for cryptographic operations and HSM events Perform More ❯
engaging stakeholders, and driving the successful execution of security projects. Responsibilities: Technical Expertise: Security Architecture & Design: Proficiency in designing secure architectures using Azure tools, including Azure Security Center, Azure Key Vault, Azure Firewall, and Azure Sentinel. API Security: Expertise in securing APIs, including Auth, JWT, API keys, and integration with Azure Active Directory (AAD). Cloud Security Controls: Strong … knowledge of network security, access management, data encryption, and keymanagement in Azure environments. Azure Services: In-depth experience with Azure API Management, Azure Kubernetes Service (AKS), Azure DevOps, and container security. Integration: Experience integrating on-premises and cloud environments while ensuring security standards. Management & Leadership: Team Leadership: Lead and mentor teams in implementing Azure … security solutions and fostering a culture of secure coding practices. Stakeholder Management: Collaborate with clients, business leaders, and cross-functional teams to align security strategies with business goals. Qualifications: Technical Skills: Expertise in Azure Security Center, Azure Sentinel, Microsoft Defender for Cloud, and related services. Advanced knowledge of Kubernetes security, microservices, and API management. Strong scripting skills for automation More ❯
customers embrace cloud technologies. This role is ideal for security architects who have worked in regulated industries like Banks, Insurance Companies, PSUs or as security architects in System Integrators. Key job responsibilities: Security architect should help customers implement core AWS security services such as Amazon Identity and Access Management (IAM), KeyManagement System, CloudHSM, AWS Organisations … have implementation knowledge to deliver DevSecOps pipeline with IaC scanner, SAST, DAST tool in the SDLC. Hands-on experience in one of the following is mandatory: Identity and Access Management Data Encryption Network Security Incident Response Security Automation BASIC QUALIFICATIONS: Knowledge of the primary AWS services (EC2, ELB, RDS, Route53 & S3) Experience implementing AWS services in a variety of More ❯
developer role, and candidates ideally have had experience deploying and supporting their own production-ready AI/ML models in cloud environments as well as automating the build and management of a broad range of cloud infrastructure using tools like Terraform. Candidates should be familiar with developing unit and functional tests, have experience designing and implementing CI/CD … tools with infrastructure as code pipelines, and have knowledge of Linux systems administration, containerization, networking, security, automated configuration and state management, cross-system orchestration, configuration management, logging, metrics, monitoring, and alerting. Principal Responsibilities: Architect, develop and maintain internal AI/ML infrastructure components, frameworks, and offerings Architect, develop and maintain AI/ML solutions for customers in cloud … e.g., vLLM, KFServing) Experience with building, monitoring, and alerting on logs and metrics Cloud Networking including connectivity, routing, DNS, VPCs, proxies, and load balancers Cloud Security including IAM, Certificate Management, and KeyManagement Excellent written and verbal communication skills Excellent troubleshooting and analytical skills Self-starter able to execute independently, on a deadline, and under pressure #J More ❯
technology advice; ensuring project success through timely and accurate production of agreed deliverables. Shaping, leading and delivering value through technology advisory consultancy and guiding transformational delivery engagements. Strong stakeholder management and relationship building skills at senior levels to enable consensus building and shaping technology direction. Leading in the development and presentation of client proposals collaborating with teams across our … experience: Creation of high-level security architecture design (HLD). Security capabilities in AWS Cloud and Data Centres (DCs). Knowledge of network segmentation and vulnerability management. Security: Firewalls, KeyManagement, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Virtual Private Networks (VPNs), Identity & Access Management (IAM), Application Gateway (ALG). Technologies: WSO2, Nginx, Entrust, GardDuty, Shield. … comfortable drafting documents, preparing presentations, researching IT architecture and technology topics, and providing oversight to development teams. They must have the ability to abstract complex themes, problem solve, distil key discussion points, organise work, deliver to tight deadlines, and communicate with non-technical and technical stakeholders. Security Clearance Please note that candidates must hold or be able to gain More ❯