Crewe, Cheshire, United Kingdom Hybrid / WFH Options
Bentley Motors
security standards and legislations (all regions, e.g., GB44495, ISO/SAE21434, UNECE WP29/R155, GDPR, Data security). Proven experience in technical project management, particularly in planning and rolling out security functions. Technical knowledge of product security countermeasures, including Intrusion Detection Systems (IDS), Secure Onboard Communication (SOK), Vehicle … KeyManagement Systems (VKMS), TLS, etc. Excellent communication and collaboration skills. Strong problem-solving and analytical skills. Software/Programming knowledge (C, C++). Encryption algorithms knowledge. Ability to influence colleagues within your area of responsibility. Engineering degree or equivalent is essential. What Bentley Offers Hybrid working options More ❯
to join our team. This role is ideal for professionals who excel in supporting, maintaining, and optimizing critical IT infrastructure. You will play a key role in ensuring the high availability, security, and performance of our systems while troubleshooting complex issues efficiently. Additionally, you will participate in an on … call rota to provide 24/7 support for mission-critical systems. Key Responsibilities: Advanced Support & Troubleshooting: Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. Troubleshoot and resolve issues related to keymanagement systems, including HashiCorp Vault and Thales … Hardware Security Module. Manage and support privileged access management solutions (BeyondTrust) and SSO systems (KeyCloak). Have a strong foundation in networking principles. System Maintenance & Optimisation: Administer and optimise Windows Server 2022 and Hyper-V environments. Perform proactive monitoring and maintenance to ensure system performance and reliability. Implement and More ❯
to join our team. This role is ideal for professionals who excel in supporting, maintaining, and optimizing critical IT infrastructure. You will play a key role in ensuring the high availability, security, and performance of our systems while troubleshooting complex issues efficiently. Additionally, you will participate in an on … call rota to provide 24/7 support for mission-critical systems. Key Responsibilities: Advanced Support & Troubleshooting: -Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. -Troubleshoot and resolve issues related to keymanagement systems, including HashiCorp Vault and Thales … Hardware Security Module. -Manage and support privileged access management solutions (BeyondTrust) and SSO systems (KeyCloak). -Have a strong foundation in networking principles. System Maintenance & Optimisation: -Administer and optimise Windows Server 2022 and Hyper-V environments. -Perform proactive monitoring and maintenance to ensure system performance and reliability. -Implement and More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
leonardo company
line capability wherever and whenever required. We are looking for an experienced product security practitioner with expertise in developing and maintaining robust product security management systems for defence and government customers. The Chief Product Security Engineer will take responsibility for ensuring that all security aspects of the design, development … teams, including in terms of: Deriving security requirements Undertaking security risk assessments for products Preparing security risk mitigation plans Review and approval of Security Management plans Security policy maintenance and monitoring Production of LoB security metrics Management of attendance at external security forums Attendance and support to the … Security Special Interest Group Lead security incident management teams during incident/crisis situations in conjunction with the Lead Product Security Engineer(s) The Chief Product Security Engineer has delegated authority within the independent Design Integrity function, responsible for the following elements: Security process maintenance and monitoring Security competence More ❯
with IaC technology Ideally CloudFormation. Broad experience across AWS products. Strong skills and experience with suite of services and tools that address security, identity, management, governance, and compliance within AWS. Control Tower, IAM, AWS Organisations, CloudWatch, Secrets Manager, KeyManagement Service, WAF & Shield, Certificate Manager, Cognito Strong More ❯
with IaC technology - Ideally CloudFormation. Broad experience across AWS products. Strong skills and experience with suite of services and tools that address security, identity, management, governance, and compliance within AWS. Control Tower, IAM, AWS Organisations, CloudWatch, Secrets Manager, KeyManagement Service, WAF & Shield, Certificate Manager, Cognito Strong More ❯
makes you a great fit: University Degree (e.g. Bachelor or Masters) in Embedded Systems, Computer Science or similar. Understanding of microcontroller architecture, Cryptography and KeyManagement Fluent in reviewing source code written in one of these languages: C, C++, Assembly Understanding of secure communications (e.g. USB, Serial, Ethernet … workshops, reading professional publications, participating in technical working groups and cross-departmental task forces. Share knowledge and expertise through internal and external trainings. Time management, prioritization and task switching. Qualifications University Degree (Equivalent to Bachelors Degree) in Electronic/Computer Science/Computer Engineering/Electrical Engineering or a More ❯
