Key Management Jobs in London

26 to 50 of 75 Key Management Jobs in London

HEAD OF SYSTEMS INTEGRATION- AEROSPACE AND DEFENSE:

London, England, United Kingdom
Gentrian
lost, all confidential sensitive and necessary data falls in the high risk category. Areas to cover will include : Create and label data classification metrics as functional mirror for risk management, compliance, and Security teams. Automate discovery and actions- Areas to cover will include:( Automate policies in place and decide what should happen to data base on the sensitivity). … source):Policy kicks-in automatically encrypted base on the sensitivity.Embed different layers of encryption for different types of data. AREAS TO IMPROVE-(ESTABLISH A ADMINISTRATIVE LIFE CYCLE HIERARCHIC CRYPTOGRAPHIC KEY PROTOCOL): Embed HSM and secure zone for key generation, This will ensure sensitive operational support and other related operations after using protocols and technologies for proven security. Areas … where matters requires attention will include: key encryption, verifiable secret splitting and sharing key distribution, key storage and backup, Identitymanagement, access control, key management at the edge-Generating, using, storing, archiving, deleting, and protection of the encryption keys at the edge. INCIDENTS RESPONSE- (Establish a incident reporting lines and Disaster recovery plans in conformity defined More ❯
Posted:

Senior Escalation Engineer- FortiDLP- London

London, England, United Kingdom
Fortinet
to assist others with future debugging and contribute supportability enhancement requests for our program of ongoing product improvement become a specialist in our Data Loss Prevention and Insider Risk Management solution, and be able to provide expert advice to our customers and partners We Are Looking For: An insightful and influential collaborator to join our team. We encourage you … domain administration Working knowledge of Linux and associated tools A practical understanding of how data is protected at rest and in transit, including the particulars of TLS, PKI, encryption, key management, identity management and RBAC Experience with Kubernetes, Google Cloud, or Amazon Web Services (AWS) is a plus Why Join Us: At Fortinet, we embrace diversity and More ❯
Posted:

Chief Technology Officer

London, United Kingdom
Hybrid / WFH Options
Crypto UK
a comparable senior leadership role within a technology-driven organization Deep expertise in blockchain technologies, ideally staking mechanisms and consensus algorithms Background in on-premise infrastructure design, implementation, and management, with expert knowledge of data center technologies, virtualization, server hardware, and networking Expertise in data engineering, including the design and deployment of scalable data pipelines, data warehousing solutions, and … integration strategies In-depth understanding of cryptographic principles and secure key management practices Familiarity with infrastructure cybersecurity principles and best practices for securing distributed systems A consistent track record of successfully delivering complex, infrastructure-focused technology solutions on time and within budget fast-paced environment What makes you stand out: Extensive experience with cloud computing platforms (AWS, Azure More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Data Security Engineer

London, England, United Kingdom
Spencer Rose
encryption, access controls, and data masking. Manage data encryption solutions to ensure the confidentiality and integrity of sensitive data. Collaborate across the Security Team to develop and deliver encryption key management processes and systems. Ensure security across the Data & Analytics technology stack, which includes Oracle tools, Snowflake, Postgres, and various AWS services (SageMaker, Lambda, Step Functions, DMS, S3 More ❯
Posted:

IT Security Solution Architect - Director

London, United Kingdom
The Boston Consulting Group GmbH
blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures-and business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the … You can successfully interface and connect with skilled technologists and non-technical stakeholders, including members of the C-suite Ability to work in an Agile environment leveraging strong work management, organizational and planning skills You have an ability to work as part of a geographically dispersed team bringing a sense of urgency to the tasks at hand Must have … for hybrid and multi-cloud environments Strong background in secure, software-defined networking and micro-segmentation Hands-on with modern engineering practices-Agile, DevSecOps, automated testing Familiarity with secrets management/certificate lifecycle automation Solid grasp of cryptographic key management and enterprise PKI operations Experience with Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platforms More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Data Security Engineer

