Architect to join our established team of PKI architects. You will support the delivery of highly secure network services into our customers within Defence and Central Government, performing a key role in a customer facing team. You will be working with the solution architects, security architects and project teams to deliver a high assurance service from design to delivery. … strategies/architectures. You should have established knowledge and skills in the following areas: A sound and extensive knowledge of PKI and Cryptography solution design Experience in MS Certificate Management Services (Certification Authority, Online Responder, Network Device Enrollment (NDES) Services, Certificate Enrollment Web Services (CEP/CES), Active Directory Domain Services and certificate management solutions. Expert level experience … in SSL certificate management concepts, processes, solution management and tools including OpenSSL and Certutil. Hardware security module (HSM) technology and KeyManagement Server (KMS) technology. Direct experience with Thales HSM platforms is highly desirable. Expert level experience in cloud solution development with Azure or AWS architectures as is related to PKI management. Extensive Cryptography & PKI solution More ❯
roadmap and vision. 3) To own the Security, Data Assurance and Quality for both core D&A systems and the wider technology architecture. 1. Data & Analytics (D&A) Infrastructure Management: Develop, maintain, and optimize the D&A architecture on AWS and Azure, including the design, deployment, and maintenance of the cloud based Pladis' data platform (PDP). Deliver an … AI solutions that are robust, scalable, and in line with business requirements. Integrate generalized AI models into business processes and ensure they harmonize with existing systems. 6. AI Data Management and Storage: Manage and safeguard data for AI models, emphasizing governance, quality, security, and accessibility. Design storage solutions optimized for real time processing, querying, and scalability. Collaborate with data … Docker and Kubernetes. Infrastructure Automation: Terraform, Ansible, and AWS CloudFormation. API & Microservices: API Development: RESTful API design and GraphQL. Microservices Tools: Istio, Envoy, and Linkerd. Security & Governance: Identity & Access Management: AWS IAM, Azure Active Directory. Data Governance Tools: AWS Lake Formation, Azure Purview. Data Security Tools: AWS KeyManagement Service (KMS), Azure Key Vault. Data Analytics More ❯
objectives, and improve the quality of the service it delivers both internally and externally. Be a part of the professional culture within the team where ownership and quality are key values. Main Responsibilities: Support & Infrastructure: Monitor and resolve issues affecting the delivery of services to our clients; Manage application licensing; Keep up to date with the latest infrastructure and … Support the ongoing modernization process. Security: Maintain an understanding of the regulatory and compliance issues driving Sequel's ISMS; With leaders across the business, assist with the maintenance and management of Sequel's Risk Registers; Gain an understanding of the key information risks to the business (systems, networks, data, human error, cyber-attacks); Engage in information security audits … at least CII certification to appreciate how the insurance industry works. Knowledge and Experience: Essential: A minimum of 2 years in an infrastructure, SysOps or Security role; Active Directory management; NTFS permission & Group Policy configuration & management; Microsoft RDS Architecture (RemoteApp/RDWeb Gateway/RDS Broker); Virtual Windows 2016 DC Servers/File Server with SMB file shares More ❯
victories together. About the Role As a Security Software Engineer, your role involves architecting, designing, and implementing end-to-end security controls to impact the global user base. A key focus is on developing automated, scalable security solutions to enhance efficiency and protect Roku. This position requires expertise in creating and extending security automation tools, including detection and process … designing, and implementing End-to-End Security solutions and controls. Your work will directly impact our global user base Focusing on Automation. Developing automated, scalable security solutions. Efficiency is key Administering HashiCorp Vault for secrets management Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure Applying cryptography and security design … principles to cloud environments Documenting playbooks, procedures, and architecture Providing subject matter expertise to software development groups to assist in cryptography and keymanagement/authentication API. We are excited if you have Passion for cybersecurity with an effective and passionate drive to protect digital assets. Experience implementing custom, cloud-agnostic IAM at scale Navigate the complexities of More ❯
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
NextEnergy Group
Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed service deliverables, and secure software supply chain requirements This is a strategic yet hands-on role that balances … secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI/CD pipelines and infrastructure as code, working closely with product … architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secrets management and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M and More ❯
regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including: Security Command Center VPC Service Controls IAM (Identity & Access Management) Cloud Logging and Monitoring Workload Identity Federation Automate security response using Python, Terraform, or XSOAR. Collaborate with infrastructure and DevOps teams to embed security into CI/CD pipelines … Experience as SOC lead, cyber operations manager, or similar role. Hands-on experience in securing Google Cloud Platform (GCP) environments across multiple projects/accounts. Strong expertise in: SIEM management (Chronicle, Splunk, Elastic) Incident response and recovery Security orchestration (SOAR), preferably Chronicle + XSOAR IAM, policy enforcement, logging, and access reviews in GCP Proven experience working in FinTech or … OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and KeyManagement Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. Influence More ❯
London, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including: Security Command Center VPC Service Controls IAM (Identity & Access Management) Cloud Logging and Monitoring Workload Identity Federation Automate security response using Python, Terraform, or XSOAR. Collaborate with infrastructure and DevOps teams to embed security into CI/CD pipelines … Experience as SOC lead, cyber operations manager, or similar role. Hands-on experience in securing Google Cloud Platform (GCP) environments across multiple projects/accounts. Strong expertise in: SIEM management (Chronicle, Splunk, Elastic) Incident response and recovery Security orchestration (SOAR), preferably Chronicle + XSOAR IAM, policy enforcement, logging, and access reviews in GCP Proven experience working in FinTech or … OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and KeyManagement Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. Influence More ❯
Luton, England, United Kingdom Hybrid / WFH Options
LHH
Key Responsibility Areas The successful candidate will report to the Head of Engineering Products and be responsible for providing security advice to product development teams in a range areas including: Production of Security Managements Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis … and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams … supporting Penetration test activities. Analysing penetration test results and preparation of remedial action plans. Prepare and implement through life support and maintenance for product security including vulnerability and patch management plans Lead security incident management teams during incident/crisis situations in conjunction with Head of Product Security for EW/FCA Review and maintain corporate product security More ❯
Global Services is in short, the backbone of BCG. What You'll Do Join Us in BCG Worldwide IT! We are seeking an exceptional data protection expert to play key role in our growing Information Protection team, as an IT Data Protection Security Engineer. You will be part of a growing team, providing world class Security Engineering, Architecture and … Operations, driving and supporting improvements globally to our Information Protection Portfolio. You will be: Engaging collaboratively with application development, data protection, information security, and risk management teams to understand and implement data security solutions. Supporting vendor assessments, including proof of concepts & security technologies research Continuously improving data protection services based on input from a diverse network of internal and … You can successfully interface and connect with skilled technologists and non-technical stakeholders, including members of the C-suite Ability to work in an Agile environment leveraging strong work management, organizational and planning skills You have an ability to work well independently, as well as part of a geographically dispersed team bringing a sense of urgency to the tasks More ❯
Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance … Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams in support of evaluation activities. Preparation of TEMPEST Control Plans, advising development teams on appropriate implementation techniques and liaising with TEMPEST test facilities. Advising development teams on suitable platform lockdown and configurations, and supporting Penetration … test activities. Analysing penetration test results and preparation of remedial action plans. Prepare and implement through life support and maintenance for product security including vulnerability and patch management plans Lead security incident management teams during incident/crisis situations in conjunction with Head of Product Security for EW/FCA Review and maintain corporate product security policies. Deliver More ❯
Our client a leading defence and security company is seeking to recruit experienced security engineers with expertise in developing and maintaining product security management systems for defence and government customers. About the Role This position will report to the Head of Engineering Projects and will take responsibility for all security aspects of product design, development, verification and maintenance through … Plans, work package descriptions and cost estimates in support of product bids, services and proposals. Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis and preparation of security management documentation for system Accreditation. Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance … Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams in support of evaluation activities. Preparation of TEMPEST Control Plans, advising development teams on appropriate implementation techniques and liaising with TEMPEST test facilities. Advising development teams on suitable platform lockdown and configurations, and supporting Penetration More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
RWE AG
