delivery of secure, large-scale infrastructure across both private and public cloud environments. This position focuses heavily on enterprise PKI and trust services, integrating modern authentication, federation, and certificate management capabilities across highly assured platforms. Youll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering practical … scalable solutions to complex mission systems. Key Responsibilities: Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities, and Certificate Lifecycle Management systems Develop high-quality design artefacts, standards, and documentation for PKI, identity, and cross-domain architectures Provide technical guidance on Active Directory integration, federation services, and certificate-based … PKI and trust infrastructures (Root/Issuing CAs, RA, VA, CLM). Familiarity with Defence or government PKI ecosystems is advantageous Strong understanding of Active Directory, federation and identity management platforms, and certificate-based access controls Experience designing secure cloud solutions within private (VCF) and hyperscale (AWS, Azure, GCP) environments Knowledge of certificate auto-enrolment, keymanagementMore ❯
delivery of secure, large-scale infrastructure across both private and public cloud environments. This position focuses heavily on enterprise PKI and trust services, integrating modern authentication, federation, and certificate management capabilities across highly assured platforms. Youll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering practical … scalable solutions to complex mission systems. Key Responsibilities: Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities, and Certificate Lifecycle Management systems Develop high-quality design artefacts, standards, and documentation for PKI, identity, and cross-domain architectures Provide technical guidance on Active Directory integration, federation services, and certificate-based … PKI and trust infrastructures (Root/Issuing CAs, RA, VA, CLM). Familiarity with Defence or government PKI ecosystems is advantageous Strong understanding of Active Directory, federation and identity management platforms, and certificate-based access controls Experience designing secure cloud solutions within private (VCF) and hyperscale (AWS, Azure, GCP) environments Knowledge of certificate auto-enrolment, keymanagementMore ❯
with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, keymanagement, and secure protocols (TLS, SSH, etc.) Detailed understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network … support to thrive Whether through mentorship, training, or leadership opportunities, we invest in your success so you can make a lasting impact. We believe diverse teams, working together are key to driving growth and delivering business results. We recognise the importance of employee well-being. We prioritise in providing competitive benefit plans, including Private Medical cover, Employee Assistance Program More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
Opus Recruitment Solutions Ltd
resilient cloud applications Infrastructure as Code (IaC): Experience with IaC tools like AWS CloudFormation or Terraform to automate the deployment of AWS resources securely and efficiently. Identity and Access Management (IAM): Expertise in managing access to AWS services and resources securely, using AWS IAM to control authentication and authorization. Understanding of encryption methods and AWS services related to data … encryption both at rest and in transit. Experience with AWS KeyManagement Service (KMS) and AWS Certificate Manager (ACM). Knowledge of compliance requirements that impact cloud security (e.g., GDPR, HIPAA, SOC 2) and experience in implementing controls to meet these requirements. Ability to design and execute incident response strategies within the AWS cloud, including the use of More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
Reed
bring: Deep expertise in PKI and cryptographic solution design . Strong experience with Microsoft Certificate Services (CA, NDES, CEP/CES, AD DS). Advanced knowledge of SSL certificate management , including tools like OpenSSL and Certutil. Hands-on experience with Hardware Security Modules (HSMs) – ideally Thales – and KeyManagement Servers (KMS) . Proven capability in cloud-based More ❯
with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, keymanagement, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network More ❯
with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, keymanagement, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network More ❯
Location: BELFAST ARNOTT HOUSE, United KingdomThales people architect identity management and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange funds, people cross borders, energy become smarter and much more. More than … will also work to understand at a macro-level how customers are leveraging Imperva's product offerings, identify new emerging business and technical trends, and work closely with Product Management (PM) and Product Development (PD) to ensure the strategic product roadmaps align with evolving customer requirements and expectations. Key Areas of Responsibility: Drive product adoption, expansion, and customer … Contribute to the creation of content for the Digital CSM organization, Community, and other value-added collateral that can be shared with our customers at scale. Liaise with Product Management and Product Engineering teams to ensure a closed loop feedback model. Partner with services team members for health checks and value assessments. Build engagement playbooks and reach out to More ❯
