London, England, United Kingdom Hybrid / WFH Options
Sky
Design, build, and operate PKI solutions and environments. Manage Certificate Authority Administration, including Certificate Enrolment Web Service & Policy Web Service, and monitor Active Directory Certificate Services (ADCS). Manage KeyManagement Systems (KMS) to ensure robust cryptographic key security. Support and manage the PKI and Certificate deployment, automation, and Thales HSMs. Understand existing certificate use-cases and … of the PKI managed service for Sky and Comcast users, including certificate checks, issuing, and revoking. Work with App Service managed certificates, private and public certificates, and certificates from Key Vault. What You'll Bring Technical and professional leadership across the discipline. Deep knowledge of Information and/or Cyber Security, understanding of cybersecurity principles, practices, and frameworks like … with Certificate Authority Administration, ADCS monitoring. Familiarity with Data-in-motion and Data-at-rest Encryption techniques. Knowledge of PKI machine identity technologies like SSH, SSL, TLS. Experience managing KeyManagement Systems (KMS). Beneficial experience with PKI and Certificate deployment automation and Thales HSMs. Team Overview Cyber Security Our products, platforms, and technologies are constantly evolving. Protecting More ❯
London, England, United Kingdom Hybrid / WFH Options
CLS-Group
to remediation plans, producing regular reporting at relevant levels confirming direction of travel of risk improvement or decline. Collaborate with security and IT teams on monitoring vulnerability and patch management progress against standards and controls guidelines, with oversight of remediation and timing to reduce risk to an acceptable level. Direct, coach and rollout training for team to understanding security … and security artefacts that support multiple internal and external audits and regulatory requirements. Stay updated on advancements in security technologies, policies, and regulatory changes, recommending and implementing necessary improvements. Key member of the function who regularly reviews Security Policies, Standards and Controls and optimize position on areas associated to regulations and company strategy. Integrate processes with Cyber Threat Intelligence … to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies, aligning to a 3 lines of defence model and enforcing alignment of risk taxonomy to organizational cybersecurity risk management processes, procedures and activities are identified across all security functions. Leadership Leads by More ❯
London, England, United Kingdom Hybrid / WFH Options
State Street
Who we are looking for State Street is seeking an experienced Cryptographic Key Operations Lead to oversee the end-to-end lifecycle management of cryptographic keys across cloud, on-premises, infrastructure and IoT environments. This role ensures the secure generation, distribution, rotation, revocation, and retirement of encryption keys while maintaining compliance with regulatory and security policies. Additionally, the … Key Operations Lead will manage and mentor a team of KeyManagement Engineers, driving operational excellence and automation to enhance key lifecycle processes. This role requires close collaboration with security, IT, cloud, infrastructure, and application teams to maintain the availability, reliability, and security of keymanagement services, supporting business-critical operations and financial transactions. … model, where you can balance work from home and office to match your needs and role requirements. What you will be responsible for Lead and manage a team of KeyManagement Engineers, providing guidance, mentoring, and technical leadership to ensure effective cryptographic key lifecycle management. Oversee the daily operations and security of cryptographic keymanagementMore ❯
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
NextEnergy Group
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
London, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including: Security Command Center VPC Service Controls IAM (Identity & Access Management) Cloud Logging and Monitoring Workload Identity Federation Automate security response using Python, Terraform, or XSOAR. Collaborate with infrastructure and DevOps teams to embed security into CI/CD pipelines … Experience as SOC lead, cyber operations manager, or similar role. Hands-on experience in securing Google Cloud Platform (GCP) environments across multiple projects/accounts. Strong expertise in: SIEM management (Chronicle, Splunk, Elastic) Incident response and recovery Security orchestration (SOAR), preferably Chronicle + XSOAR IAM, policy enforcement, logging, and access reviews in GCP Proven experience working in FinTech or … OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and KeyManagement Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. Influence More ❯
London, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including: Security Command Center VPC Service Controls IAM (Identity & Access Management) Cloud Logging and Monitoring Workload Identity Federation Automate security response using Python, Terraform, or XSOAR. Collaborate with infrastructure and DevOps teams to embed security into CI/CD pipelines … Experience as SOC lead, cyber operations manager, or similar role. Hands-on experience in securing Google Cloud Platform (GCP) environments across multiple projects/accounts. Strong expertise in: SIEM management (Chronicle, Splunk, Elastic) Incident response and recovery Security orchestration (SOAR), preferably Chronicle + XSOAR IAM, policy enforcement, logging, and access reviews in GCP Proven experience working in FinTech or … OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and KeyManagement Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. Influence More ❯