London, England, United Kingdom
Spencer Rose Ltd
encryption, access controls, and data masking. Manage data encryption solutions to ensure the confidentiality and integrity of sensitive data. Work with the Security Team to develop and implement encryption key management processes and systems. Ensure security across the Data & Analytics technology stack, which primarily includes Oracle tools, Snowflake, Postgres, and various AWS services (SageMaker, Lambda, Step Functions, DMS More ❯
Posted:

Lead Cryptography Engineer

London, England, United Kingdom
Hybrid / WFH Options
Stott and May
Responsibilities: Drive, develop, and contribute to a Cryptography Operations roadmap and strategy Enhance cryptographic capabilities through in-house and partner integrations Implement and manage cryptographic keys Oversee cryptography and key management processes Facilitate onboarding of new services and manage existing ones Lead secure key storage implementation Establish cryptography processes across the team Manage lifecycle of cryptographic keys … including reviews and replacements Collaborate with Cyber and InfoSec teams to integrate key management practices Lead Cryptography Engineer – Technical Skills: Experience with key handling, segregation of duties, and split knowledge in cryptography Understanding of software delivery pipelines and automation of key management Knowledge of responding to cryptography incidents Familiarity with HSM technologies, especially Thales, or More ❯
Posted:

Security Sales Specialist

London, England, United Kingdom
JR United Kingdom
within the region. You will be responsible for the entire sales cycle, from pipeline generation and proposal leadership to closing deals, focusing on our comprehensive suite of security solutions. Key Responsibilities: Lead and orchestrate the creation of compelling, high-quality, security-focused proposals and responses to Requests for Proposals (RFPs). Leverage deep technical understanding across diverse cybersecurity domains … including Security Operations Centers (SOC), Endpoint Detection and Response (EDR), Governance, Risk & Compliance (GRC), network security (including firewalls), cloud security, Operational Technology (OT) security, and data security (encryption, DLP, key management). Revenue Generation & Customer Relationship Management: Develop and execute strategic sales plans to achieve revenue targets and expand our customer base within the assigned territory. Build … maintain, and nurture strong, long-lasting relationships with key stakeholders and decision-makers within target customer organizations. Proactively identify and pursue new business opportunities through various channels. Take ownership of key financial and sales performance metrics, including Total Contract Value (TCV), Annual Contract Value (ACV), sales funnel health, and pipeline development. Provide accurate forecasting and regular reporting on More ❯
Posted:

PKI Engineer

London, United Kingdom
Experis - ManpowerGroup
PKI Engineer Remote 5 months - extensions £720 per day inside ir35 - umbrella only Role overview: Lead the architecture, design, and operations of Public Key Infrastructure (PKI) solutions. Manage Hardware Security Modules (HSMs), ensuring secure cryptographic key management. Oversee the migration of legacy PKI to a modern replacement solution. Implement Public-Key Cryptography Standards (PKCS), chains of trust … and Certificate Signing Requests (CSRs). Collaborate with cybersecurity teams to integrate PKI into broader security architecture. Provide hands-on expertise with HSMs, ensuring compliance with security standards. Key Skills & Experience: Strong expertise in PKI architecture, operations, and security best practices. Hands-on experience with HSMs in enterprise environments. Deep knowledge of PKCS, certificate management, and trust models. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

PKI Engineer

City of London, London, United Kingdom
Experis
PKI Engineer Remote 5 months - extensions £720 per day inside ir35 - umbrella only Role overview: Lead the architecture, design, and operations of Public Key Infrastructure (PKI) solutions. Manage Hardware Security Modules (HSMs), ensuring secure cryptographic key management. Oversee the migration of legacy PKI to a modern replacement solution. Implement Public-Key Cryptography Standards (PKCS#11), chains of trust … and Certificate Signing Requests (CSRs). Collaborate with cybersecurity teams to integrate PKI into broader security architecture. Provide hands-on expertise with HSMs, ensuring compliance with security standards. Key Skills & Experience: Strong expertise in PKI architecture, operations, and security best practices. Hands-on experience with HSMs in enterprise environments. Deep knowledge of PKCS#11, certificate management, and trust models. More ❯
Employment Type: Contract
Rate: £720 - £721 per day
Posted:

