Manchester Start Date: ASAP End Date: 31st December Rate: £450 per day - PAYE via Umbrella Only As a minimum, we require the following: Recent hands-on experience in HSM Management for vendors such as Thales, Entrust, and Gemalto (or other HSM vendors) Proficiency in HSM Monitoring tools. Automation skills. Coding expertise, including Python or other relevant coding tools. Additionally … per week. Overall purpose of role: Undertake all team activities in line with client wider strategy, Crypto strategy and departmental goals. Ensure the integrity and availability of cryptographic and keymanagement services to business functions and applications. Maintain accurate environment documentation, process and device categorisation. Provide ongoing assurance that risk and compliance requirements are being conducted to a … satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and keymanagement services More ❯
Manchester Start Date: ASAP End Date: 31st December Rate: £450 per day - PAYE via Umbrella Only As a minimum, we require the following: Recent hands-on experience in HSM Management for vendors such as Thales, Entrust, and Gemalto (or other HSM vendors) Proficiency in HSM Monitoring tools. Automation skills. Coding expertise, including Python or other relevant coding tools. Additionally … per week. Overall purpose of role: Undertake all team activities in line with client wider strategy, Crypto strategy and departmental goals. Ensure the integrity and availability of cryptographic and keymanagement services to business functions and applications. Maintain accurate environment documentation, process and device categorisation. Provide ongoing assurance that risk and compliance requirements are being conducted to a … satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and keymanagement services More ❯
requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be … responsible for the technical content of client deliverables, for example. Security Management Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test Schedules and Reporting Penetration Test Remedial Action Plans Managing Risk Appetite and Risk Analysis Assessments Support the Sales and Business Development team in winning work through the generation of proposals and support … conferences, symposia, and trade shows. Lead Cyber security related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering KeyManagement in accordance with agreed management plans. Assist in the further development of the Synoptix Cyber security capability. Skills Required: Essential: Knowledge of Secure by Design principles More ❯