with Technology Controls and Standards, including but not limited to Incident/Problem/Change/Vulnerability Management. Understanding of industry cryptographic principles including algorithms, protocols and technologies including symmetric and asymmetric keys, digital signatures, key exchange and encryption. Advocate the improvement and implementation of security controls when appropriate. Presentation … part of on-call support. To be successful in this role, you will need the following: Strong understanding of PKI concepts, X.509 certificates, encryption algorithms, and certificate lifecycle. Exposure to enterprise PKI tools (Venafi, DigiCert, Entrust, EJBCA), hands-on experience managing Certificate Authorities, CRL/OCSP, and secure key storage ...