Java, Kotlin, Python, Apps Script, JavaScript or C#/C++ Containerisation experience such as Docker, Kubernetes or OpenShift Experience of security protocols such as PKI, TLS etc Virtualisation experience, KVM/Vmware Good understanding of networking Demonstrable troubleshooting and problem-solving skills A passion for learning new technologies and innovation More ❯
PKI Security Architect 3 months Remote SC security clearance required Inside IR35 - Umbrella only Role overview: We are seeking an experienced cybersecurity professional with a strong focus on PublicKeyInfrastructure (PKI), Hardware Security Modules (HSMs), digital certificates, and encryption technologies. The ideal candidate will have at … hands-on experience in these areas and a solid foundation in overall cybersecurity architecture. Key Responsibilities: Lead the architecture, design, and implementation of PKI solutions, with a focus on large-scale, secure environments. Support the migration from an existing PKI to a newly developed PKIinfrastructure as part … of our Smart Meter Solution. Work closely with cross-functional teams to ensure secure and seamless integration of PKI within the broader cybersecurity framework. Manage and maintain HSMs, including configuration, deployment, and troubleshooting. Provide expert guidance on encryption standards, certificate lifecycle management, and secure key storage. Collaborate with other More ❯
PKI Security Architect 3 months Remote SC security clearance required £640 per day inside IR35 - Umbrella only Role overview: We are seeking an experienced cybersecurity professional with a strong focus on PublicKeyInfrastructure (PKI), Hardware Security Modules (HSMs), digital certificates, and encryption technologies. The ideal candidate … hands-on experience in these areas and a solid foundation in overall cybersecurity architecture. Key Responsibilities: Lead the architecture, design, and implementation of PKI solutions, with a focus on large-scale, secure environments. Support the migration from an existing PKI to a newly developed PKIinfrastructure as part … of our Smart Meter Solution. Work closely with cross-functional teams to ensure secure and seamless integration of PKI within the broader cybersecurity framework. Manage and maintain HSMs, including configuration, deployment, and troubleshooting. Provide expert guidance on encryption standards, certificate lifecycle management, and secure key storage. Collaborate with other More ❯
Windows Server, SQL Server) It would be advantageous that you can also demonstrate knowledge of the following: Enterprise Security (e.g. IDS/IPS, Encryption, PKI) Hyper Converged Infrastructure and Virtual Storage Attached Networking Networking architecture and connectivity (e.g. TCP/IP, DNS, Application Delivery Controllers, proxies, load balancing, firewalls More ❯
with OT security solutions including Claroty, Dragos, Nozomi Networks, and Armis. Network Security: Hands-on experience with firewalls, IDS/IPS, VPNs, authentication systems, PKI, log management, and content filtering. Cybersecurity Frameworks: Familiarity with NIST, IEC 62443, ISO 27001, NERC CIP, GSMA IoT Security Guidelines, and other industry security standards. More ❯
Privacy. Education: Bachelor's degree in Cybersecurity, Information Technology, or a related field. Network Security: Exposure to Firewalls, IDS/IPS, VPNs, authentication systems, PKI, log management, and content filtering. Cybersecurity Frameworks: Familiarity with NIST, IEC 62443, ISO 27001, NERC CIP, GSMA IoT Security Guidelines, and other industry security standards. More ❯
level support for IAM assets, create and maintain documentation, and participate in rotating on-call schedule. Run an Active Directory and Microsoft PublicKeyInfrastructure environment. Administer and optimise Microsoft Exchange (Hybrid), Google Workspace. Implement and optimize mail transfer agents and email hygiene systems, ensuring secure, reliable More ❯
Experience designing for relevant security standards (TCG, IEEE, NIST, FIPS, PCI, ISO 28000 series). Experience designing for crypto security (e.g. certificate handling and PKI, attestation, TPM/HSM). Expert knowledge of Windows, Linux, and hypervisor security (especially in cloud environments). Expert knowledge of common security-relevant protocols More ❯
other technologies. Understand basic uses of cryptography in IT environments and common products or technologies used, in areas such as SSL/TLS, SSH, PKI, and HSMs. Strong communication and organization skills. Help bring order to chaotic environments. With an end-state in mind, must be able to identify projects More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Defence
etc.) Desirable Skills & Experience Experience with SIEM convergence from legacy platforms Familiarity with tools such as JIRA, Confluence, Git Background in Ethical Hacking, IDAM, PKI, or broader information security disciplines A team-oriented, adaptable mindset with a problem-solving approach Required Qualifications Splunk Cloud Administrator Splunk Enterprise Security Splunk SOAR More ❯
Cisco. Cisco Wireless and integration with SMB and Enterprise networking Forward and Reverse Proxy and WAF technologies Network Access Control (NAC), 802.1X, EAP and PKI MFA/2FA/Duo Knowledge of the following would be advantageous but not mandatory: Cisco DC Networking including ACI, Nexus Dashboard Cisco Computing, including More ❯
