Java, Kotlin, Python, Apps Script, JavaScript or C#/C++ Containerisation experience such as Docker, Kubernetes or OpenShift Experience of security protocols such as PKI, TLS etc Virtualisation experience, KVM/Vmware Good understanding of networking Demonstrable troubleshooting and problem-solving skills A passion for learning new technologies and innovation More ❯
PKI Security Architect 3 months Remote SC security clearance required Inside IR35 - Umbrella only Role overview: We are seeking an experienced cybersecurity professional with a strong focus on PublicKeyInfrastructure (PKI), Hardware Security Modules (HSMs), digital certificates, and encryption technologies. The ideal candidate will have at … hands-on experience in these areas and a solid foundation in overall cybersecurity architecture. Key Responsibilities: Lead the architecture, design, and implementation of PKI solutions, with a focus on large-scale, secure environments. Support the migration from an existing PKI to a newly developed PKIinfrastructure as part … of our Smart Meter Solution. Work closely with cross-functional teams to ensure secure and seamless integration of PKI within the broader cybersecurity framework. Manage and maintain HSMs, including configuration, deployment, and troubleshooting. Provide expert guidance on encryption standards, certificate lifecycle management, and secure key storage. Collaborate with other More ❯
PKI Security Architect 3 months Remote SC security clearance required £640 per day inside IR35 - Umbrella only Role overview: We are seeking an experienced cybersecurity professional with a strong focus on PublicKeyInfrastructure (PKI), Hardware Security Modules (HSMs), digital certificates, and encryption technologies. The ideal candidate … hands-on experience in these areas and a solid foundation in overall cybersecurity architecture. Key Responsibilities: Lead the architecture, design, and implementation of PKI solutions, with a focus on large-scale, secure environments. Support the migration from an existing PKI to a newly developed PKIinfrastructure as part … of our Smart Meter Solution. Work closely with cross-functional teams to ensure secure and seamless integration of PKI within the broader cybersecurity framework. Manage and maintain HSMs, including configuration, deployment, and troubleshooting. Provide expert guidance on encryption standards, certificate lifecycle management, and secure key storage. Collaborate with other More ❯
Windows Server, SQL Server) It would be advantageous that you can also demonstrate knowledge of the following: Enterprise Security (e.g. IDS/IPS, Encryption, PKI) Hyper Converged Infrastructure and Virtual Storage Attached Networking Networking architecture and connectivity (e.g. TCP/IP, DNS, Application Delivery Controllers, proxies, load balancing, firewalls More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Matchtech
etc.) Desirable Skills & Experience Experience with SIEM convergence from legacy platforms Familiarity with tools such as JIRA, Confluence, Git Background in Ethical Hacking, IDAM, PKI, or broader information security disciplines A team-oriented, adaptable mindset with a problem-solving approach Required Qualifications Splunk Cloud Administrator Splunk Enterprise Security Splunk SOAR More ❯
level support for IAM assets, create and maintain documentation, and participate in rotating on-call schedule. Run an Active Directory and Microsoft PublicKeyInfrastructure environment. Administer and optimise Microsoft Exchange (Hybrid), Google Workspace. Implement and optimize mail transfer agents and email hygiene systems, ensuring secure, reliable More ❯
Cisco) Cloud network security (Check Point, Azure) Web Application Firewalls (WAFs), SSL VPNs, SASE, network segmentation, load balancing, NAC, Wi-Fi security, RADIUS, TACACS, PKI What is it like to work at the EBRD? Our agile and innovative approach makes life at the EBRD unique! You will be part of More ❯
Experience designing for relevant security standards (TCG, IEEE, NIST, FIPS, PCI, ISO 28000 series). Experience designing for crypto security (e.g. certificate handling and PKI, attestation, TPM/HSM). Expert knowledge of Windows, Linux, and hypervisor security (especially in cloud environments). Expert knowledge of common security-relevant protocols More ❯
with OT security solutions including Claroty, Dragos, Nozomi Networks, and Armis. Network Security: Hands-on experience with firewalls, IDS/IPS, VPNs, authentication systems, PKI, log management, and content filtering. Cybersecurity Frameworks: Familiarity with NIST, IEC 62443, ISO 27001, NERC CIP, GSMA IoT Security Guidelines, and other industry security standards. More ❯
other technologies. Understand basic uses of cryptography in IT environments and common products or technologies used, in areas such as SSL/TLS, SSH, PKI, and HSMs. Strong communication and organization skills. Help bring order to chaotic environments. With an end-state in mind, must be able to identify projects More ❯
