with regulatory standards. The ideal candidate is a strategic thinker with deep expertise in security assurance, audit, and cloud security, and a passion for advancing Web3 and blockchain technologies. Key Responsibilities Design, conduct, and implement testing of security controls for identity management, keymanagement, and infrastructure (network and cloud) configurations. Support client assurance by preparing responses … platform. Requirements Minimum of 8 years of experience in security assurance, audit, compliance, or cloud security engineering. Proven expertise in testing and validating security controls across Identity and Access Management (IAM), keymanagement, and network/cloud environments. Strong understanding of IAM principles and their application in secure systems. In-depth knowledge of cryptographic keymanagement, Hardware Security Modules (HSMs), and KeyManagement Systems (KMS). Solid understanding of cloud and network security architecture and configurations. Demonstrated experience supporting external audits and assessments, such as SOC 1, SOC 2, ISO 27001, or PCI DSS. Hands-on experience with major cloud platforms (AWS, GCP, Azure) and infrastructure-as-code practices. Proficiency in preparing client More ❯
with regulatory standards. The ideal candidate is a strategic thinker with deep expertise in security assurance, audit, and cloud security, and a passion for advancing Web3 and blockchain technologies. Key Responsibilities Design, conduct, and implement testing of security controls for identity management, keymanagement, and infrastructure (network and cloud) configurations. Support client assurance by preparing responses … platform. Requirements Minimum of 8 years of experience in security assurance, audit, compliance, or cloud security engineering. Proven expertise in testing and validating security controls across Identity and Access Management (IAM), keymanagement, and network/cloud environments. Strong understanding of IAM principles and their application in secure systems. In-depth knowledge of cryptographic keymanagement, Hardware Security Modules (HSMs), and KeyManagement Systems (KMS). Solid understanding of cloud and network security architecture and configurations. Demonstrated experience supporting external audits and assessments, such as SOC 1, SOC 2, ISO 27001, or PCI DSS. Hands-on experience with major cloud platforms (AWS, GCP, Azure) and infrastructure-as-code practices. Proficiency in preparing client More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Plexus Resource Solutions Ltd
DevOps Engineer Web3/Applied Cryptography/KeyManagement Remote £120k-150k Plexus are partnering with a VC-backed Web3 company building private keymanagement and cryptographic infrastructure. Our client enables apps to deploy secure, user-friendly key systems that power next-generation decentralized use cases. They are seeking a Senior DevOps Engineer in the More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
their established team. Youll be instrumental in embedding security into every stage of the software development lifecycleguiding engineers, shaping best practices, and driving secure, scalable solutions across our platform. Key Responsibilities: Security Advisory : Serve as the go-to expert for application security across engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement : Promote … and implement secure development practices across CI/CD pipelines, secrets and keymanagement, dependency management, and secure design. Vulnerability Management : Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. Tooling & Automation : Integrate security tools (e.g., SAST, DAST, SCA, secrets scanning) into developer workflows, ensuring automation is both scalable … Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secrets management, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis, and container More ❯