makes you a great fit: University Degree (e.g. Bachelor or Masters) in Embedded Systems, Computer Science or similar. Understanding of microcontroller architecture, Cryptography and KeyManagement Fluent in reviewing source code written in one of these languages: C, C++, Assembly Understanding of secure communications (e.g. USB, Serial, Ethernet … workshops, reading professional publications, participating in technical working groups and cross-departmental task forces. Share knowledge and expertise through internal and external trainings. Time management, prioritization and task switching. Qualifications University Degree (Equivalent to Bachelors Degree) in Electronic/Computer Science/Computer Engineering/Electrical Engineering or a More ❯
Developer !! Location: Cardiff UK Job ID: 32973 The Operations Solutions team delivers software solutions used throughout the manufacturing organization targeting the industrialization and production management of HID products. Those solutions are deployed across the globe, at HID sites, and also at suppliers and contract manufacturer production sites. As a … Knowledge of electronic design & hardware is appreciated. Knowledge of communication interfaces over JTAG, SWD, UART, SPI, I2C is appreciated. Knowledge in applied cryptography and keymanagement is appreciated. Knowledge of Agile/SCRUM is appreciated. Knowledge of RFID industry standards such as ISO7816, ISO14443, ISO15693 is appreciated. Why More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
慨正橡扯
Job Description: In broad terms, you should have as many of the following as possible: Experience of owning a security risk management system for highly regulated products based on recognised frameworks such as aerospace, nuclear, automotive, rail or oil & gas; People management, mentoring and development skills; Practical experience … be desirable, but not essential , if you also had one or more of: Practical experience of ISO27001/27004/27005 or NIST Risk Management Framework (RMF); Knowledge of UK/NATO Information Assurance/Accreditation frameworks; Knowledge of EASA/FAA Airworthiness Certification frameworks; Awareness of current crypto … technologies, KeyManagement Systems & practical COMSEC; Chartered Engineer status with a recognised body; Awarded or looking to achieve an NCSC Certified Cyber Professional (CCP) recognition; Awareness of Information Security (INFOSEC), Communications Security (COMSEC), Transmission Security (TRANSEC), Product Safety and their inter-relationship; Experience of producing and delivering training More ❯
to lead the team and practice, which speaks volumes about the organisation and how they treat and develop their staff. Our client is a key player in the financial services space, and they are looking to hire two Cryptographic Engineers, so it’s an exciting time to join their … business. To be successful in this role, you must be able to demonstrate experience across secure keymanagement, HSMs, and cryptographic infrastructure. This is important as you will be stepping into a high-impact, global environment that places security and innovation at the forefront. The key skills … technical delivery role or infrastructure team where you are working on ITIL processes and can demonstrate experience across HSMs, PKI, and certificate/SSH key management. What’s on offer: £37,000--£45,000 + bonus and excellent benefits. Locations: Manchester with two days per week onsite. I know More ❯
Imagine being at the forefront of pioneering advanced cryptographic and keymanagement solutions, contributing to the confidential exchange of vital information on a global scale. This is a rare opportunity to join a leading company in the defence and security sector, offering unrivalled growth, innovation, and a chance … and maintenance of supporting test equipment. Manage all safety aspects related to V&V events and facilities used by the project. Act as a key stakeholder at design reviews and manage the use of external V&V facilities/test houses. What You Will Bring: Current SC security clearance More ❯
spanning from silicon to firmware layers. You'll collaborate with multi-functional teams to evaluate critical features like Root of Trust , secure boot flows , keymanagement , and trusted firmware execution , ensuring every layer of the stack meets or exceeds industry security standards. If you thrive at the intersection … Skills and Experience : A track record securing system architectures at the intersection of hardware and firmware. Deep experience in areas such as secure boot, key provisioning, firmware mitigations, and hardware-enforced isolation. Understanding of threat models including firmware exploitation, privilege-escalation, code injection, and side-channel attacks. Solid grasp More ❯
