Winchester, Hampshire, United Kingdom Hybrid / WFH Options
Leidos
Cyber Risk Assessments) Experience of network and boundary protection technologies (firewalls, mail gateways, load balancers, anti-virus), including cross domain technologies. Experience of authentication and authorisation technologies (SAML, LDAP, PKI, etc) Experience of securing microservice architectures within a cloud environment Experience of Virtualisation technologies. Understanding of the implementation, operation and maintenance of SIEM products The ideal candidate will hold CISSP More ❯
technologies. Manage Cisco-based network security, including firewalls, VPNs, and NAC. Monitor network traffic, troubleshoot issues, and improve efficiency. Implement and manage secure remote access and VPN solutions. Oversee PKI management, certificate issuance, and revocation. Recommend and deploy network/security enhancements. Develop technical specifications, rollout plans, and provide BAU support. Collaborate with IT and cybersecurity teams and work with More ❯
or equivalent professional experience. Preferred Qualifications: Experience in UX design for web-based products. Strong ability to mentor junior developers. In-depth knowledge of network technologies such as HTTPS, PKI, HTTP2/3, TLS, DNS, DHCP, Squid, nginx, and more. Familiarity with open-source development (e.g., demonstrated through GitHub contributions). Understanding of DevOps practices and culture. Knowledge of Linux More ❯
enthusiast in one specific technical domain - can be outside of the ones mentioned here above. Agile, Scrum, Devops knowledges are assets CISSP and/or OSCP are assets Others PKI knowledge Reverse Proxies: Apache HTTPD, NGINX are assets. Basic networking knowledge (Layer 3, 4) Linux/Unix System Engineer (RedHat) Language: English Soft skills Great teammate and supporter. Customer focus. More ❯
of key network protocols and concepts such as OSPF, BGP, NAT, TCP/IP routing, load balancing and high availability. Experience with VPN technologies such as IPSEC, SSTP, PKI, policy/route-based VPNs and VTI/GRE tunnels. Experience working with Cisco Secure Threat Defence (Firepower) and Netgate pfSense firewalls. CCNA/CCNP accredited - desirable but not essential. More ❯
of data storage approaches and tools and trade-offs involved (RBDMSs, key-value stores, column stores, log storage, ) Good understanding of applying cryptography in software development (e.g. TLS, PKI, HMAC, hashing algorithms, etc.) Good understanding of algorithms and data structures to solve distributed computing problems (e.g. content-based addressing, immutable data structures, CRDTs, consensus protocols, merkle DAGs, etc. It More ❯
5+ years in a Security Architect role within complex environments. Strong experience in infrastructure security and IAM design. Deep knowledge of cloud platforms (AWS, Azure), Zero Trust, SIEMs, PKI, SSO, MFA, and encryption. Familiarity with legacy system integration and cloud migration. Experience with regulatory standards (ISO 27001, NIST, PCI-DSS, SOC1, DPA). Strong stakeholder engagement and governance skills. More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Experis
OS and CLI configuration Advanced understanding of BGP, including policy-based routing, load balancing and attribute manipulation Strong troubleshooting experience with IPSEC VPNs and MPLS networks Solid grasp of PKIinfrastructure, including certificate-based VPN authentication Strong knowledge of routing and switching principles Ideal Candidate Profile: Self-motivated, methodical and technically proficient Confident working in a high-pressure, fast More ❯
performance. Develop applications using event-driven programming paradigms and adhere to design patterns like Model View Template (MVT) and Model View Controller (MVC). Ensure security and compliance through PKI and OIDC with OAuth 2.0 implementation. Automation: using Unit Testing and API Testing Qualifications: At least 5+ years of experience in software development, with a focus on Python and web More ❯