London, England, United Kingdom Hybrid / WFH Options
Doit Intl
and SageMaker Pipelines. Proficiency in monitoring and maintaining AI systems with Amazon CloudWatch and SageMaker Model Monitor. AI Governance and Security: Strong understanding of AI governance, incorporating IAM, AWS KeyManagement Service (KMS), and compliance frameworks. Knowledgeable in AI ethics, bias detection, and accountability using tools like SageMaker Clarify. Emerging AI Trends: Up-to-date on Generative AI More ❯
London, England, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
on-site) Contract :06 months (with possibility of extension) Job Description: The PKI Migration Technical Lead will be responsible for leading the migration of Microsoft and Digicert Public Key Infrastructure (PKI) solutions. This role involves overseeing the planning and implementation of PKI migration projects, ensuring that all security and compliance requirements are met. The Technical Lead will work closely … with various stakeholders, including IAM, security, and business teams, to ensure a smooth and secure migration process. Key Responsibilities: Lead the planning and implementation of the Micorosoft and Digicert PKI migration project. Ensure compliance with security policies and standards. Collaborate with IAM, security, and business teams to gather requirements and develop migration strategies. Oversee the configuration and deployment of … Develop and maintain documentation related to PKI migration processes and procedures. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. 5+ years of experience in management and migration of Microsoft and Digicert PKI solutions. Strong understanding of PKI concepts, digital certificates, encryption algorithms, and keymanagement practices. Experience in M&A projects. Knowledge More ❯
London, England, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
the evolving world of cloud, digital and platforms. Role purpose/summary The PKI Migration Technical Lead will be responsible for leading the migration of Microsoft and Digicert Public Key Infrastructure (PKI) solutions. This role involves overseeing the planning and implementation of PKI migration projects, ensuring that all security and compliance requirements are met. The Technical Lead will work … closely with various stakeholders, including IAM, security, and business teams, to ensure a smooth and secure migration process. Key Responsibilities: Lead the planning and implementation of the Microsoft and Digicert PKI migration project. Ensure compliance with security policies and standards. Collaborate with IAM, security, and business teams to gather requirements and develop migration strategies. Oversee the configuration and deployment … Develop and maintain documentation related to PKI migration processes and procedures. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. 5+ years of experience in management and migration of Microsoft and Digicert PKI solutions. Strong understanding of PKI concepts, digital certificates, encryption algorithms, and keymanagement practices. Experience in M&A projects. Knowledge More ❯
a comparable senior leadership role within a technology-driven organization Deep expertise in blockchain technologies, ideally staking mechanisms and consensus algorithms Background in on-premise infrastructure design, implementation, and management, with expert knowledge of data center technologies, virtualization, server hardware, and networking Expertise in data engineering, including the design and deployment of scalable data pipelines, data warehousing solutions, and … integration strategies In-depth understanding of cryptographic principles and secure keymanagement practices Familiarity with infrastructure cybersecurity principles and best practices for securing distributed systems A consistent track record of successfully delivering complex, infrastructure-focused technology solutions on time and within budget fast-paced environment What makes you stand out: Extensive experience with cloud computing platforms (AWS, Azure More ❯
London, England, United Kingdom Hybrid / WFH Options
Stott and May
Responsibilities: Drive, develop, and contribute to a Cryptography Operations roadmap and strategy Enhance cryptographic capabilities through in-house and partner integrations Implement and manage cryptographic keys Oversee cryptography and keymanagement processes Facilitate onboarding of new services and manage existing ones Lead secure key storage implementation Establish cryptography processes across the team Manage lifecycle of cryptographic keys … including reviews and replacements Collaborate with Cyber and InfoSec teams to integrate keymanagement practices Lead Cryptography Engineer – Technical Skills: Experience with key handling, segregation of duties, and split knowledge in cryptography Understanding of software delivery pipelines and automation of keymanagement Knowledge of responding to cryptography incidents Familiarity with HSM technologies, especially Thales, or More ❯
London, England, United Kingdom Hybrid / WFH Options
NextEnergy Group