ISO27001). - Experience with public sector programmes. - Desirable: PCiIAA, SABSA & TOGAF, and enterprise architecture/framework expertise. - Knowledge of identity management, publickeyinfrastructure, SIEM, cryptography, firewalls, and vulnerability scanning. - A security-based master’s degree or a STEM degree is preferred. - Eligibility and willingness to More ❯
ISO27001). - Experience with public sector programmes. - Desirable: PCiIAA, SABSA & TOGAF, and enterprise architecture/framework expertise. - Knowledge of identity management, publickeyinfrastructure, SIEM, cryptography, firewalls, and vulnerability scanning. - A security-based master’s degree or a STEM degree is preferred. - Eligibility and willingness to More ❯
ISO27001). - Experience with public sector programmes. - Desirable: PCiIAA, SABSA & TOGAF, and enterprise architecture/framework expertise. - Knowledge of identity management, publickeyinfrastructure, SIEM, cryptography, firewalls, and vulnerability scanning. - A security-based master’s degree or a STEM degree is preferred. - Eligibility and willingness to More ❯
Cisco. Cisco Wireless and integration with SMB and Enterprise networking Forward and Reverse Proxy and WAF technologies Network Access Control (NAC), 802.1X, EAP and PKI MFA/2FA/Duo Knowledge of the following would be advantageous but not mandatory: Cisco DC Networking including ACI, Nexus Dashboard Cisco Computing, including More ❯
Cisco. Cisco Wireless and integration with SMB and Enterprise networking Forward and Reverse Proxy and WAF technologies Network Access Control (NAC), 802.1X, EAP and PKI MFA/2FA/Duo Knowledge of the following would be advantageous but not mandatory: Cisco DC Networking including ACI, Nexus Dashboard Cisco Computing, including More ❯
Cisco. Cisco Wireless and integration with SMB and Enterprise networking Forward and Reverse Proxy and WAF technologies Network Access Control (NAC), 802.1X, EAP and PKI MFA/2FA/Duo Knowledge of the following would be advantageous but not mandatory: Cisco DC Networking including ACI, Nexus Dashboard Cisco Computing, including More ❯
Privacy. Education: Bachelor's degree in Cybersecurity, Information Technology, or a related field. Network Security: Exposure to Firewalls, IDS/IPS, VPNs, authentication systems, PKI, log management, and content filtering. Cybersecurity Frameworks: Familiarity with NIST, IEC 62443, ISO 27001, NERC CIP, GSMA IoT Security Guidelines, and other industry security standards. More ❯
Kubernetes and prior hands-on experience. Certification with CKA or CKAD is a plus! Demonstrable experience with the following security principles and technologies: SSH, PKI, 2FA, SSO (SAML, OIDC), RBAC Exceptional hands-on software troubleshooting, testing, and debugging skills with a tenacity to identify and resolve the technical issue that More ❯
IOS XE/XR, F5 TMOS operating systems, FortiOS Strong understanding of the majority of the following protocols: BGP, ISIS, VRF, OTV, STP, IPSec, PKI, VDC, VPC, VRRP, HSRP technologies. Fundamental knowledge of management protocols and secure implementation of SSH, AAA (TACACS+), Syslog, SNMP, NTP In-depth understanding of underlying More ❯
London, England, United Kingdom Hybrid / WFH Options
IO Associates
client meetings in the U.K. About the Role: iO Associates are partnering with a leading technology firm in their search for an experienced Senior PKI Architect. Due to the exciting nature of the role and the projects you will be involved in, active SC or DV Clearance is required for More ❯
drive the security agenda within a matrixed environment. Serve as the security point of contact for projects, leveraging deep knowledge in DevSecOps, Azure IAM, PKI, secure SDLC, and adversarial AI threats, while promoting a culture of continuous improvement and security awareness. More ❯
Azure environments. Strong hands-on experience with Microsoft technologies, including Windows Server, Active Directory (AD), Certification Authority (CA) & PublicKeyInfrastructure (PKI), Group Policy, File Services, and Print Services. Experience with M365 collaboration tools (MS Teams, SharePoint, OneDrive, and Exchange) and virtualisation technologies (VMware, Microsoft RDS). More ❯
scanning) Drive secure coding standards and perform hands-on code reviews for high-assurance systems Design and operationalize core security features: authentication, authorization, TLS, PKI, and cryptographic protections Contribute to hardening efforts across cloud, containerized, and on-premise systems Collaborate cross-functionally to align security initiatives with product development, DevOps More ❯
scanning) Drive secure coding standards and perform hands-on code reviews for high-assurance systems Design and operationalize core security features: authentication, authorization, TLS, PKI, and cryptographic protections Contribute to hardening efforts across cloud, containerized, and on-premise systems Collaborate cross-functionally to align security initiatives with product development, DevOps More ❯
The platform allows devices to seamlessly generate and share secure symmetric encryption keys, reducing the vulnerabilities associated with publickeyinfrastructure (PKI) while operating with zero-trust principles. Stronger, simpler encryption. We have an exciting new opportunity for a Solution Architect/Defence & Government Specialist to join More ❯