lost, all confidential sensitive and necessary data falls in the high risk category. Areas to cover will include : Create and label data classification metrics as functional mirror for risk management, compliance, and Security teams. Automate discovery and actions- Areas to cover will include:( Automate policies in place and decide what should happen to data base on the sensitivity). … source):Policy kicks-in automatically encrypted base on the sensitivity.Embed different layers of encryption for different types of data. AREAS TO IMPROVE-(ESTABLISH A ADMINISTRATIVE LIFE CYCLE HIERARCHIC CRYPTOGRAPHIC KEY PROTOCOL): Embed HSM and secure zone for key generation, This will ensure sensitive operational support and other related operations after using protocols and technologies for proven security. Areas … where matters requires attention will include: key encryption, verifiable secret splitting and sharing key distribution, key storage and backup, Identitymanagement, access control, keymanagement at the edge-Generating, using, storing, archiving, deleting, and protection of the encryption keys at the edge. INCIDENTS RESPONSE- (Establish a incident reporting lines and Disaster recovery plans in conformity defined More ❯
to assist others with future debugging and contribute supportability enhancement requests for our program of ongoing product improvement become a specialist in our Data Loss Prevention and Insider Risk Management solution, and be able to provide expert advice to our customers and partners We Are Looking For: An insightful and influential collaborator to join our team. We encourage you … domain administration Working knowledge of Linux and associated tools A practical understanding of how data is protected at rest and in transit, including the particulars of TLS, PKI, encryption, keymanagement, identity management and RBAC Experience with Kubernetes, Google Cloud, or Amazon Web Services (AWS) is a plus Why Join Us: At Fortinet, we embrace diversity and More ❯
a comparable senior leadership role within a technology-driven organization Deep expertise in blockchain technologies, ideally staking mechanisms and consensus algorithms Background in on-premise infrastructure design, implementation, and management, with expert knowledge of data center technologies, virtualization, server hardware, and networking Expertise in data engineering, including the design and deployment of scalable data pipelines, data warehousing solutions, and … integration strategies In-depth understanding of cryptographic principles and secure keymanagement practices Familiarity with infrastructure cybersecurity principles and best practices for securing distributed systems A consistent track record of successfully delivering complex, infrastructure-focused technology solutions on time and within budget fast-paced environment What makes you stand out: Extensive experience with cloud computing platforms (AWS, Azure More ❯
encryption, access controls, and data masking. Manage data encryption solutions to ensure the confidentiality and integrity of sensitive data. Collaborate across the Security Team to develop and deliver encryption keymanagement processes and systems. Ensure security across the Data & Analytics technology stack, which includes Oracle tools, Snowflake, Postgres, and various AWS services (SageMaker, Lambda, Step Functions, DMS, S3 More ❯
blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures-and business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the … You can successfully interface and connect with skilled technologists and non-technical stakeholders, including members of the C-suite Ability to work in an Agile environment leveraging strong work management, organizational and planning skills You have an ability to work as part of a geographically dispersed team bringing a sense of urgency to the tasks at hand Must have … for hybrid and multi-cloud environments Strong background in secure, software-defined networking and micro-segmentation Hands-on with modern engineering practices-Agile, DevSecOps, automated testing Familiarity with secrets management/certificate lifecycle automation Solid grasp of cryptographic keymanagement and enterprise PKI operations Experience with Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platforms More ❯
encryption, access controls, and data masking. Manage data encryption solutions to ensure the confidentiality and integrity of sensitive data. Work with the Security Team to develop and implement encryption keymanagement processes and systems. Ensure security across the Data & Analytics technology stack, which primarily includes Oracle tools, Snowflake, Postgres, and various AWS services (SageMaker, Lambda, Step Functions, DMS More ❯
London, England, United Kingdom Hybrid / WFH Options
Stott and May
Responsibilities: Drive, develop, and contribute to a Cryptography Operations roadmap and strategy Enhance cryptographic capabilities through in-house and partner integrations Implement and manage cryptographic keys Oversee cryptography and keymanagement processes Facilitate onboarding of new services and manage existing ones Lead secure key storage implementation Establish cryptography processes across the team Manage lifecycle of cryptographic keys … including reviews and replacements Collaborate with Cyber and InfoSec teams to integrate keymanagement practices Lead Cryptography Engineer – Technical Skills: Experience with key handling, segregation of duties, and split knowledge in cryptography Understanding of software delivery pipelines and automation of keymanagement Knowledge of responding to cryptography incidents Familiarity with HSM technologies, especially Thales, or More ❯
