London, England, United Kingdom Hybrid / WFH Options
Sky
Design, build, and operate PKI solutions and environments. Manage Certificate Authority Administration, including Certificate Enrolment Web Service & Policy Web Service, and monitor Active Directory Certificate Services (ADCS). Manage KeyManagement Systems (KMS) to ensure robust cryptographic key security. Support and manage the PKI and Certificate deployment, automation, and Thales HSMs. Understand existing certificate use-cases and … of the PKI managed service for Sky and Comcast users, including certificate checks, issuing, and revoking. Work with App Service managed certificates, private and public certificates, and certificates from Key Vault. What You'll Bring Technical and professional leadership across the discipline. Deep knowledge of Information and/or Cyber Security, understanding of cybersecurity principles, practices, and frameworks like … with Certificate Authority Administration, ADCS monitoring. Familiarity with Data-in-motion and Data-at-rest Encryption techniques. Knowledge of PKI machine identity technologies like SSH, SSL, TLS. Experience managing KeyManagement Systems (KMS). Beneficial experience with PKI and Certificate deployment automation and Thales HSMs. Team Overview Cyber Security Our products, platforms, and technologies are constantly evolving. Protecting More ❯
Basingstoke, England, United Kingdom Hybrid / WFH Options
Fujitsu
seeking a PKI Architect to join our established team. You will support the delivery of highly secure network services to our customers within Defence and Central Government, playing a key role in a customer-facing team. You will collaborate with solution architects, security architects, and project teams to deliver high assurance services from design to deployment. Responsibilities You will … major technical projects, strategies, and architectures. You should have established knowledge and skills in the following areas: Extensive knowledge of PKI and cryptography solution design. Experience with MS Certificate Management Services, including Certification Authority, Online Responder, Network Device Enrollment Services (NDES), Certificate Enrollment Web Services (CEP/CES), Active Directory Domain Services, and certificate management solutions. Expertise in … SSL certificate management, including concepts, processes, solutions, and tools such as OpenSSL and Certutil. Knowledge of Hardware Security Module (HSM) technology and KeyManagement Server (KMS) technology, with direct experience with Thales HSM platforms being highly desirable. Experience in cloud solution development with Azure or AWS architectures related to PKI management. Extensive cryptography and PKI solution design More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
State Street
job and more exclusive features. Who We Are Looking For State Street is seeking an experienced Encryption Program Analyst to help design, implement, and optimize enterprise-wide encryption and keymanagement solutions across cloud, on-premises, and IoT environments in a highly regulated environment. This role will be responsible for defining cryptographic strategies, ensuring compliance with regulatory standards … data at rest, in transit, and in use, ensuring end-to-end cryptographic protection across applications, infrastructure, and connected devices. The ideal candidate will have deep expertise in cryptographic keymanagement, Hardware Security Modules (HSMs), cloud security, IoT encryption protocols, and enterprise data protection. This role can be performed in a hybrid model, where you can balance work … your needs and role requirements. Who We Are Looking For State Street is seeking an experienced Encryption Program Analyst to help design, implement, and optimize enterprise-wide encryption and keymanagement solutions across cloud, on-premises, and IoT environments in a highly regulated environment. This role will be responsible for defining cryptographic strategies, ensuring compliance with regulatory standards More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
SW Group
As Cloud Security Engineer, your responsibilities will include among others Managing, implementing, and maintaining technical security controls for IAAS, PAAS and SAAS based services which support Financial Planning, Investment Management, Tax Advice and a range of Professional Services. Building out and improving capabilities around M365 utilising E5 licensing. Ensuring E5 security capabilities are being fully utilised and are correctly … date as services continue to mature and develop. Provide risk analysis and end to end control design, implementation for new services using cloud-based solutions. Supporting Agile based project management and iteration - squad-based delivery. Ensure that the vision for cloud-based service is built out on security best practice Familiarity in interpreting highly technical detail, being able to … enhancements to the cloud security strategy by identifying and alerting on appropriate event types. Identify and define system security requirements at a detailed technical level including controls for encryption, keymanagement, IAAS design and segregation. Deep technical experience of implementing security features within Azure including DDOS protection, encryption, and appropriate monitoring controls. Implement technical controls and make recommendations. More ❯
London, England, United Kingdom Hybrid / WFH Options
CLS-Group
to remediation plans, producing regular reporting at relevant levels confirming direction of travel of risk improvement or decline. Collaborate with security and IT teams on monitoring vulnerability and patch management progress against standards and controls guidelines, with oversight of remediation and timing to reduce risk to an acceptable level. Direct, coach and rollout training for team to understanding security … and security artefacts that support multiple internal and external audits and regulatory requirements. Stay updated on advancements in security technologies, policies, and regulatory changes, recommending and implementing necessary improvements. Key member of the function who regularly reviews Security Policies, Standards and Controls and optimize position on areas associated to regulations and company strategy. Integrate processes with Cyber Threat Intelligence … to ensure appropriate monitoring of the threat landscape for emerging security risks and ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies, aligning to a 3 lines of defence model and enforcing alignment of risk taxonomy to organizational cybersecurity risk management processes, procedures and activities are identified across all security functions. Leadership Leads by More ❯
