5 of 5 Remote/Hybrid Key Management Jobs in London

Lead PKI Engineer - Fully remote - Excellent opportunity

Hiring Organisation
Cyber Talent Limited
Location
City of London, London, United Kingdom
Employment Type
Permanent, Work From Home
lead the strategy, architecture and ongoing development of the organisations PKI, working closely with engineering and security teams to deliver secure, scalable cryptographic services. Key areas of ownership include: PKI strategy and architecture Certificate Authority (CA) design and key ceremonies HSM deployment and lifecycle management Secure keymanagement and PKI policies Governance, compliance and best practice alignment Experience Required Experience in PKI or cryptography-focused roles Proven experience in a senior or lead PKI engineering position Strong knowledge of PKI architecture and CA management Deep understanding of cryptography principles and standards Hands-on experience with ...

Security Architect

Hiring Organisation
Experis
Location
Croydon, London, United Kingdom
Employment Type
Contract
Contract Rate
£800 - £820/day
defence-in-depth strategies Lead security design for cloud-based solutions (AWS, Azure, and/or GCP) Architect and govern identity and access management (IAM) , including authentication, authorisation, and privileged access Design secure network architectures covering encryption, key management, and secure connectivity Embed application security principles , including … patterns Hands-on experience designing security for cloud platforms (AWS, Azure, and/or GCP) Deep knowledge of IAM , authentication, authorisation, and privileged access management Strong background in network security , encryption, and key management Experience with application security , including threat modelling and secure data flows Ability ...

Information Security and Compliance Engineer

Hiring Organisation
Engineered Arts
Location
London Area, United Kingdom
scales globally. This is a hands-on role with clear operational ownership of information security BAU, working closely with engineering, DevOps and IT, product management, and external auditors. This job can be worked remotely with bi-monthly visits to the London (Farringdon) office Key Responsibilities Information Security … ISMS Operations Implement, operate, and maintain the Information Security Management System (ISMS) aligned to ISO 27001. Maintain risk assessments, risk registers, Statements of Applicability, and control mappings. Collect, manage, and present evidence for ISO 27001 certification and surveillance audits. Support SOC 2 readiness, control operation, evidence gathering, and audit ...

Application Security & Controls Specialist (DORA Programme)

Hiring Organisation
Salt
Location
London, United Kingdom
Employment Type
Contract, Work From Home
Contract Rate
€600 - €800 per day
this role, you will contribute to the definition, rollout, and continuous improvement of security capabilities in domains such as software supply chain security, SBOM management, security code review, data classification, database encryption, cryptography policy implementation, and code integrity management. To achieve this, you will work closely with multi-functional … security risk assessment, application security, or security governance. Strong expertise in at least several of the following areas: Software Supply Chain Security SBOM management Code integrity and build pipeline security SAST/DAST/code analysis/ASPM (Application Security Posture Management) Data classification Database encryption & key ...

Solution Architect Data and Systems Inside IR35

Hiring Organisation
Interact Consulting Limited
Location
South West London, London, United Kingdom
Employment Type
Contract, Work From Home
Phase 2 delivery programme. There's strong potential for this to evolve into a 12-month engagement focused on remediation and solution delivery. Key Responsibilities Lead architectural discovery across systems, integrations, data flows, and dependencies. Document current-state architecture and define target-state options, balancing trade-offs in security … Establish NFR baselines (availability, performance, resilience, observability, RTO/RPO, and cost). Define and document security architecture posture (Entra ID/OIDC, encryption, key management, network zoning, data protection). Produce a high-level design (HLD) with C4 diagrams, threat model (e.g., STRIDE), privacy/data handling ...