Security & Information Security Architect

London, England, United Kingdom
Hybrid / WFH Options
NextEnergy Group
Architect, you will define the security vision and implement secure-by-design principles across all organizational layers — from Operational Technology networks in the field to corporate business systems. A key aspect of this role involves collaboration with: Data Protection Officer (DPO): integrating privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: translating architecture patterns into robust, monitored … and recoverable configurations External security advisors & key technology suppliers: aligning architectural controls with best practices and supply chain security requirements This strategic yet practical role requires balancing security principles with delivery across cloud, on-premises, and SaaS environments. Key Responsibilities Develop and evolve enterprise security architecture standards covering IT, OT, and hybrid-cloud environments Incorporate security & privacy requirements … modeling, risk assessments, and security analyses for new projects and platforms Lead architecture on secure network topologies, including segmentation and zero-trust models Define standards for IAM, encryption, secrets management, and key management aligned with ISO 27001/27019 and NIS2 Evaluate and select third-party security solutions and conduct vendor due diligence Serve as SME for More ❯
Posted:

Lead DevOps Engineer

London, United Kingdom
Hybrid / WFH Options
QiH Group
in bridging the gap between development, security, and operations. This is an individual contributor role, where you will spearhead initiatives and guide the team on best practices without direct management responsibilities. Key Responsibilities: Design, implement, and maintain secure cloud infrastructure in GCP. Develop and manage infrastructure as code (Terraform, Kubernetes) to ensure repeatable, scalable, and secure environments. Automate … workflows, build scripts, and operational tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as key management, vulnerability scanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration and delivery (CI/CD … depth knowledge of DevSecOps tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerability scanning, encryption, authentication, and secrets management (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when working as part of a team More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Escalation Engineer- FortiDLP- London

London, England, United Kingdom
Fortinet
to assist others with future debugging and contribute supportability enhancement requests for our program of ongoing product improvement. become a specialist in our Data Loss Prevention and Insider Risk Management solution, and be able to provide expert advice to our customers and partners. We Are Looking For: An insightful and influential collaborator to join our team. We encourage you … domain administration. Working knowledge of Linux and associated tools. A practical understanding of how data is protected at rest and in transit, including the particulars of TLS, PKI, encryption, key management, identity management and RBAC. Experience with Kubernetes, Google Cloud, or Amazon Web Services (AWS) is a plus. Why Join Us: At Fortinet, we embrace diversity and More ❯
Posted:

Senior Product Engineer (Technical)

London, England, United Kingdom
Visa
outputs to generate insights that inform service blueprints. Ensure the user experience aligns with the latest UX technologies, pushing technical boundaries to deliver optimal experiences. Use prototyping as a key step in the design and validation process. Document technical details, including architectural flows and sequence diagrams. Lead technical discussions with clients and partners regarding UX and technical flows. Stay … ability to develop large-scale, high-availability applications. Strong analytical and problem-solving skills. Experience with Identity solutions (OAuth, OpenID Connect, SAML, security tokens). Knowledge of cryptography and key management. Experience with API testing tools like Postman. Familiarity with Design Thinking and product management tools like Jira Align. Knowledge of project management principles and Agile methodologies. More ❯
Posted:

Security Architect - Cryptography

London, England, United Kingdom
I-confidential
of working in a financial services environment and in cryptographic projects will be required. The role will also involve the creation of high-level designs, publishing new architecture patterns, key decisions, design deviations, and technical risks and issues where appropriate. Cybersecurity Expertise: Architect secure, multi-tenant HSMaaS platforms for cryptographic key management and operations Define cryptographic service … HSMs Design scalable, compliant HSM infrastructures Integrate and optimize cloud and on-prem HSMs Develop secure APIs and interfaces for HSM provisioning, access, and automation Implement strong access controls, key isolation, and secure lifecycle management Establish cryptographic policies for key creation, usage, rotation, and destruction Embed monitoring, logging, and attestation for cryptographic operations and HSM events Perform More ❯
Posted:

Security Architect

London, England, United Kingdom
ZipRecruiter
engaging stakeholders, and driving the successful execution of security projects. Responsibilities: Technical Expertise: Security Architecture & Design: Proficiency in designing secure architectures using Azure tools, including Azure Security Center, Azure Key Vault, Azure Firewall, and Azure Sentinel. API Security: Expertise in securing APIs, including Auth, JWT, API keys, and integration with Azure Active Directory (AAD). Cloud Security Controls: Strong … knowledge of network security, access management, data encryption, and key management in Azure environments. Azure Services: In-depth experience with Azure API Management, Azure Kubernetes Service (AKS), Azure DevOps, and container security. Integration: Experience integrating on-premises and cloud environments while ensuring security standards. Management & Leadership: Team Leadership: Lead and mentor teams in implementing Azure … security solutions and fostering a culture of secure coding practices. Stakeholder Management: Collaborate with clients, business leaders, and cross-functional teams to align security strategies with business goals. Qualifications: Technical Skills: Expertise in Azure Security Center, Azure Sentinel, Microsoft Defender for Cloud, and related services. Advanced knowledge of Kubernetes security, microservices, and API management. Strong scripting skills for automation More ❯
Posted:

Cloud Security Architect, AWS ProServe India

London, England, United Kingdom
Amazon
customers embrace cloud technologies. This role is ideal for security architects who have worked in regulated industries like Banks, Insurance Companies, PSUs or as security architects in System Integrators. Key job responsibilities: Security architect should help customers implement core AWS security services such as Amazon Identity and Access Management (IAM), Key Management System, CloudHSM, AWS Organisations … have implementation knowledge to deliver DevSecOps pipeline with IaC scanner, SAST, DAST tool in the SDLC. Hands-on experience in one of the following is mandatory: Identity and Access Management Data Encryption Network Security Incident Response Security Automation BASIC QUALIFICATIONS: Knowledge of the primary AWS services (EC2, ELB, RDS, Route53 & S3) Experience implementing AWS services in a variety of More ❯
Posted:

ML Infrastructure Engineer

London, England, United Kingdom
Millennium
developer role, and candidates ideally have had experience deploying and supporting their own production-ready AI/ML models in cloud environments as well as automating the build and management of a broad range of cloud infrastructure using tools like Terraform. Candidates should be familiar with developing unit and functional tests, have experience designing and implementing CI/CD … tools with infrastructure as code pipelines, and have knowledge of Linux systems administration, containerization, networking, security, automated configuration and state management, cross-system orchestration, configuration management, logging, metrics, monitoring, and alerting. Principal Responsibilities: Architect, develop and maintain internal AI/ML infrastructure components, frameworks, and offerings Architect, develop and maintain AI/ML solutions for customers in cloud … e.g., vLLM, KFServing) Experience with building, monitoring, and alerting on logs and metrics Cloud Networking including connectivity, routing, DNS, VPCs, proxies, and load balancers Cloud Security including IAM, Certificate Management, and Key Management Excellent written and verbal communication skills Excellent troubleshooting and analytical skills Self-starter able to execute independently, on a deadline, and under pressure #J More ❯
Posted:

Senior Security Architect, Consulting

London, England, United Kingdom
Cognizant
technology advice; ensuring project success through timely and accurate production of agreed deliverables. Shaping, leading and delivering value through technology advisory consultancy and guiding transformational delivery engagements. Strong stakeholder management and relationship building skills at senior levels to enable consensus building and shaping technology direction. Leading in the development and presentation of client proposals collaborating with teams across our … experience: Creation of high-level security architecture design (HLD). Security capabilities in AWS Cloud and Data Centres (DCs). Knowledge of network segmentation and vulnerability management. Security: Firewalls, Key Management, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Virtual Private Networks (VPNs), Identity & Access Management (IAM), Application Gateway (ALG). Technologies: WSO2, Nginx, Entrust, GardDuty, Shield. … comfortable drafting documents, preparing presentations, researching IT architecture and technology topics, and providing oversight to development teams. They must have the ability to abstract complex themes, problem solve, distil key discussion points, organise work, deliver to tight deadlines, and communicate with non-technical and technical stakeholders. Security Clearance Please note that candidates must hold or be able to gain More ❯
Posted:

NETWORK INTEGRATION ENGINEER (ARTIFICIAL COGNITIVE SYSTEMS)-AEROSPACE AND DEFENSE:

London, England, United Kingdom
Gentrian
to provide the organization continuity to reconfigure the network to meet the startup purpose. Secure the communication and provide confidentiality and integrity of messages. METHODS TO IMPLEMENT: centralized group key management protocols, decentralized architectures, distributed key management protocols, cryptography-based access controls, intrusion detection and defense like BBB block, brain, barrier for the human brain. All … team members obtain key generation; all team members can perform access control, and generation of the key should be contributory. (All team members contribute some information to generate the group key, which will be done by the Head of Systems Integration ), undergoing formal approval, review, and voting by representatives for Security Impact Analysis, THE C.A.B (CHANGE APPROVAL … BOARD) . The cryptography-based access controls require data protection enforced with cryptography, and the systems that require the data should have a cryptography key to encrypt that data. Secure multi-party computation enables data scientists and data migration analysts to securely compute distributed data without exposing it or moving it; e.g., the signature protocol is based on secure More ❯
Posted:

Cloud Security Architect, AWS ProServe India

London, England, United Kingdom
Amazon
customers embrace cloud technologies. This role is ideal for security architects who have worked in regulated industries like Banks, Insurance Companies, PSUs or as security architects in System Integrators. Key job responsibilities: Security architect should help customers implement core AWS security services such as Amazon Identity and Access Management (IAM), Key Management System, CloudHSM, AWS Organisations … have implementation knowledge to deliver DevSecOps pipeline with IaC scanner, SAST, DAST tool in the SDLC. Hands-on experience in one of the following is mandatory: Identity and Access Management Data Encryption Network Security Incident Response Security Automation About the team: Diverse Experiences. Amazon values diverse experiences. Even if you do not meet all of the preferred qualifications and More ❯
Posted:

Lead DevOps Engineer

London, United Kingdom
Endeavour Recruitment Solutions
languages such as PowerShell scripts, YAML, Python Experience of azure automation using arm templates Experience of Linux, Windows Server, Azure SQL Server, Azure Storage, CosmosDB Experience in cloud security management (IAM, Security Groups, certificates & key management) Experience with logging, monitoring and alerting platforms such as app Insights Experience of working within an Agile and Scrum team Please More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Security Solution Architect - Director

London, England, United Kingdom
ZipRecruiter
blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures—and business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the … executive buy-in. NICE TO HAVE Leadership in Zero Trust architecture for hybrid/multi-cloud. Background in secure networking, micro-segmentation, and modern engineering practices. Knowledge of secrets management, cryptographic key management, CSPM, CWPP, CI/CD pipelines, Infrastructure as Code, configuration tools, and relevant certifications. Who You'll Work With You will be part of More ❯
Posted:

Product Engineer (Technical)

London, England, United Kingdom
Visa
web or mobile applications. Strong analytical, problem-solving, and data-driven insight skills. Knowledge of Identity solutions such as OAuth, OpenID Connect, SAML, and security tokens. Cryptographic knowledge and key management experience. Experience with API testing tools like Postman. Familiarity with Design Thinking and Agile methodologies, with experience in an agile environment. Experience in the payments industry is More ❯
Posted:

Application Security Consultant – Cryptography, SC clearance

London, England, United Kingdom
hays-gcj-v4-pd-online
experienced Application Security Consultant for a critical project with a high-profile end client. The role requires expertise in cryptography, encryption, and data security, with responsibilities including certificate and key management, and familiarity with DLP, CASB, and HSM technologies. Key Requirements: Proven experience as an Application Security Consultant in a large organization Strong knowledge of cryptography, encryption … and data security Experience with certificate and key lifecycle management Familiarity with DLP and CASB solutions Experience with Hardware Security Modules (HSM) Excellent communication skills Eligibility for SC Clearance (minimum 5 years UK residency) Nice to Have: Active SC Clearance Immediate availability Application: If interested and qualified, please apply with your latest CV as soon as possible. #J More ❯
Posted:
Key Management
London
Median
£60,000
75th Percentile
£97,500
90th Percentile
£140,000