London, England, United Kingdom Hybrid / WFH Options
State Street
Who we are looking for State Street is seeking a Cryptographic Key Operations Engineer to support the end-to-end lifecycle management of cryptographic keys across cloud, on-premises, infrastructure and IoT environments. This role ensures the secure generation, distribution, rotation, revocation, and retirement of encryption keys while maintaining compliance with regulatory and security policies. The Key Operations Engineer will driving operational excellence and automation to enhance key lifecycle processes. This role requires close collaboration with security, IT, cloud, infrastructure, and application teams to maintain the availability, reliability, and security of keymanagement services, supporting business-critical operations and financial transactions. This role can be performed in a hybrid model, where you can … balance work from home and office to match your needs and role requirements. What you will be responsible for Support the daily operations and security of cryptographic keymanagement, ensuring compliance with financial industry regulations e.g. (PCI DSS, GDPR, FIPS 140-2/3). Drive the secure generation, storage, distribution, rotation, revocation, and retirement of encryption keys More ❯
City of London, London, United Kingdom Hybrid / WFH Options
NextEnergy Group
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
London, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including: Security Command Center VPC Service Controls IAM (Identity & Access Management) Cloud Logging and Monitoring Workload Identity Federation Automate security response using Python, Terraform, or XSOAR. Collaborate with infrastructure and DevOps teams to embed security into CI/CD pipelines … Experience as SOC lead, cyber operations manager, or similar role. Hands-on experience in securing Google Cloud Platform (GCP) environments across multiple projects/accounts. Strong expertise in: SIEM management (Chronicle, Splunk, Elastic) Incident response and recovery Security orchestration (SOAR), preferably Chronicle + XSOAR IAM, policy enforcement, logging, and access reviews in GCP Proven experience working in FinTech or … OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and KeyManagement Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. Influence More ❯
London, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including: Security Command Center VPC Service Controls IAM (Identity & Access Management) Cloud Logging and Monitoring Workload Identity Federation Automate security response using Python, Terraform, or XSOAR. Collaborate with infrastructure and DevOps teams to embed security into CI/CD pipelines … Experience as SOC lead, cyber operations manager, or similar role. Hands-on experience in securing Google Cloud Platform (GCP) environments across multiple projects/accounts. Strong expertise in: SIEM management (Chronicle, Splunk, Elastic) Incident response and recovery Security orchestration (SOAR), preferably Chronicle + XSOAR IAM, policy enforcement, logging, and access reviews in GCP Proven experience working in FinTech or … OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and KeyManagement Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. Influence More ❯
London, England, United Kingdom Hybrid / WFH Options
Doit Intl
and SageMaker Pipelines. Proficiency in monitoring and maintaining AI systems with Amazon CloudWatch and SageMaker Model Monitor. AI Governance and Security: Strong understanding of AI governance, incorporating IAM, AWS KeyManagement Service (KMS), and compliance frameworks. Knowledgeable in AI ethics, bias detection, and accountability using tools like SageMaker Clarify. Emerging AI Trends: Up-to-date on Generative AI More ❯
Luton, England, United Kingdom Hybrid / WFH Options
LHH
Key Responsibility Areas The successful candidate will report to the Head of Engineering Products and be responsible for providing security advice to product development teams in a range areas including: Production of Security Managements Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis … and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams … supporting Penetration test activities. Analysing penetration test results and preparation of remedial action plans. Prepare and implement through life support and maintenance for product security including vulnerability and patch management plans Lead security incident management teams during incident/crisis situations in conjunction with Head of Product Security for EW/FCA Review and maintain corporate product security More ❯
London, England, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
on-site) Contract :06 months (with possibility of extension) Job Description: The PKI Migration Technical Lead will be responsible for leading the migration of Microsoft and Digicert Public Key Infrastructure (PKI) solutions. This role involves overseeing the planning and implementation of PKI migration projects, ensuring that all security and compliance requirements are met. The Technical Lead will work closely … with various stakeholders, including IAM, security, and business teams, to ensure a smooth and secure migration process. Key Responsibilities: Lead the planning and implementation of the Micorosoft and Digicert PKI migration project. Ensure compliance with security policies and standards. Collaborate with IAM, security, and business teams to gather requirements and develop migration strategies. Oversee the configuration and deployment of … Develop and maintain documentation related to PKI migration processes and procedures. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. 5+ years of experience in management and migration of Microsoft and Digicert PKI solutions. Strong understanding of PKI concepts, digital certificates, encryption algorithms, and keymanagement practices. Experience in M&A projects. Knowledge More ❯