Operating, configuring and troubleshooting NXOS, IOS XE/XR, F5 TMOS operating systems, FortiOS Strong understanding of the majority of the following protocols: BGP, ISIS, VRF, OTV, STP, IPSec, PKI, VDC, VPC, VRRP, HSRP technologies. Fundamental knowledge of management protocols and secure implementation of SSH, AAA (TACACS+), Syslog, SNMP, NTP In-depth understanding of underlying network fundamentals not limited to More ❯
Operating, configuring and troubleshooting NXOS, IOS XE/XR, F5 TMOS operating systems, FortiOS Strong understanding of the majority of the following protocols: BGP, ISIS, VRF, OTV, STP, IPSec, PKI, VDC, VPC, VRRP, HSRP technologies. Fundamental knowledge of management protocols and secure implementation of SSH, AAA (TACACS+), Syslog, SNMP, NTP In-depth understanding of underlying network fundamentals not limited to More ❯
Operating, configuring and troubleshooting NXOS, IOS XE/XR, F5 TMOS operating systems, FortiOS Strong understanding of the majority of the following protocols: BGP, ISIS, VRF, OTV, STP, IPSec, PKI, VDC, VPC, VRRP, HSRP technologies. Fundamental knowledge of management protocols and secure implementation of SSH, AAA (TACACS+), Syslog, SNMP, NTP In-depth understanding of underlying network fundamentals not limited to More ❯
Operating, configuring and troubleshooting NXOS, IOS XE/XR, F5 TMOS operating systems, FortiOS Strong understanding of the majority of the following protocols: BGP, ISIS, VRF, OTV, STP, IPSec, PKI, VDC, VPC, VRRP, HSRP technologies. Fundamental knowledge of management protocols and secure implementation of SSH, AAA (TACACS+), Syslog, SNMP, NTP In-depth understanding of underlying network fundamentals not limited to More ❯
Operating, configuring and troubleshooting NXOS, IOS XE/XR, F5 TMOS operating systems, FortiOS Strong understanding of the majority of the following protocols: BGP, ISIS, VRF, OTV, STP, IPSec, PKI, VDC, VPC, VRRP, HSRP technologies. Fundamental knowledge of management protocols and secure implementation of SSH, AAA (TACACS+), Syslog, SNMP, NTP In-depth understanding of underlying network fundamentals not limited to More ❯
initiative, and ability to operate effectively in a small, high-trust team. • MS Office suite Desirable: • Experience with or understanding of CASD (Customer Access Security Device). • Knowledge of PKI operations and secure credentialing. • ITILv4 Foundation or Agile SAFe Foundation certifications. • Previous experience within the MOD, Defence Digital, or another secure government department. • Membership in a relevant professional body (e.g. More ❯
initiative, and ability to operate effectively in a small, high-trust team. * MS Office suite Desirable: * Experience with or understanding of CASD (Customer Access Security Device). * Knowledge of PKI operations and secure credentialing. * ITILv4 Foundation or Agile SAFe Foundation certifications. * Previous experience within a secure government department. * Membership in a relevant professional body (e.g., BCS, ISACA, IISP). DV More ❯
PKI Engineer Salary: £55,000k + £6K allowance + bonus (upto 10%) + 10% DV Allowance Total Compensation: circa - £70,000 Clearance: You will hold or be eligible for DV Clearance The company: Global IT Consultancy delivering digital transformation to Defence and National Security end clients. Overview: The PKI Engineer will be responsible for applying security best practices and industry … standards derived from threat analysis to implement PKI technology according to Design requirements. The position requires strong theoretical knowledge as well as industry experience in applying ad-vanced cryptography schemes to secure complex IT infrastructure, customer-facing services, and sensitive customer and enterprise data. Your skills and experience: Experience of delivering on-premise PKI using technologies such as Keyfactor … EBJCA), Microsoft PKI and OpenSSL; Experience of delivery of high assurance PKI to support Microsoft and Linux platforms; Expertise in both mainstream encryption schemes and key exchange protocols as well as quan-tum-safe cryptography; Experience in Powershell and OpenSSL; Experience in creation of policy documentation via interpretation of customer Certificate Policies in relation to PKI usage i.e. CPS More ❯