within the region. You will be responsible for the entire sales cycle, from pipeline generation and proposal leadership to closing deals, focusing on our comprehensive suite of security solutions. Key Responsibilities: Lead and orchestrate the creation of compelling, high-quality, security-focused proposals and responses to Requests for Proposals (RFPs). Leverage deep technical understanding across diverse cybersecurity domains … including Security Operations Centers (SOC), Endpoint Detection and Response (EDR), Governance, Risk & Compliance (GRC), network security (including firewalls), cloud security, Operational Technology (OT) security, and data security (encryption, DLP, keymanagement). Revenue Generation & Customer Relationship Management: Develop and execute strategic sales plans to achieve revenue targets and expand our customer base within the assigned territory. Build … maintain, and nurture strong, long-lasting relationships with key stakeholders and decision-makers within target customer organizations. Proactively identify and pursue new business opportunities through various channels. Take ownership of key financial and sales performance metrics, including Total Contract Value (TCV), Annual Contract Value (ACV), sales funnel health, and pipeline development. Provide accurate forecasting and regular reporting on More ❯
PKI Engineer Remote 5 months - extensions £720 per day inside ir35 - umbrella only Role overview: Lead the architecture, design, and operations of Public Key Infrastructure (PKI) solutions. Manage Hardware Security Modules (HSMs), ensuring secure cryptographic key management. Oversee the migration of legacy PKI to a modern replacement solution. Implement Public-Key Cryptography Standards (PKCS), chains of trust … and Certificate Signing Requests (CSRs). Collaborate with cybersecurity teams to integrate PKI into broader security architecture. Provide hands-on expertise with HSMs, ensuring compliance with security standards. Key Skills & Experience: Strong expertise in PKI architecture, operations, and security best practices. Hands-on experience with HSMs in enterprise environments. Deep knowledge of PKCS, certificate management, and trust models. More ❯
PKI Engineer Remote 5 months - extensions £720 per day inside ir35 - umbrella only Role overview: Lead the architecture, design, and operations of Public Key Infrastructure (PKI) solutions. Manage Hardware Security Modules (HSMs), ensuring secure cryptographic key management. Oversee the migration of legacy PKI to a modern replacement solution. Implement Public-Key Cryptography Standards (PKCS#11), chains of trust … and Certificate Signing Requests (CSRs). Collaborate with cybersecurity teams to integrate PKI into broader security architecture. Provide hands-on expertise with HSMs, ensuring compliance with security standards. Key Skills & Experience: Strong expertise in PKI architecture, operations, and security best practices. Hands-on experience with HSMs in enterprise environments. Deep knowledge of PKCS#11, certificate management, and trust models. More ❯
London, England, United Kingdom Hybrid / WFH Options
NextEnergy Group
Architect, you will define the security vision and implement secure-by-design principles across all organizational layers — from Operational Technology networks in the field to corporate business systems. A key aspect of this role involves collaboration with: Data Protection Officer (DPO): integrating privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: translating architecture patterns into robust, monitored … and recoverable configurations External security advisors & key technology suppliers: aligning architectural controls with best practices and supply chain security requirements This strategic yet practical role requires balancing security principles with delivery across cloud, on-premises, and SaaS environments. Key Responsibilities Develop and evolve enterprise security architecture standards covering IT, OT, and hybrid-cloud environments Incorporate security & privacy requirements … modeling, risk assessments, and security analyses for new projects and platforms Lead architecture on secure network topologies, including segmentation and zero-trust models Define standards for IAM, encryption, secrets management, and keymanagement aligned with ISO 27001/27019 and NIS2 Evaluate and select third-party security solutions and conduct vendor due diligence Serve as SME for More ❯
in bridging the gap between development, security, and operations. This is an individual contributor role, where you will spearhead initiatives and guide the team on best practices without direct management responsibilities. Key Responsibilities: Design, implement, and maintain secure cloud infrastructure in GCP. Develop and manage infrastructure as code (Terraform, Kubernetes) to ensure repeatable, scalable, and secure environments. Automate … workflows, build scripts, and operational tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as keymanagement, vulnerability scanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration and delivery (CI/CD … depth knowledge of DevSecOps tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerability scanning, encryption, authentication, and secrets management (Vault, KeyManagement Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when working as part of a team More ❯