business needs. Design, consultancy, standard setting and 3rd line support. Automation & Development: accelerating & improving services through end-to-end automation & high quality code development Operations: daily operational support & financial management, including operational availability, deployment patching, incident resolution, request fulfilment. Your responsibilities Senior technical expert/SME for Microsoft Azure platform security, policies and IT/general security representative for … a focus on MS Azure. Extensive experience understanding, impact assessing and implementing Azure IAM roles, policies, security groups, NACLs, encryption etc. Extensive experience using data-in-transit/certificate management, data-at-rest and keymanagement Experienced in use of Azure PaaS. Excellent experience using Azure logging. Experience of data centres and remote site security. Excellent experience … influencing the operational and roadmap decisions. Responsibility for IT services used by all RWE staff globally. Dynamic environment with opportunity to own digital change and improvements. Daily interaction with key customers across all RWE OpCos. Working closely with multi-national external service providers. Competitive salary and benefits package plus annual discretionary bonus. Open and diverse company culture. Flexible working More ❯
critical and cyber-resilient embedded software. This is a high-impact technical leadership role focused on delivering robust, standards-compliant solutions for complex, connected systems across high-reliability industries. Key Responsibilities Drive the end-to-end secure software development lifecycle (SSDLC) for safety-critical applications. Develop threat models, conduct risk assessments, and implement effective mitigations for embedded systems. Lead … solutions. Perform software FMEA, hazard analysis, and support FMEDA and safety case creation. Review code and architecture for vulnerabilities, safety gaps, and adherence to safety/security requirements. Integrate key security features including secure boot, cryptographic protocols, authentication, and PKI. Mentor team members on secure coding, safety best practices, and process improvements. Required Qualifications B.S. in Computer Science, Computer … Deep knowledge of functional safety principles and frameworks (IEC 61508, ISO 26262, etc.). Strong understanding of embedded cybersecurity principles: Secure communications, encryption (symmetric/asymmetric), secure boot, and keymanagement Identity and access control Vulnerability assessment and threat modeling Hands-on experience implementing or auditing SSDLC practices. Excellent communication and documentation skills. Preferred Qualifications Penetration testing or More ❯
change lives. In the United Kingdom and Ireland, Reapit's market-leading technology product suite provides estate and lettings agents with powerful tools covering lead generation, sales, lettings, property management, block management, client accounts, keymanagement and analytics, underpinned by a robust, security infrastructure. Worldwide, Reapit technology is used by over 78,000 agents in more … than 15,000 branches, with over a million properties under management; enabling them to run their businesses, identify opportunities for growth, manage their properties, collect rent, communicate with their clients, and deliver an outstanding customer experience, every time. What you'll be doing Reporting to the Head of Architecture you'll be involved in: Improving resilience and redundancy of More ❯
a comparable senior leadership role within a technology-driven organization Deep expertise in blockchain technologies, ideally staking mechanisms and consensus algorithms Background in on-premise infrastructure design, implementation, and management, with expert knowledge of data center technologies, virtualization, server hardware, and networking Expertise in data engineering, including the design and deployment of scalable data pipelines, data warehousing solutions, and … integration strategies In-depth understanding of cryptographic principles and secure keymanagement practices Familiarity with infrastructure cybersecurity principles and best practices for securing distributed systems A consistent track record of successfully delivering complex, infrastructure-focused technology solutions on time and within budget fast-paced environment What makes you stand out: Extensive experience with cloud computing platforms (AWS, Azure More ❯
blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures-and business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the … You can successfully interface and connect with skilled technologists and non-technical stakeholders, including members of the C-suite Ability to work in an Agile environment leveraging strong work management, organizational and planning skills You have an ability to work as part of a geographically dispersed team bringing a sense of urgency to the tasks at hand Must have … for hybrid and multi-cloud environments Strong background in secure, software-defined networking and micro-segmentation Hands-on with modern engineering practices-Agile, DevSecOps, automated testing Familiarity with secrets management/certificate lifecycle automation Solid grasp of cryptographic keymanagement and enterprise PKI operations Experience with Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platforms More ❯
encryption, access controls and data masking Manage data encryption solutions to ensure the confidentiality and integrity of sensitive data. Collaborate across the Security Team to develop and deliver encryption keymanagement processes and systems. Ensure security across the Data & Analytics technology stack consists primarily of: Oracle tools, Snowflake, Postgres, various AWS Services (SageMaker, Lambda, Step Functions, DMS, S3 More ❯
encryption, access controls and data masking Manage data encryption solutions to ensure the confidentiality and integrity of sensitive data. Collaborate across the Security Team to develop and deliver encryption keymanagement processes and systems. Ensure security across the Data & Analytics technology stack consists primarily of: Oracle tools, Snowflake, Postgres, various AWS Services (SageMaker, Lambda, Step Functions, DMS, S3 More ❯