London, England, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
the evolving world of cloud, digital and platforms. Role purpose/summary The PKI Migration Technical Lead will be responsible for leading the migration of Microsoft and Digicert Public Key Infrastructure (PKI) solutions. This role involves overseeing the planning and implementation of PKI migration projects, ensuring that all security and compliance requirements are met. The Technical Lead will work … closely with various stakeholders, including IAM, security, and business teams, to ensure a smooth and secure migration process. Key Responsibilities: Lead the planning and implementation of the Microsoft and Digicert PKI migration project. Ensure compliance with security policies and standards. Collaborate with IAM, security, and business teams to gather requirements and develop migration strategies. Oversee the configuration and deployment … Develop and maintain documentation related to PKI migration processes and procedures. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. 5+ years of experience in management and migration of Microsoft and Digicert PKI solutions. Strong understanding of PKI concepts, digital certificates, encryption algorithms, and keymanagement practices. Experience in M&A projects. Knowledge More ❯
Newcastle upon Tyne, England, United Kingdom Hybrid / WFH Options
Leonardo
by a team of consultants, engineers, and specialists. The role may involve a hybrid working model, combining remote work and on-site collaboration at one of Leonardo's offices. Key Responsibilities Work with a team to deliver cyber and information security across the engineering lifecycle. Interpret customer requirements into security management plans, statements of work, and activities. Oversee … certification. Experience should include: 3+ years in a cyber/engineering role. Involvement in MOD accreditation and secure design processes. Knowledge of standards like NIST SP 800-series. Risk management in compliance with regulations. Experience with proprietary and open-source software, firmware, hardware. Design analysis and security design development. Cyber risk assessment, threat modeling, vulnerability analysis. Security verification, validation … and remedial planning. Collaboration with engineers and architects for secure solutions. Nice to have: Understanding of engineering lifecycle. Knowledge of cryptographic technologies, keymanagement, COMSEC, MOD/NCSC standards. Knowledge of Cyber Security & Airworthiness standards. Security Clearance Eligible for full security clearance. More info: UK Security Clearance Levels Life at Leonardo Benefits include flexible working, private healthcare, generous More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Leonardo SpA
and working on site at one of our Leonardo offices to ensure close collaboration with the wider team and with our customers. Talk to us to find out more. Key Responsibility Areas Work as part of a larger team, delivering streams of work independently, to meet all aspects of the cyber and information security delivery across an engineering lifecycle. … Interpreting customer requirements into actionable security management plans, statements of work, and activities to be delivered across the lifecycle. Oversight and delivery of associated statements of work and artefacts to time, cost and quality constraints. Identification, management and escalation of technical and delivery risks and issues. Maintain customer relationships for the cyber and information security workstream, both internal … robust solutions, including advising on suitable product or platform lockdown and configurations. It would be nice if you had: Understanding of the engineering lifecycle. Knowledge of current Cryptographic technologies, KeyManagement Systems & practical COMSEC implementations in line with MOD/NCSC standards. Knowledge of Cyber Security & Airworthiness (RCTA-DO-326A/B, 355A & 356A). Security Clearance You More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
RWE AG
business needs. Design, consultancy, standard setting and 3rd line support. Automation & Development: accelerating & improving services through end-to-end automation & high quality code development Operations: daily operational support & financial management, including operational availability, deployment patching, incident resolution, request fulfilment. Your responsibilities Senior technical expert/SME for Microsoft Azure platform security, policies and IT/general security representative for … a focus on MS Azure. Extensive experience understanding, impact assessing and implementing Azure IAM roles, policies, security groups, NACLs, encryption etc. Extensive experience using data-in-transit/certificate management, data-at-rest and keymanagement Experienced in use of Azure PaaS. Excellent experience using Azure logging. Experience of data centres and remote site security. Excellent experience … influencing the operational and roadmap decisions. Responsibility for IT services used by all RWE staff globally. Dynamic environment with opportunity to own digital change and improvements. Daily interaction with key customers across all RWE OpCos. Working closely with multi-national external service providers. Competitive salary and benefits package plus annual discretionary bonus. Open and diverse company culture. Flexible working More ❯
a comparable senior leadership role within a technology-driven organization Deep expertise in blockchain technologies, ideally staking mechanisms and consensus algorithms Background in on-premise infrastructure design, implementation, and management, with expert knowledge of data center technologies, virtualization, server hardware, and networking Expertise in data engineering, including the design and deployment of scalable data pipelines, data warehousing solutions, and … integration strategies In-depth understanding of cryptographic principles and secure keymanagement practices Familiarity with infrastructure cybersecurity principles and best practices for securing distributed systems A consistent track record of successfully delivering complex, infrastructure-focused technology solutions on time and within budget fast-paced environment What makes you stand out: Extensive experience with cloud computing platforms (AWS, Azure More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Dev/Null Security