Architect, you will define the security vision and implement secure-by-design principles across all organizational layers — from Operational Technology networks in the field to corporate business systems. A key aspect of this role involves collaboration with: Data Protection Officer (DPO): integrating privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: translating architecture patterns into robust, monitored … and recoverable configurations External security advisors & key technology suppliers: aligning architectural controls with best practices and supply chain security requirements This strategic yet practical role requires balancing security principles with delivery across cloud, on-premises, and SaaS environments. Key Responsibilities Develop and evolve enterprise security architecture standards covering IT, OT, and hybrid-cloud environments Incorporate security & privacy requirements … modeling, risk assessments, and security analyses for new projects and platforms Lead architecture on secure network topologies, including segmentation and zero-trust models Define standards for IAM, encryption, secrets management, and keymanagement aligned with ISO 27001/27019 and NIS2 Evaluate and select third-party security solutions and conduct vendor due diligence Serve as SME for More ❯
in bridging the gap between development, security, and operations. This is an individual contributor role, where you will spearhead initiatives and guide the team on best practices without direct management responsibilities. Key Responsibilities: Design, implement, and maintain secure cloud infrastructure in GCP. Develop and manage infrastructure as code (Terraform, Kubernetes) to ensure repeatable, scalable, and secure environments. Automate … workflows, build scripts, and operational tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as keymanagement, vulnerability scanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration and delivery (CI/CD … depth knowledge of DevSecOps tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerability scanning, encryption, authentication, and secrets management (Vault, KeyManagement Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when working as part of a team More ❯
London, England, United Kingdom Hybrid / WFH Options
La Fosse
including from their London DC to Frankfurt). What you'll do: Design secure, scalable AWS cloud infrastructure Terraform, CI/CD). Lead on platform security: zero trust, keymanagement, secure SDLC. Drive observability, performance, and reliability across the stack. Champion security and compliance (PCI DSS, SOC2, ISO 27001). Support migrations, decommissioning, and cost/performance More ❯
London, England, United Kingdom Hybrid / WFH Options
Stott and May
Day Rate: TBC – Market rate for this type of role Location: Hybrid working – Some availability to work in London or Yorkshire offices advantageous Senior Cryptography Engineer – Responsibilities: Cryptography and KeyManagement Facilitate the adoption and use of cryptographic capabilities Contribute to implementing and operationalising secure key storage mechanisms Assist with the implementation of cryptography processes across the … team Enable the build of secure products Support ongoing audit and assurance activities around key protection standards Work with the Platform Team in building pipelines (cryptography operations) Key generation and distribution Close collaboration with Cyber and InfoSec teams - integrating keymanagement practices Senior Cryptography Engineer – Technical Skills: Experience in key handling, segregation of duties Detailed … knowledge and understanding of how to respond to cryptography incidents Previous experience working within a Cryptographic team Certificate Management Solid understanding of HSM technologies & Thales; other similar technologies are acceptable HashiCorp Vault experience Solid grasp of various types of encryption, including file/folder level, database, and application encryption Communication, problem-solving, documentation, and presentation skills Knowledge of security More ❯
London, England, United Kingdom Hybrid / WFH Options
Sanderson
Support innovation by adopting new cryptographic technologies. Collaborate with development and security teams to align cryptographic solutions with business goals and compliance requirements. Develop and maintain Identity and Access Management solutions. Skills and Experience Extensive experience in Cyber Security Engineering and DevSecOps environments. Experience with Hardware Security Modules (HSM), AWS Secrets Manager, certificate management, and automating security workflows. … Proficiency with GitLab CI/CD, AWS CLI, Chef, and cloud security controls. Strong knowledge of cryptographic protocols, secure keymanagement, threat modeling, and security operations. Additional Details Seniority level: Mid-Senior level Employment type: Full-time Job function: Information Technology Referrals can increase your chances of interview success. Get notified about similar roles in the London area. More ❯
London, England, United Kingdom Hybrid / WFH Options
Ascertia
customer success Communicating new release information and ensuring upgrade processes are planned and executed seamlessly Directing and assisting the Support team where required with upgrade processes or for other key routine items Ensuring that inbound support requests are clearly defined, categorised and prioritised, in collaboration with support teams in other geographies Ensuring good response times and close communication while … solving mentality – for high priority customers and partners there may be an occasional requirement to assist the Extended Support team in handling complex issues and need careful nurturing and management Providing training as needed to customers and partners (LMS will replace this need) Validating, documenting and logging of enhancement requests coming from clients and partners Working with appropriate teams … to ensure that (a) architecture and deployment guides, (b) training slides and (c) any other useful materials are updated and maintained Hosting scheduled calls and remote sessions with key customer and partner accounts to assist and maintain service calls, provide further advice, guidance where needed Learning and understanding Ascertia’s products, PKI, and key regulations including EU eIDAS More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
