RHEL, Alma and some legacy CentOS Core internet applications protocols DHCP/DNS Monitoring Systems Icinga2/Elastic Stack/InfluxDB/Grafana Application and network security best practices SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases PostgreSQL/MySQL CI/CD and DevOps Tools/principles About Us Gigaclear More ❯
RHEL, Alma and some legacy CentOS Core internet applications protocols – DHCP/DNS Monitoring Systems – Icinga2/Elastic Stack/InfluxDB/Grafana Application and network security best practices – SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases – PostgreSQL/MySQL CI/CD and DevOps Tools/principles About Us Gigaclear More ❯
field Be experienced in IT or software development roles Possess a strong understanding of IT infrastructure, network protocols, and IT security principle Have experience with Windows Server, virtual desktops, SSH, cloud-based management tools, Jira, Confluence, GitHub, and BI reporting tools THE COMPANY: We manufacture top of the range products from office printers, to industrial machining centres. We have won More ❯
field · Be experienced in IT or software development roles · Possess a strong understanding of IT infrastructure, network protocols, and IT security principle · Have experience with Windows Server, virtual desktops, SSH, cloud-based management tools, Jira, Confluence, GitHub, and BI reporting tools THE COMPANY: We manufacture top of the range products from office printers, to industrial machining centres. We have won More ❯
field · Be experienced in IT or software development roles · Possess a strong understanding of IT infrastructure, network protocols, and IT security principle · Have experience with Windows Server, virtual desktops, SSH, cloud-based management tools, Jira, Confluence, GitHub, and BI reporting tools THE COMPANY: We manufacture top of the range products from office printers, to industrial machining centres. We have won More ❯
field · Be experienced in IT or software development roles · Possess a strong understanding of IT infrastructure, network protocols, and IT security principle · Have experience with Windows Server, virtual desktops, SSH, cloud-based management tools, Jira, Confluence, GitHub, and BI reporting tools THE COMPANY: We manufacture top of the range products from office printers, to industrial machining centres. We have won More ❯
field · Be experienced in IT or software development roles · Possess a strong understanding of IT infrastructure, network protocols, and IT security principle · Have experience with Windows Server, virtual desktops, SSH, cloud-based management tools, Jira, Confluence, GitHub, and BI reporting tools THE COMPANY: We manufacture top of the range products from office printers, to industrial machining centres. We have won More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Investigo
the operations, aligning with the Crypto strategy and wider departmental goals. Key Responsibilities Manage cryptographic hardware (HSMs - Thales, Entrust, Gemalto, etc.), including installation, configuration, and on-site activities Perform SSH key and certificate management Support cryptographic key lifecycle activities: generation, distribution, storage, recovery, and deletion Maintain accurate documentation and perform regular risk and compliance checks Handle incident, problem, and change More ❯
following: - Various distros and their corresponding package management tools - Permissions and permissions management - System logging and auditing - Log parsing using grep, awk, sed, cut, tr, etc - Remote access via ssh - Knowledge of procfs & sysfs - Linux tools (ip, ifconfig, netstat, tcpdump, strace, netcat, ping, telnet, etc) - System Monitoring Tools (top, stat tools, etc) - DNS and tools (bind, host, dig, nslookup, etc More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
in Knutsford . Key Responsibilities Manage and configure HSMs (Thales, Entrust, Gemalto or similar) Monitor HSM health using appropriate tools Automate cryptographic processes using Python or other scripting languages SSH key and certificate lifecycle management Generate key components across IBM, Tandem, Unix platforms Support incident, change, and problem management (ITIL-aligned) Maintain accurate documentation and audit trails Collaborate with stakeholders More ❯
Coventry, West Midlands, England, United Kingdom Hybrid / WFH Options
Lorien
understanding of Group Policy, DNS, DHCP Microsoft Exchange Server administration experience Excellent troubleshooting skills across Windows-based applications Familiarity with core protocols: TCP/IP, FTP, HTTP(S), SMTP, SSH, Telnet, TLS/SSL, SNMP Experience working within an ITIL framework The Benefits: Salary up to £66,200 (12-month FTC) Hybrid working model (1 day onsite in Coventry) Discretionary More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Stealth IT Consulting
onsite in Manchester a week Clearance: BPSS Must have Java and Node experience Key Responsibilities Design, develop, and maintain software solutions using Java, Node.js, and TypeScript. Write efficient and secureShell Scripts to support automation and system tasks. Work within a Linux environment to deploy, troubleshoot, and optimize applications. Collaborate with cross-functional teams to gather requirements and deliver high More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Stealth IT
will work on developing and maintaining software applications, ensuring scalability, performance, and reliability. Key Responsibilities Design, develop, and maintain software solutions using Java, Node.js, and TypeScript. Write efficient and secureShell Scripts to support automation and system tasks. Work within a Linux environment to deploy, troubleshoot, and optimize applications. Collaborate with cross-functional teams to gather requirements and deliver high More ❯
design Deep expertise in RBAC and ABAC models Strong understanding of on-premises hosting environments Hands-on experience with Windows, Linux, Solaris, and AIX Familiarity with Active Directory, LDAP, SSH key management, and service account governance Proficiency with PAM tools such as CyberArk, BeyondTrust, Delinea Knowledge of identity federation and authentication protocols (Kerberos, SAML, OAuth) Exceptional analytical, documentation, and presentation More ❯
Blackburn, Lancashire, North West, United Kingdom Hybrid / WFH Options
Chubb Fire & Security Limited
following skills/experience are an advantage: Software development (C++, MVC (Web Development), Video Management Systems) Microsoft Windows Server Operating system SQL Database servers (Firebird, MySQL, SQLite) Security technologies (SSH, SSL, HTTPS, AES) We are keen to speak with Senior Developers who are based within commutable distance to our Blackburn HQ including Manchester, Preston, Burnley, Blackpool, Clitheroe, Bolton, Chorley. More ❯
with business logic, we want to hear from you. Responsibilities Manage and support Hardware Security Modules (HSMs) and associated key management processes. Contribute to secure cryptographic practices including PKI, SSH, symmetric/asymmetric encryption. Assist with application connectivity and infrastructure related to secure traffic flow and encryption. Perform or support secure key ceremonies and data centre activities. Collaborate closely with More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
The Cryptographic Operations Specialist supports secure, compliant, and reliable cryptographic and key management services across the organization. This includes managing cryptographic infrastructure (e.g., HSMs), key lifecycle activities, certificate and SSH key management, and maintaining risk and compliance standards. Key Responsibilities: Manage cryptographic infrastructure (HSMs, key generation/distribution, SSH keys, certificates). Support cryptographic operations across platforms (IBM, Tandem, Unix More ❯