Crypto trading infrastructure and OTC platform Responsibilities: Conduct vulnerability assessments, threat modeling, and penetration testing across infrastructure, smart contracts, and OTC-specific components Lead system hardening, network segmentation, identity management, and rapid incident response for DeFi and OTC environments Investigate security incidents and perform forensic analysis, particularly for OTC-related exploits like private key leaks or settlement disputes … Strong understanding of network security, firewall and VPNs Experience in scripting and automation skills in Python, Bash, or Ansible Knowledge of crypto-specific attack surfaces — exchange API security, private keymanagement, and wallet infrastructure Fluent in English To Apply: If you are interested in this role, please send us your CV or call us on +852 More ❯
web applications Engineering degree in Software, Computer Science, Cybersecurity or equivalent demonstrated knowledge. Strong C++ programming skills and/or web application framework , i.e. Angular Understanding of encryption algorithms, keymanagement, and secure protocols (TLS, SSH, etc.). Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and More ❯
years of experience in developing embedded firmware Engineering degree in Software, Computer Science, Cybersecurity or equivalent demonstrated knowledge. Strong C/C++ programming skills Understanding of encryption algorithms, keymanagement, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25) Familiarity with Linux, Windows, RTOS and network protocols More ❯
web applications Engineering degree in Software, Computer Science, Cybersecurity or equivalent demonstrated knowledge. Strong C++ programming skills and/or web application framework , i.e. Angular Understanding of encryption algorithms, keymanagement, and secure protocols (TLS, SSH, etc.). Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and More ❯
years of experience in developing embedded firmware Engineering degree in Software, Computer Science, Cybersecurity or equivalent demonstrated knowledge. Strong C/C++ programming skills Understanding of encryption algorithms, keymanagement, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25) Familiarity with Linux, Windows, RTOS and network protocols More ❯
We provide a global cyber defence approach that aims to protect, detect and respond to cyber threats with a portfolio including managed security services, industrial control system offerings, encryption, keymanagement and consultancy services. Our goal: Protect our customers and support their needs with cyber security products. We are passionate about cyber security. If you share our passion … technical level, often being required to attend technical workshops and customer briefings/service reviews. All Analysts are expected to be able to present and write professional reports to key stakeholders and exercise good time management. *This position can offer you:* Are you looking for challenging tasks in a company with some of the most creative cyber security technology … BTL1/BTL2 * PJMR * CREST (Registered Intrusion Analyst) (CRIA) *Soft Skills/Qualifications* * The 2nd Line Analyst is expected to be able to present and write professional reports to key stakeholders * All staff are expected to exercise good time management and work as part of a team You will work from Airbus Protect offices, Newport, South Wales, with More ❯
Senior Cybersecurity Engineer This role involves driving cybersecurity compliance (ISO/SAE 21434, UNECE WP.29), leading TARA activities, and supporting the Cybersecurity Management System (CSMS) across the product lifecycle. You will architect secure hardware (e.g., HSMs, Secure Boot, KeyManagement), guide threat assessments, interface with OEMs/Tier-1s, and mentor junior engineers. Experience with embedded hardware … cryptography, and secure product development is essential. Key Requirements 5+ years in automotive or semiconductor cybersecurity Expertise in CSMS, TARA, and ISO/SAE 21434 Strong background in secure hardware architecture (HSMs, crypto, secure boot) Experience with SoCs, MCUs, and automotive communication protocols Excellent cross-functional collaboration and technical leadership skills More ❯
levels of security and trust for customers operating in critical environments. Your work will contribute to the company's mission of engineering excellence, helping to develop advanced cryptographic and keymanagement solutions that protect vital information at both tactical and strategic levels. Location: This role is based in a highly collaborative and innovative environment in Maidenhead or Farnborough. More ❯
to delivering highly differentiated solutions by applying cutting-edge electronic, mechanical, and software technologies. As a Principal Software Engineer, you will contribute to the development of pioneering cryptographic and keymanagement solutions, ensuring the secure exchange of vital information for its customers. This role is an opportunity to join a team that thrives on innovation, collaboration, and excellence More ❯
Maidenhead, Woolley Green, Berkshire, United Kingdom
Jonathan Lee Recruitment Ltd
to delivering highly differentiated solutions by applying cutting-edge electronic, mechanical, and software technologies. As a Principal Software Engineer, you will contribute to the development of pioneering cryptographic and keymanagement solutions, ensuring the secure exchange of vital information for its customers. This role is an opportunity to join a team that thrives on innovation, collaboration, and excellence More ❯