IOS XE/XR, F5 TMOS operating systems, FortiOS Strong understanding of the majority of the following protocols: BGP, ISIS, VRF, OTV, STP, IPSec, PKI, VDC, VPC, VRRP, HSRP technologies. Fundamental knowledge of management protocols and secure implementation of SSH, AAA (TACACS+), Syslog, SNMP, NTP In-depth understanding of underlying More ❯
IOS XE/XR, F5 TMOS operating systems, FortiOS Strong understanding of the majority of the following protocols: BGP, ISIS, VRF, OTV, STP, IPSec, PKI, VDC, VPC, VRRP, HSRP technologies. Fundamental knowledge of management protocols and secure implementation of SSH, AAA (TACACS+), Syslog, SNMP, NTP In-depth understanding of underlying More ❯
IOS XE/XR, F5 TMOS operating systems, FortiOS Strong understanding of the majority of the following protocols: BGP, ISIS, VRF, OTV, STP, IPSec, PKI, VDC, VPC, VRRP, HSRP technologies. Fundamental knowledge of management protocols and secure implementation of SSH, AAA (TACACS+), Syslog, SNMP, NTP In-depth understanding of underlying More ❯
IOS XE/XR, F5 TMOS operating systems, FortiOS Strong understanding of the majority of the following protocols: BGP, ISIS, VRF, OTV, STP, IPSec, PKI, VDC, VPC, VRRP, HSRP technologies. Fundamental knowledge of management protocols and secure implementation of SSH, AAA (TACACS+), Syslog, SNMP, NTP In-depth understanding of underlying More ❯
IOS XE/XR, F5 TMOS operating systems, FortiOS Strong understanding of the majority of the following protocols: BGP, ISIS, VRF, OTV, STP, IPSec, PKI, VDC, VPC, VRRP, HSRP technologies. Fundamental knowledge of management protocols and secure implementation of SSH, AAA (TACACS+), Syslog, SNMP, NTP In-depth understanding of underlying More ❯
security testing using appropriate tools. Familiarity with Continuous Security, CI/CD practices. Understanding of network security, web application security (OWASP), and cryptographic controls (PKI, TLS). Proven ability to manage, mentor, and coach team members. Excellent communication skills for diverse audiences, including senior stakeholders and technical teams. Desirable Skills More ❯
London, England, United Kingdom Hybrid / WFH Options
IO Associates
client meetings in the U.K. About the Role: iO Associates are partnering with a leading technology firm in their search for an experienced Senior PKI Architect. Due to the exciting nature of the role and the projects you will be involved in, active SC or DV Clearance is required for More ❯
drive the security agenda within a matrixed environment. Serve as the security point of contact for projects, leveraging deep knowledge in DevSecOps, Azure IAM, PKI, secure SDLC, and adversarial AI threats, while promoting a culture of continuous improvement and security awareness. More ❯
solutions, virtualisation technologies and SDN. Enterprise tooling such as SIEM, Anti-Malware, System Monitoring and Altering. Familiarity with Active Directory and GPOs. Understanding of PKI/Cryptography. Understanding/Experience of network devices and concepts such as switches, routers and firewalls (physical and virtual). Familiarity with non-functional requirements More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Apacheix
standards Experience of MoD security process and practices (Relevant JSPs and Defcons) Technical understanding of IT security, Cloud Security, System Hardening, Boundary Controls, Crypto, PKI and Protective Monitoring UK resident and right to work with (or ability to attain) SC vetting status (or higher) Experience utilising agile delivery methodologies and More ❯
client meetings in the U.K. About the Role: iO Associates are partnering with a leading technology firm in their search for an experienced Senior PKI Architect. Due to the exciting nature of the role and the projects you will be involved in, active SC or DV Clearance is required for … eligibility. In this role, you will be at the forefront of designing, implementing, and supporting cutting-edge PublicKeyInfrastructure (PKI) solutions for high-profile clients. You will be involved in the entire solution lifecycle-from pre-sales architecture to implementation and ongoing internal improvements-driving strategic … satisfaction. Key Responsibilities: Pre-Sales & Client Engagement: Lead technical discussions, develop proposals, and educate stakeholders on PKI. Solution Architecture & Delivery: Design and implement PKI solutions, oversee CA/RA setups, and ensure compliance. Innovation & Improvement: Create design patterns, conduct reviews, and improve solution delivery. Team Development: Mentor junior team More ❯
Dartford, Kent, South East, United Kingdom Hybrid / WFH Options
Connexa
Manage Cisco-based systems, including firewalls, VPNs, and NAC. * Monitor traffic, troubleshoot issues, and enhance performance. * Implement secure remote access and VPN solutions. * Oversee PKI management and recommend security improvements. * Collaborate with IT, Cybersecurity, and third-party vendors. What You'll Bring: * Proven experience with network infrastructure and security More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