types of support to make the relocation process as smooth as possible - including assistance with visa procedures, housing tips, and integration support. What to expect Define a broad enterprise PKI strategy and reach alignment across the organization. Design the security architecture for a state-of-the-art and future-proof PKIinfrastructure, with adequate Certificate Authority (CA) topology, PKI … technology, certificate lifecycle management tools and other components. Lead the strategic transition of the PKIinfrastructure to Post-Quantum Cryptography (PQC), ensuring that cryptographic systems are designed with cryptographic agility in mind. Closely collaborate with the IT and Operations teams in charge of deploying and operating the PKI infrastructure. Oversee critical PKI processes such as root key ceremonies … and other essential CA processes to maintain the integrity and trust of our PKI systems. Develop and maintain detailed documentation of PKI processes. Ensure proper governance framework, certificate policies and practices statement are implemented and maintained. Define and implement robust and reliable incident, response, and recovery procedures. Ensure compliance with relevant regulations and industry standards. Support internal and external audit More ❯
incidents via the Incident Process, including incident triage and escalation to the Service Management Team. Key tasks include: Responding to escalations from 2nd Line using ITSM tooling Managing PKI certificates for networking devices (physical and virtual) Distributing software, firmware, and security updates for network devices Collaborating with and supporting design and engineering teams Maintaining and supporting both virtual and More ❯
ability to operate effectively in a small, high-trust team. MS Office suite Government Security Clearance Experience with or understanding of CASD (Customer Access Security Device). Knowledge of PKI operations and secure credentialing. ITILv4 Foundation or Agile SAFe Foundation certifications. Previous experience within the MOD, Defence Digital, or another secure government department. Membership in a relevant professional body (e.g. More ❯
via the Incident Process including triage of incidents and escalation via the Service Management Team. Examples of tasks: Responding to escalations from 2nd Line Daily checks utilising ITSM tooling. PKI certificate management for Networking devices (physical and virtual). To distribute software, firmware & security updates for network devices. To collaborate and support the design and engineering teams. Maintaining and supporting More ❯
Birmingham, West Midlands, England, United Kingdom
Reed
policy-based routing, attribute manipulation, load-balancing techniques, and advanced troubleshooting. Proficiency in troubleshooting IPsec VPNs and MPLS networks. Solid understanding of routing and switching protocols. Good understanding of PKIinfrastructure and experience with certificate-based VPN authentication. Hands-on experience with various SRX and MX platforms, along with strong CLI expertise. Additional Requirements: This role requires full on More ❯
Birmingham, West Midlands, England, United Kingdom
Reed
routing and switching. Expertise in configuring and tuning BGP, including policy-based routing, manipulation of attributes, and load-balancing techniques. Familiarity with troubleshooting IPSEC VPNs and MPLS. Knowledge of PKIinfrastructure elements and certificate-based VPN authentication. Benefits : Competitive daily rate. Opportunity to work in a leading technology environment. Be part of a highly skilled team of engineers. To More ❯
project: * Are you dynamic, self-motivated and customer focused? Can you configure Juniper SRX & MX series Routers to a 3rd line level. Are you confident with BGP/IPSEC & PKI Prime, MPLS, with a 'right 1st time' approach and attitude? Do you want to be proud to work for a company that respects its people and is at the forefront More ❯
SQL Server • Microsoft Exchange • Skype for Business • PowerShell scripting Desirable Skills (Not Essential but a Plus): • VMware vSphere & vSAN • RSA SecurID • Ansible • Blackberry UEM • Trellix ePO • PKI (PublicKeyInfrastructure) • HP OneView • GitLab • Red Hat Enterprise Linux (RHEL) • RHEL Satellite • Cohesity Backup Solutions Immediate interviews and start available, get in touch for more info. More ❯