Cisco. Cisco Wireless and integration with SMB and Enterprise networking Forward and Reverse Proxy and WAF technologies Network Access Control (NAC), 802.1X, EAP and PKI MFA/2FA/Duo Knowledge of the following would be advantageous but not mandatory: Cisco DC Networking including ACI, Nexus Dashboard Cisco Computing, including More ❯
Cisco. Cisco Wireless and integration with SMB and Enterprise networking Forward and Reverse Proxy and WAF technologies Network Access Control (NAC), 802.1X, EAP and PKI MFA/2FA/Duo Knowledge of the following would be advantageous but not mandatory: Cisco DC Networking including ACI, Nexus Dashboard Cisco Computing, including More ❯
Cisco) Cloud network security (Check Point, Azure) Web Application Firewalls (WAFs), SSL VPNs, SASE, network segmentation, load balancing, NAC, Wi-Fi security, RADIUS, TACACS, PKI What is it like to work at the EBRD? Our agile and innovative approach makes life at the EBRD unique! You will be part of More ❯
client meetings in the U.K. About the Role: iO Associates are partnering with a leading technology firm in their search for an experienced Senior PKI Architect. Due to the exciting nature of the role and the projects you will be involved in, active SC or DV Clearance is required for … eligibility. In this role, you will be at the forefront of designing, implementing, and supporting cutting-edge PublicKeyInfrastructure (PKI) solutions for high-profile clients. You will be involved in the entire solution lifecycle-from pre-sales architecture to implementation and ongoing internal improvements-driving strategic … satisfaction. Key Responsibilities: Pre-Sales & Client Engagement: Lead technical discussions, develop proposals, and educate stakeholders on PKI. Solution Architecture & Delivery: Design and implement PKI solutions, oversee CA/RA setups, and ensure compliance. Innovation & Improvement: Create design patterns, conduct reviews, and improve solution delivery. Team Development: Mentor junior team More ❯
ISO27001). - Experience with public sector programmes. - Desirable: PCiIAA, SABSA & TOGAF, and enterprise architecture/framework expertise. - Knowledge of identity management, publickeyinfrastructure, SIEM, cryptography, firewalls, and vulnerability scanning. - A security-based master’s degree or a STEM degree is preferred. - Eligibility and willingness to More ❯
ISO27001). - Experience with public sector programmes. - Desirable: PCiIAA, SABSA & TOGAF, and enterprise architecture/framework expertise. - Knowledge of identity management, publickeyinfrastructure, SIEM, cryptography, firewalls, and vulnerability scanning. - A security-based master’s degree or a STEM degree is preferred. - Eligibility and willingness to More ❯
ISO27001). - Experience with public sector programmes. - Desirable: PCiIAA, SABSA & TOGAF, and enterprise architecture/framework expertise. - Knowledge of identity management, publickeyinfrastructure, SIEM, cryptography, firewalls, and vulnerability scanning. - A security-based master’s degree or a STEM degree is preferred. - Eligibility and willingness to More ❯
drive the security agenda within a matrixed environment. Serve as the security point of contact for projects, leveraging deep knowledge in DevSecOps, Azure IAM, PKI, secure SDLC, and adversarial AI threats, while promoting a culture of continuous improvement and security awareness. More ❯
Kubernetes and prior hands-on experience. Certification with CKA or CKAD is a plus! Demonstrable experience with the following security principles and technologies: SSH, PKI, 2FA, SSO (SAML, OIDC), RBAC Exceptional hands-on software troubleshooting, testing, and debugging skills with a tenacity to identify and resolve the technical issue that More ❯
IOS XE/XR, F5 TMOS operating systems, FortiOS Strong understanding of the majority of the following protocols: BGP, ISIS, VRF, OTV, STP, IPSec, PKI, VDC, VPC, VRRP, HSRP technologies. Fundamental knowledge of management protocols and secure implementation of SSH, AAA (TACACS+), Syslog, SNMP, NTP In-depth understanding of underlying More ❯
of ForgeRock COTS based IAM solutions (PingGateway, PingAM, PingIDM, PingDS) with embedded security gates, HTTP header signing, access token and data at rest encryption, PKI based self-sovereign identity, or open source You may be assessed on the key critical skills relevant for success in role, such as risk More ❯
of ForgeRock COTS based IAM solutions (PingGateway, PingAM, PingIDM, PingDS) with embedded security gates, HTTP header signing, access token and data at rest encryption, PKI based self-sovereign identity, or open source You may be assessed on the key critical skills relevant for success in role, such as risk More ❯
scanning) Drive secure coding standards and perform hands-on code reviews for high-assurance systems Design and operationalize core security features: authentication, authorization, TLS, PKI, and cryptographic protections Contribute to hardening efforts across cloud, containerized, and on-premise systems Collaborate cross-functionally to align security initiatives with product development, DevOps More ❯
scanning) Drive secure coding standards and perform hands-on code reviews for high-assurance systems Design and operationalize core security features: authentication, authorization, TLS, PKI, and cryptographic protections Contribute to hardening efforts across cloud, containerized, and on-premise systems Collaborate cross-functionally to align security initiatives with product development, DevOps More ❯