to assist others with future debugging and contribute supportability enhancement requests for our program of ongoing product improvement. become a specialist in our Data Loss Prevention and Insider Risk Management solution, and be able to provide expert advice to our customers and partners. We Are Looking For: An insightful and influential collaborator to join our team. We encourage you … domain administration. Working knowledge of Linux and associated tools. A practical understanding of how data is protected at rest and in transit, including the particulars of TLS, PKI, encryption, keymanagement, identity management and RBAC. Experience with Kubernetes, Google Cloud, or Amazon Web Services (AWS) is a plus. Why Join Us: At Fortinet, we embrace diversity and More ❯
outputs to generate insights that inform service blueprints. Ensure the user experience aligns with the latest UX technologies, pushing technical boundaries to deliver optimal experiences. Use prototyping as a key step in the design and validation process. Document technical details, including architectural flows and sequence diagrams. Lead technical discussions with clients and partners regarding UX and technical flows. Stay … ability to develop large-scale, high-availability applications. Strong analytical and problem-solving skills. Experience with Identity solutions (OAuth, OpenID Connect, SAML, security tokens). Knowledge of cryptography and key management. Experience with API testing tools like Postman. Familiarity with Design Thinking and product management tools like Jira Align. Knowledge of project management principles and Agile methodologies. More ❯
of working in a financial services environment and in cryptographic projects will be required. The role will also involve the creation of high-level designs, publishing new architecture patterns, key decisions, design deviations, and technical risks and issues where appropriate. Cybersecurity Expertise: Architect secure, multi-tenant HSMaaS platforms for cryptographic keymanagement and operations Define cryptographic service … HSMs Design scalable, compliant HSM infrastructures Integrate and optimize cloud and on-prem HSMs Develop secure APIs and interfaces for HSM provisioning, access, and automation Implement strong access controls, key isolation, and secure lifecycle management Establish cryptographic policies for key creation, usage, rotation, and destruction Embed monitoring, logging, and attestation for cryptographic operations and HSM events Perform More ❯
engaging stakeholders, and driving the successful execution of security projects. Responsibilities: Technical Expertise: Security Architecture & Design: Proficiency in designing secure architectures using Azure tools, including Azure Security Center, Azure Key Vault, Azure Firewall, and Azure Sentinel. API Security: Expertise in securing APIs, including Auth, JWT, API keys, and integration with Azure Active Directory (AAD). Cloud Security Controls: Strong … knowledge of network security, access management, data encryption, and keymanagement in Azure environments. Azure Services: In-depth experience with Azure API Management, Azure Kubernetes Service (AKS), Azure DevOps, and container security. Integration: Experience integrating on-premises and cloud environments while ensuring security standards. Management & Leadership: Team Leadership: Lead and mentor teams in implementing Azure … security solutions and fostering a culture of secure coding practices. Stakeholder Management: Collaborate with clients, business leaders, and cross-functional teams to align security strategies with business goals. Qualifications: Technical Skills: Expertise in Azure Security Center, Azure Sentinel, Microsoft Defender for Cloud, and related services. Advanced knowledge of Kubernetes security, microservices, and API management. Strong scripting skills for automation More ❯
customers embrace cloud technologies. This role is ideal for security architects who have worked in regulated industries like Banks, Insurance Companies, PSUs or as security architects in System Integrators. Key job responsibilities: Security architect should help customers implement core AWS security services such as Amazon Identity and Access Management (IAM), KeyManagement System, CloudHSM, AWS Organisations … have implementation knowledge to deliver DevSecOps pipeline with IaC scanner, SAST, DAST tool in the SDLC. Hands-on experience in one of the following is mandatory: Identity and Access Management Data Encryption Network Security Incident Response Security Automation BASIC QUALIFICATIONS: Knowledge of the primary AWS services (EC2, ELB, RDS, Route53 & S3) Experience implementing AWS services in a variety of More ❯
developer role, and candidates ideally have had experience deploying and supporting their own production-ready AI/ML models in cloud environments as well as automating the build and management of a broad range of cloud infrastructure using tools like Terraform. Candidates should be familiar with developing unit and functional tests, have experience designing and implementing CI/CD … tools with infrastructure as code pipelines, and have knowledge of Linux systems administration, containerization, networking, security, automated configuration and state management, cross-system orchestration, configuration management, logging, metrics, monitoring, and alerting. Principal Responsibilities: Architect, develop and maintain internal AI/ML infrastructure components, frameworks, and offerings Architect, develop and maintain AI/ML solutions for customers in cloud … e.g., vLLM, KFServing) Experience with building, monitoring, and alerting on logs and metrics Cloud Networking including connectivity, routing, DNS, VPCs, proxies, and load balancers Cloud Security including IAM, Certificate Management, and KeyManagement Excellent written and verbal communication skills Excellent troubleshooting and analytical skills Self-starter able to execute independently, on a deadline, and under pressure #J More ❯