Dive 4xx training modules. Identity and Access Management domain, tools, products, protocols, taxonomy, identity management, authentication, authorization, identity federation, single sign on, OAuth2, OIDC, PKI, PSD2 SCA taxonomy, knowledge based authentication, possession based authentication, JavaScript coding of PingGateway and PingAM scripted routes, proxies and authentication tree nodes. Secondary Skills- Designing More ❯
scanning) Drive secure coding standards and perform hands-on code reviews for high-assurance systems Design and operationalize core security features: authentication, authorization, TLS, PKI, and cryptographic protections Contribute to hardening efforts across cloud, containerized, and on-premise systems Collaborate cross-functionally to align security initiatives with product development, DevOps More ❯
scanning) Drive secure coding standards and perform hands-on code reviews for high-assurance systems Design and operationalize core security features: authentication, authorization, TLS, PKI, and cryptographic protections Contribute to hardening efforts across cloud, containerized, and on-premise systems Collaborate cross-functionally to align security initiatives with product development, DevOps More ❯
implemented in Docker, Linux & Gradle. Behaviour Driven Development (BDD), with Gherkin & SpecFlow. Atlassian Jira, Github, Bamboo, Confluence & JFrog Artifactory. Software security implementation (e.g. OWASP, PKI, X509 Certificates, TLS). Software development for regulated environments (e.g. IVD/Medical devices). In addition to salary, we work flexibly, and provide More ❯
bristol, south west england, United Kingdom Hybrid / WFH Options
Logiq
technical and non-technical stakeholders. Your experience will include: Expertise in Defensive Cyber, Enterprise Architecture, Secure Systems, Network & Cloud Security, System Hardening, Cryptographic Controls (PKI, Data at Rest/In Transit), Protective Monitoring, and Security Auditing. Strong understanding of the ISO 27000 series, NIST Cyber Security & Risk Management Frameworks, NCSC More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
Hays Technology
services Local Stack Alfresco/Activiti/Camunda Apache Kafka MongoDB/MySQL or other RDBS Kubernetes/Docker Micro-services Architecture Security and PKI KeyCloak XML If you hold current SC Clearance and are interested in this role, click 'apply now' to forward an up-to-date copy of More ❯
The platform allows devices to seamlessly generate and share secure symmetric encryption keys, reducing the vulnerabilities associated with publickeyinfrastructure (PKI) while operating with zero-trust principles. Stronger, simpler encryption. We have an exciting new opportunity for a Solution Architect/Defence & Government Specialist to join More ❯
have Expertise of relevant software development. Practical experience with cryptographic protocols, algorithms and standards. Experience with key injection, hardware root of trust, HSMs, PKI, DRM and designing secure systems. Experience implementing and integrating with secure RESTful Web Services. Experience with AWS security services such as KMS and ACM. Experience More ❯
drawings using AutoCAD & Visio Able to work flexible hours and provide on-call support Desirable Skills Experience with AAA, Tacacs+, Radius, and CA/PKI Experience with Voice over IP, Dial Services (Async/PPP, ISDN), Wireless services (CDMA, EVDO, GPRS, EDGE, 802.11b/g/n), Server Load-Balancing More ❯
of ForgeRock COTS based IAM solutions (PingGateway, PingAM, PingIDM, PingDS) with embedded security gates, HTTP header signing, access token and data at rest encryption, PKI based self-sovereign identity, or open source You may be assessed on the key critical skills relevant for success in role, such as risk More ❯
of ForgeRock COTS based IAM solutions (PingGateway, PingAM, PingIDM, PingDS) with embedded security gates, HTTP header signing, access token and data at rest encryption, PKI based self-sovereign identity, or open source You may be assessed on the key critical skills relevant for success in role, such as risk More ❯
Skills: Proven hands-on experience with ForgeRock stack : PingGateway, PingAM, PingIDM, PingDS Deep understanding of IAM protocols and security standards : OAuth2, OIDC, SSO, PKI, WebAuthn, biometrics Strong knowledge of Java keystore, PKCS#11, encryption, token signing , and secure microservices 10+ years of coding experience in Java, JavaScript or Python Experience More ❯
Highly desirable skills include: Experience configuring, deploying, and operating ForgeRock IAM solutions (PingGateway, PingIDM, etc.) with embedded security features like header signing, token encryption, PKI-based identity, or open source solutions. This role will be based in our London office. Purpose of the role To develop, implement, and maintain solutions More ❯