boundaries and drives meaningful change in intelligence and communications. Cyber Business Our Cyber business unit is at the forefront of pioneering advanced cryptographic and keymanagement solutions, facilitating the confidential exchange of vital information for customers operating at both tactical and strategic echelons. Join our team and participate More ❯
forward companies. You will lead conversations with customers about everything related to security and governance on the custody platform. This includes deployment models with KeyManagement Systems (HSMs and MPC), permission models, and features related to entitlements and policies. WHAT YOU'LL DO: Identify and secure commercial relationships … managers, and crypto natives who require digital asset custody solutions. 10+ years of experience in Sales/Business Development, Software/IT System product management, Technical Sales, Solution Architecture, or equivalent. 5+ years of relevant experience advising and selling to financial institutions. Demonstrated track record of successful sales or More ❯
technologies. You will work closely with developers, security engineers, and DevSecOps teams to integrate security into the entire software development lifecycle and enterprise infrastructure. Key Responsibilities: Develop and maintain comprehensive security architecture documentation aligned with business goals, enterprise target architecture, and industry standards. Design and implement security frameworks for … architecture or a related role, with expertise in cloud platforms (GCP preferred) and enterprise security. Strong knowledge of cloud-native security principles, including identity management, encryption, and network security. Proven experience architecting security solutions in microservice-based architectures and containerized environments (e.g., Kubernetes). Expertise in application security, including … services (IAM, VPC, Cloud KMS, Cloud Armor) and other cloud-native security tools. Solid understanding of data security practices, including encryption, access control, and key management. Experience in threat modelling, risk assessment, and defining security controls to mitigate risks in digital products and services. What's in it for More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
RWE AG
Extensive experience understanding, impact assessing and implementing Azure IAM roles, policies, security groups, NACLs, encryption etc. Extensive experience using data-in-transit/certificate management, data-at-rest and key management. Experienced in use of Azure PaaS. Excellent experience using Azure logging. Experience of data centres and remote … decisions. Responsibility for IT services used by all RWE staff globally. Dynamic environment with opportunity to own digital change and improvements. Daily interaction with key customers across all RWE OpCos. Working closely with multi-national external service providers. Competitive salary and benefits package plus annual discretionary bonus. Open and More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thales Group
customers, solving technical problems and operating in a fast-paced environment. Good working knowledge in Unix/Linux, Windows and MacOS. Good understanding and management of Windows Operating systems (Windows roles, MS Domain Services, MSCA, IIS, Credential Providers, ). Familiarity with virtual environments (VMware or equivalent), Microsoft security solutions … and Client-Server architectures. Good knowledge of database servers (MSSQL, Oracle RAC, or MySQL). Good understanding of networking. Good knowledge of cryptography and key management. Strong written and oral communication skills. Self-driven and motivated individuals. You should have a good understanding of authentication and authorization traffic flows … such as: Strong Authentication solutions based on One-time Password algorithms. Authentication solutions based on Public Key Infrastructures and certificates. Authentication solutions based on biometrics features. It would be preferred if you have familiarity with FIPS (Federal Information Processing Standards), Common Criteria, PKCS, Smartcards and Tokens. The successful candidate More ❯
and external project communications (meeting minutes, dashboards, etc.), providing regular and consistent updates to appropriate parties. Report on client project accomplishments and deliverables to management and different stakeholders. Lead the User Acceptance Test strategy. Define product/technical requirements which involve writing clear, thorough, and detailed user stories for … of relevant experience with an Advanced Degree in the job offered or in a related Product Manager, Systems Analyst, or Software Engineer occupation. Product management software tools such as Rally and Jira Align. Software development lifecycle in an e-commerce or web environment. Technical implementations of medium-large scale … and challenges. Experience in Identity solutions like oAuth, OpenID Connect, SAML, security tokens (JWS, JWE, access token, id token) or other IAM. Cryptographic knowledge & Key Management. Basic Understanding of B2B API integration. Analytical mind - Curious mindset with an interest in solving problems alongside strong analytical and quantitative skills, driving More ❯