PKI Engineer Remote 5 months - extensions £720 per day inside ir35 - umbrella only Role overview: Lead the architecture, design, and operations of Public Key Infrastructure (PKI) solutions. Manage Hardware Security Modules (HSMs), ensuring secure cryptographic key management. Oversee the migration of legacy PKI to a modern replacement solution. Implement Public-Key Cryptography Standards (PKCS), chains of trust … and Certificate Signing Requests (CSRs). Collaborate with cybersecurity teams to integrate PKI into broader security architecture. Provide hands-on expertise with HSMs, ensuring compliance with security standards. Key Skills & Experience: Strong expertise in PKI architecture, operations, and security best practices. Hands-on experience with HSMs in enterprise environments. Deep knowledge of PKCS, certificate management, and trust models. More ❯
PKI Engineer Remote 5 months - extensions £720 per day inside ir35 - umbrella only Role overview: Lead the architecture, design, and operations of Public Key Infrastructure (PKI) solutions. Manage Hardware Security Modules (HSMs), ensuring secure cryptographic key management. Oversee the migration of legacy PKI to a modern replacement solution. Implement Public-Key Cryptography Standards (PKCS#11), chains of trust … and Certificate Signing Requests (CSRs). Collaborate with cybersecurity teams to integrate PKI into broader security architecture. Provide hands-on expertise with HSMs, ensuring compliance with security standards. Key Skills & Experience: Strong expertise in PKI architecture, operations, and security best practices. Hands-on experience with HSMs in enterprise environments. Deep knowledge of PKCS#11, certificate management, and trust models. More ❯
in bridging the gap between development, security, and operations. This is an individual contributor role, where you will spearhead initiatives and guide the team on best practices without direct management responsibilities. Key Responsibilities: Design, implement, and maintain secure cloud infrastructure in GCP. Develop and manage infrastructure as code (Terraform, Kubernetes) to ensure repeatable, scalable, and secure environments. Automate … workflows, build scripts, and operational tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as keymanagement, vulnerability scanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration and delivery (CI/CD … depth knowledge of DevSecOps tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerability scanning, encryption, authentication, and secrets management (Vault, KeyManagement Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when working as part of a team More ❯
as a Subject Matter Expert (SME) in Windows-based enterprise infrastructures. You'll play a central role in the design, deployment, and support of high-security systems that underpin key defence and aerospace operations. Your Impact Take ownership of complex technical issues through to resolution, collaborating with users and other IT teams. Provide expert-level troubleshooting for incidents escalated … Endpoint & Configuration: Windows 10 & 11 Microsoft Endpoint Configuration Manager (MECM) Monitoring & Observability: Microsoft System Centre Operations Manager (SCOM) PKI Technologies: Microsoft Certificate Services, Hardware Security Modules (HSMs), and lifecycle keymanagement Security Clearance This role is subject to pre-employment screening in line with the UK Government's Baseline Personnel Security Standard (BPSS). An additional range of … to mental health support, financial advice, and employee-led networks championing inclusion and diversity (Enable, Pride, Equalise, Armed Forces, Carers, Wellbeing and Ethnicity). Rewarding Performance : All employees at management level and below are eligible for our bonus scheme. Never Stop Learning : Free access to 4,000+ online courses via Coursera and LinkedIn Learning. Refer a friend: Receive a More ❯
work with teams and communicate complex technical concepts to all partners. What you will do Provide implementation and operations support for security event and information monitoring, digital certificate and keymanagement processes, endpoint security, and web application security. Perform infrastructure security platform implementation, patching, and lifecycle management. Provide guidance to all lines of business on security related to … in computer science, Information Security, or equivalent system security engineering experience. 2+ years of experience. 1-2 years in an engineering role with a focus on endpoint protection, certificate management, SEIM, or web application security. Experience supporting/working with multiple operating systems including Windows Server and Linux/UNIX. Hands-on experience with cybersecurity products and concepts such … as EDR/XDR, endpoint protection, SEIM, PKI, CA, HSM, key vaults, encryption services, web application security/web application firewall/bot protection, ATOs. Support projects including product upgrades and deployment of new capabilities, tools, and enhancements and daily operational support. Ability to present technical issues to non-technical audiences. What We Offer Open and dynamic working atmosphere. More ❯
infrastructure systems, ensuring their reliability and security. You will work with cutting-edge technologies and participate in an on-call rota to support business-critical systems 24/7. Key Responsibilities: -Provide technical support for VMware platform, Tanzu, Dell VxRail, and Dell Data Domain. -Troubleshoot keymanagement systems like HashiCorp Vault and Thales HSM. -Support privileged access … management solutions (BeyondTrust) and SSO systems (KeyCloak). -Have a foundational knowledge of network principles. System Maintenance: -Administer and maintain Windows Server 2022 and Hyper-V. -Monitor system performance and conduct routine maintenance. -Contribute to disaster recovery and business continuity strategies. Collaboration & Documentation: -Work with senior engineers and cross-functional teams to enhance infrastructure. -Maintain thorough documentation for systems More ❯