Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Investigo
the operations, aligning with the Crypto strategy and wider departmental goals. Key Responsibilities Manage cryptographic hardware (HSMs - Thales, Entrust, Gemalto, etc.), including installation, configuration, and on-site activities Perform SSH key and certificate management Support cryptographic key lifecycle activities: generation, distribution, storage, recovery, and deletion Maintain accurate documentation and perform regular risk and compliance checks Handle incident, problem, and change More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
in Knutsford . Key Responsibilities Manage and configure HSMs (Thales, Entrust, Gemalto or similar) Monitor HSM health using appropriate tools Automate cryptographic processes using Python or other scripting languages SSH key and certificate lifecycle management Generate key components across IBM, Tandem, Unix platforms Support incident, change, and problem management (ITIL-aligned) Maintain accurate documentation and audit trails Collaborate with stakeholders More ❯
Coventry, West Midlands, England, United Kingdom Hybrid / WFH Options
Lorien
understanding of Group Policy, DNS, DHCP Microsoft Exchange Server administration experience Excellent troubleshooting skills across Windows-based applications Familiarity with core protocols: TCP/IP, FTP, HTTP(S), SMTP, SSH, Telnet, TLS/SSL, SNMP Experience working within an ITIL framework The Benefits: Salary up to £66,200 (12-month FTC) Hybrid working model (1 day onsite in Coventry) Discretionary More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Stealth IT Consulting
onsite in Manchester a week Clearance: BPSS Must have Java and Node experience Key Responsibilities Design, develop, and maintain software solutions using Java, Node.js, and TypeScript. Write efficient and secureShell Scripts to support automation and system tasks. Work within a Linux environment to deploy, troubleshoot, and optimize applications. Collaborate with cross-functional teams to gather requirements and deliver high More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Stealth IT
will work on developing and maintaining software applications, ensuring scalability, performance, and reliability. Key Responsibilities Design, develop, and maintain software solutions using Java, Node.js, and TypeScript. Write efficient and secureShell Scripts to support automation and system tasks. Work within a Linux environment to deploy, troubleshoot, and optimize applications. Collaborate with cross-functional teams to gather requirements and deliver high More ❯
Blackburn, Lancashire, North West, United Kingdom Hybrid / WFH Options
Chubb Fire & Security Limited
following skills/experience are an advantage: Software development (C++, MVC (Web Development), Video Management Systems) Microsoft Windows Server Operating system SQL Database servers (Firebird, MySQL, SQLite) Security technologies (SSH, SSL, HTTPS, AES) We are keen to speak with Senior Developers who are based within commutable distance to our Blackburn HQ including Manchester, Preston, Burnley, Blackpool, Clitheroe, Bolton, Chorley. More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
CyberArk On-Prem & SaaS solution. Knowledge of Active Directory, Unix and Windows Systems and network protocols. Should have hands-on experience in scanning of servers for private and public ssh key via CyberArk DNA tool. Experience in analysing Use Cases, Functional Specification, Knowledge Transfers, Technical Design. Strong Application Debugging and problem-solving skills. Experience in Onboarding various platform accounts in More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
The Cryptographic Operations Specialist supports secure, compliant, and reliable cryptographic and key management services across the organization. This includes managing cryptographic infrastructure (e.g., HSMs), key lifecycle activities, certificate and SSH key management, and maintaining risk and compliance standards. Key Responsibilities: Manage cryptographic infrastructure (HSMs, key generation/distribution, SSH keys, certificates). Support cryptographic operations across platforms (IBM, Tandem, Unix More ❯