in either Glasgow, Edinburgh, Manchester, Sheffield or Birmingham with some work-from-home flexibility. Your Impact Our Security Solutions Architect will: Architect secure, multi-tenant HSMaaS platforms for cryptographic keymanagement and operations. Design scalable, compliant HSM infrastructures. Integrate and optimise cloud and on-prem HSMs. Develop secure APIs and interfaces for HSM provisioning, access, and automation. Implement … strong access controls, key isolation, and secure lifecycle management. Establish cryptographic policies for key creation, usage, rotation, and destruction. Embed monitoring, logging, and attestation for cryptographic operations and HSM events. Perform threat modelling and security architecture reviews focused on HSM services. Define disaster recovery, high availability, and secure backup strategies for HSMaaS. Have familiarity with compliance frameworks and More ❯
London, England, United Kingdom Hybrid / WFH Options
Stott and May
Responsibilities: Drive, develop, and contribute to a Cryptography Operations roadmap and strategy Enhance cryptographic capabilities through in-house and partner integrations Implement and manage cryptographic keys Oversee cryptography and keymanagement processes Facilitate onboarding of new services and manage existing ones Lead secure key storage implementation Establish cryptography processes across the team Manage lifecycle of cryptographic keys … including reviews and replacements Collaborate with Cyber and InfoSec teams to integrate keymanagement practices Lead Cryptography Engineer – Technical Skills: Experience with key handling, segregation of duties, and split knowledge in cryptography Understanding of software delivery pipelines and automation of keymanagement Knowledge of responding to cryptography incidents Familiarity with HSM technologies, especially Thales, or More ❯
Luton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Security Engineer, Luton, Bedfordshire Client: LHH Location: Luton, Bedfordshire, United Kingdom Job Category: Other EU work permit required: Yes Job Views: 3 Posted: 10.06.2025 Expiry Date: 25.07.2025 Job Description: Key Responsibility Areas The successful candidate will report to the Head of Engineering Products and be responsible for providing security advice to product development teams in a range of areas … including: Production of Security Management Plans, work package descriptions, and cost estimates in support of product bids, services, and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis, and preparation of security management documentation for system accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques, and overseeing product development activities. Liaison … with Security Accreditors and Security Assurance Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets, and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams in support of evaluation activities. Preparation of TEMPEST Control Plans, advising development teams on appropriate implementation techniques, and liaising with TEMPEST test facilities. Advising development teams on suitable platform More ❯
Watford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
LHH Location: watford, hertfordshire, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 3 Posted: 10.06.2025 Expiry Date: 25.07.2025 col-wide Job Description: Key Responsibility Areas The successful candidate will report to the Head of Engineering Products and be responsible for providing security advice to product development teams in a range areas including … Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance … Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams in support of evaluation activities. Preparation of TEMPEST Control Plans, advising development teams on appropriate implementation techniques and liaising with TEMPEST test facilities. Advising development teams on suitable platform lockdown and configurations, and supporting Penetration More ❯
London, England, United Kingdom Hybrid / WFH Options
NextEnergy Group
Architect, you will define the security vision and implement secure-by-design principles across all organizational layers — from Operational Technology networks in the field to corporate business systems. A key aspect of this role involves collaboration with: Data Protection Officer (DPO): integrating privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: translating architecture patterns into robust, monitored … and recoverable configurations External security advisors & key technology suppliers: aligning architectural controls with best practices and supply chain security requirements This strategic yet practical role requires balancing security principles with delivery across cloud, on-premises, and SaaS environments. Key Responsibilities Develop and evolve enterprise security architecture standards covering IT, OT, and hybrid-cloud environments Incorporate security & privacy requirements … modeling, risk assessments, and security analyses for new projects and platforms Lead architecture on secure network topologies, including segmentation and zero-trust models Define standards for IAM, encryption, secrets management, and keymanagement aligned with ISO 27001/27019 and NIS2 Evaluate and select third-party security solutions and conduct vendor due diligence Serve as SME for More ❯
Bedford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance … Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams in support of evaluation activities. Preparation of TEMPEST Control Plans, advising development teams on appropriate implementation techniques and liaising with TEMPEST test facilities. Advising development teams on suitable platform lockdown and configurations, and supporting Penetration … test activities. Analysing penetration test results and preparation of remedial action plans. Prepare and implement through life support and maintenance for product security including vulnerability and patch management plans Lead security incident management teams during incident/crisis situations in conjunction with Head of Product Security for EW/FCA Review and maintain corporate product security policies. Deliver More ❯