and implementation of cryptographic software libraries, secure protocols, and secure IP blocks optimised for PQC algorithms. Drive the design and integration of software for use cases such as secure keymanagement, secure communication protocols, and cryptographic agility. Ensure the software architecture supports scalable and high-performance designs suitable for embedded systems, mobile, cloud, and data centre applications. Project … Management & Process: Support the execution of software projects using Agile methodologies, overseeing sprint planning, daily stand-ups, sprint reviews, and retrospectives to ensure predictable delivery. Coordinate cross-functional teams, including cryptographers, hardware engineers, and external vendors to ensure seamless integration of software and cryptography solutions. Implement and enhance rigorous testing and verification methodologies, including a robust CI/CD … with external stakeholders, including open-source communities and enterprise customers, to manage the integration and deployment of PQC software IP. Communicate technical concepts and development progress to executives, product management, and customers in a clear and actionable way. Security & Compliance: Ensure all software products meet the latest security standards and regulations for post-quantum cryptography. Maintain and enforce robust More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
call one week every four weeks About the Role Are you passionate about cybersecurity and cryptography? Our client in the Financial Services industry is looking for a Cryptography HSM & KeyManagement Specialist to join their global team. In this role, you'll help protect the their most sensitive data by managing encryption systems and digital keys that keep … our information secure.You'll work with cutting-edge cryptographic hardware, collaborate with teams across the business, and play a key role in maintaining the integrity and availability of our security infrastructure. What You'll Be Doing * Managing Hardware Security Modules (HSMs)and cryptographic infrastructure* Creating, storing, and retiring encryption keyssecurely across multiple platforms* Supporting incident and change managementprocesses* Collaborating … Contributing to project deliveryand continuous improvement initiatives What We're Looking For * Experience in cryptography and information security* Hands-on knowledge of HSM configuration and support* Familiarity with SSH key and certificate management* Understanding of Unix/Windows environments* Strong attention to detail and ability to work under pressure* Excellent communication and stakeholder management skills Nice to More ❯
Macclesfield, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
call one week every four weeks About the Role Are you passionate about cybersecurity and cryptography? Our client in the Financial Services industry is looking for a Cryptography HSM & KeyManagement Specialist to join their global team. In this role, you'll help protect the their most sensitive data by managing encryption systems and digital keys that keep … our information secure.You'll work with cutting-edge cryptographic hardware, collaborate with teams across the business, and play a key role in maintaining the integrity and availability of our security infrastructure. What You'll Be Doing * Managing Hardware Security Modules (HSMs)and cryptographic infrastructure* Creating, storing, and retiring encryption keyssecurely across multiple platforms* Supporting incident and change managementprocesses* Collaborating … Contributing to project deliveryand continuous improvement initiatives What We're Looking For * Experience in cryptography and information security* Hands-on knowledge of HSM configuration and support* Familiarity with SSH key and certificate management* Understanding of Unix/Windows environments* Strong attention to detail and ability to work under pressure* Excellent communication and stakeholder management skills Nice to More ❯
Warrington, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
AM-5 PM) + on-call one week every four weeks About the Role Are you passionate about cybersecurity and cryptography? Our client is looking for a Cryptography HSM & KeyManagement Specialist to join their global team. In this role, you'll help protect the their most sensitive data by managing encryption systems and digital keys that keep … our information secure.You'll work with cutting-edge cryptographic hardware, collaborate with teams across the business, and play a key role in maintaining the integrity and availability of our security infrastructure. What You'll Be Doing Managing Hardware Security Modules (HSMs)and cryptographic infrastructure Creating, storing, and retiring encryption keyssecurely across multiple platforms Supporting incident and change managementprocesses Collaborating … project deliveryand continuous improvement initiatives What We're Looking For Experience in cryptography and information security Ideally some hands-on experience of HSM configuration and support Familiarity with SSH key and certificate management Understanding of Unix/Windows environments Strong attention to detail and ability to work under pressure Excellent communication and stakeholder management skills Nice to More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
cybersecurity capabilities and looking for a Cryptography Specialist to join their team. This is a fantastic opportunity to work at the forefront of digital security, managing encryption systems and keymanagement processes that protect some of the organisation's most sensitive data. As part of this role, you will be responsible for some of the following areas: Manage … and maintain Hardware Security Modules (HSMs) and cryptographic infrastructure Create, store, rotate, and retire encryption keys securely across multiple platforms Support incident and change management processes related to cryptographic systems Collaborate with application, infrastructure, and support teams to ensure seamless integration Contribute to project delivery and continuous improvement initiatives To be successful in the role you will have: Experience … in cryptography and information security Hands-on experience with HSM configuration and support Familiarity with SSH key and certificate management Understanding of Unix and Windows environments This is a hybrid role with flexibility to work remotely, though occasional office presence may be required. Some of the benefits included with the role are listed below: Starting salary of More ❯
Telford, England, United Kingdom Hybrid / WFH Options
Vallum Associates
Title: PAM Consultant- SC Cleared Location: Hybrid – Stafford Park 1, Telford TF3 3BD (3 days/week Onsite) Duration: 3months+ Description We are seeking a highly experienced Privileged Access Management (PAM) Consultant to lead the assessment and strategic planning of PAM solutions within a complex hosting infrastructure. This role focuses on evaluating existing access control mechanisms, identifying risks associated … with over-privileged accounts, and recommending scalable PAM solutions tailored to diverse operating systems and on-premises environments. Key Responsibilities: • Conduct comprehensive assessments of internal infrastructure to identify privileged access risks and gaps. • Analyze current access provisioning models, especially where elevated permissions (e.g., root, Admin access) are broadly granted. • Analyze existing access control models and recommend enhancements using RBAC … PAM strategies with business and technical requirements. • Support PoC and pilot deployments to validate solution effectiveness. • Provide technical guidance on session monitoring, credential vaulting, access workflows, and policy enforcement. Key Skills & Experience: • 10+ years of experience in PAM consulting and implementation, with a strong focus on environmental assessment and solution design. • Strong expertise in RBAC and ABAC models, including More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
to identify implementation flaws. Conduct targeted tests to validate security concerns. Collaborate with cross-functional teams to integrate security into the development process. Help design secure firmware architectures for keymanagement, update processes, and hardware protections. Communicate risks and solutions effectively to technical and non-technical stakeholders. Required Skills and Experience: Experience securing hardware-firmware interfaces or embedded … systems. Hands-on expertise in C/C++ security code reviews. Knowledge of secure boot, key provisioning, firmware hardening, and trusted computing. Understanding of firmware attack surfaces such as fault and code injection, privilege escalation. Familiarity with isolation technologies like Arm TrustZone. Ability to perform and interpret security tests. Experience with advanced attack vectors like side-channel and fault More ❯