will safeguard the Business by uncovering exploits, architecting robust defences, and collaborating with teams to thwart sophisticated reverse engineers. Within the fraud site defence team, you will be a key defender at the forefront of our security drive. You will not only confront sophisticated hackers and reverse engineers, but also shape and drive the security evolution of our web … ensuring robust data integrity and innovative client hardening. In addition to your technical acumen, your track record in leading security initiatives and mentoring junior team members will play a key role in fostering a proactive security culture. Preferred Skills, Qualifications and Experience Demonstrated mastery in securing web client platforms, including advanced threat modelling and the design of sophisticated anti … anti-tamper and defence systems. Demonstrated experience in architecting and implementing advanced security features, anti-tamper and robust defence mechanisms. Strong understanding of cryptography, encryption algorithms, hashing, and secure keymanagement practices. Passionate for uncovering vulnerabilities and staying ahead of potential attackers. Creative approach to security challenges, with a relentless drive to stay ahead of emerging threat landscapes. More ❯
Hounslow, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
will safeguard the Business by uncovering exploits, architecting robust defences, and collaborating with teams to thwart sophisticated reverse engineers. Within the fraud site defence team, you will be a key defender at the forefront of our security drive. You will not only confront sophisticated hackers and reverse engineers, but also shape and drive the security evolution of our web … ensuring robust data integrity and innovative client hardening. In addition to your technical acumen, your track record in leading security initiatives and mentoring junior team members will play a key role in fostering a proactive security culture. Preferred Skills, Qualifications and Experience Demonstrated mastery in securing web client platforms, including advanced threat modelling and the design of sophisticated anti … anti-tamper and defence systems. Demonstrated experience in architecting and implementing advanced security features, anti-tamper and robust defence mechanisms. Strong understanding of cryptography, encryption algorithms, hashing, and secure keymanagement practices. Passionate for uncovering vulnerabilities and staying ahead of potential attackers. Creative approach to security challenges, with a relentless drive to stay ahead of emerging threat landscapes. More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
narrow-right Job Views: 1 Posted: 23.05.2025 Expiry Date: 07.07.2025 col-wide Job Description: Who we are looking for Within the fraud site defence team, you will be a key defender at the forefront of our security battle on our Web platform. You will face sophisticated hackers daily by uncovering and analysing exploits, vulnerabilities and automation mechanisms. You will … virtualisation and bytecode interpreter. Expertise in web development, with additional exposure to native app security to enable cross-platform solutions. Strong knowledge of cryptography, encryption algorithms, hashing and secure keymanagement practices. Passionate for uncovering vulnerabilities and staying ahead of potential attackers. Proven ability to work effectively with cross-functional teams, to translate complex security challenges into actionable More ❯
Hounslow, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
narrow-right Job Views: 6 Posted: 06.06.2025 Expiry Date: 21.07.2025 col-wide Job Description: Who we are looking for Within the fraud site defence team, you will be a key defender at the forefront of our security battle on our Web platform. You will face sophisticated hackers daily by uncovering and analysing exploits, vulnerabilities and automation mechanisms. You will … virtualisation and bytecode interpreter. Expertise in web development, with additional exposure to native app security to enable cross-platform solutions. Strong knowledge of cryptography, encryption algorithms, hashing and secure keymanagement practices. Passionate for uncovering vulnerabilities and staying ahead of potential attackers. Proven ability to work effectively with cross-functional teams, to translate complex security challenges into actionable More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
will safeguard the Business by uncovering exploits, architecting robust defences, and collaborating with teams to thwart sophisticated reverse engineers. Within the fraud site defence team, you will be a key defender at the forefront of our security battle on our Android platform. You will face sophisticated hackers by uncovering and analysing exploits, vulnerabilities and cheat mechanisms. In response, you … architecting and implementing advanced security features, anti-tamper and robust defence mechanisms. Experience in Android development. Strong knowledge of cryptography and an understanding of encryption algorithms, hashing and secure keymanagement practices. Passionate about uncovering vulnerabilities and staying ahead of potential attackers. Proven ability to work effectively with cross-functional teams to translate complex security challenges into actionable More ❯