technology advice; ensuring project success through timely and accurate production of agreed deliverables. Shaping, leading and delivering value through technology advisory consultancy and guiding transformational delivery engagements. Strong stakeholder management and relationship building skills at senior levels to enable consensus building and shaping technology direction. Leading in the development and presentation of client proposals collaborating with teams across our … experience: Creation of high-level security architecture design (HLD). Security capabilities in AWS Cloud and Data Centres (DCs). Knowledge of network segmentation and vulnerability management. Security: Firewalls, KeyManagement, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Virtual Private Networks (VPNs), Identity & Access Management (IAM), Application Gateway (ALG). Technologies: WSO2, Nginx, Entrust, GardDuty, Shield. … comfortable drafting documents, preparing presentations, researching IT architecture and technology topics, and providing oversight to development teams. They must have the ability to abstract complex themes, problem solve, distil key discussion points, organise work, deliver to tight deadlines, and communicate with non-technical and technical stakeholders. Security Clearance Please note that candidates must hold or be able to gain More ❯
to provide the organization continuity to reconfigure the network to meet the startup purpose. Secure the communication and provide confidentiality and integrity of messages. METHODS TO IMPLEMENT: centralized group keymanagement protocols, decentralized architectures, distributed keymanagement protocols, cryptography-based access controls, intrusion detection and defense like BBB block, brain, barrier for the human brain. All … team members obtain key generation; all team members can perform access control, and generation of the key should be contributory. (All team members contribute some information to generate the group key, which will be done by the Head of Systems Integration ), undergoing formal approval, review, and voting by representatives for Security Impact Analysis, THE C.A.B (CHANGE APPROVAL … BOARD) . The cryptography-based access controls require data protection enforced with cryptography, and the systems that require the data should have a cryptography key to encrypt that data. Secure multi-party computation enables data scientists and data migration analysts to securely compute distributed data without exposing it or moving it; e.g., the signature protocol is based on secure More ❯
customers embrace cloud technologies. This role is ideal for security architects who have worked in regulated industries like Banks, Insurance Companies, PSUs or as security architects in System Integrators. Key job responsibilities: Security architect should help customers implement core AWS security services such as Amazon Identity and Access Management (IAM), KeyManagement System, CloudHSM, AWS Organisations … have implementation knowledge to deliver DevSecOps pipeline with IaC scanner, SAST, DAST tool in the SDLC. Hands-on experience in one of the following is mandatory: Identity and Access Management Data Encryption Network Security Incident Response Security Automation About the team: Diverse Experiences. Amazon values diverse experiences. Even if you do not meet all of the preferred qualifications and More ❯
languages such as PowerShell scripts, YAML, Python Experience of azure automation using arm templates Experience of Linux, Windows Server, Azure SQL Server, Azure Storage, CosmosDB Experience in cloud security management (IAM, Security Groups, certificates & keymanagement) Experience with logging, monitoring and alerting platforms such as app Insights Experience of working within an Agile and Scrum team Please More ❯
blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures—and business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the … executive buy-in. NICE TO HAVE Leadership in Zero Trust architecture for hybrid/multi-cloud. Background in secure networking, micro-segmentation, and modern engineering practices. Knowledge of secrets management, cryptographic keymanagement, CSPM, CWPP, CI/CD pipelines, Infrastructure as Code, configuration tools, and relevant certifications. Who You'll Work With You will be part of More ❯
web or mobile applications. Strong analytical, problem-solving, and data-driven insight skills. Knowledge of Identity solutions such as OAuth, OpenID Connect, SAML, and security tokens. Cryptographic knowledge and keymanagement experience. Experience with API testing tools like Postman. Familiarity with Design Thinking and Agile methodologies, with experience in an agile environment. Experience in the payments industry is More ❯
experienced Application Security Consultant for a critical project with a high-profile end client. The role requires expertise in cryptography, encryption, and data security, with responsibilities including certificate and keymanagement, and familiarity with DLP, CASB, and HSM technologies. Key Requirements: Proven experience as an Application Security Consultant in a large organization Strong knowledge of cryptography, encryption … and data security Experience with certificate and key lifecycle management Familiarity with DLP and CASB solutions Experience with Hardware Security Modules (HSM) Excellent communication skills Eligibility for SC Clearance (minimum 5 years UK residency) Nice to Have: Active SC Clearance Immediate availability Application: If interested and qualified, please apply with your latest CV as soon as possible. #J More ❯