3 of 3 Key Management Jobs in Wiltshire

Security Architect - SC Cleared

Hiring Organisation
Coltech
Location
Swindon, UK
Employment Type
Full-time
gained experience specifically in data-centric security with attribute-based access control and SAML-based (or similar) identity enforcement, federation of trust and key management, all in a zero trust architecture. Knowledge of multi-level cross domain security gateways in a defence or national security context is also … important. Key Responsibilities Design and implement secure, scalable solution architectures Develop and maintain security architecture frameworks aligned to business and IT strategy Design secure cloud, application and network architectures Ensure consistent integration of security controls across platforms and systems Work closely with enterprise architects, infrastructure teams and developers Translate ...

Cloud Architect

Hiring Organisation
Ncounter Technology Recruitment
Location
Wiltshire, England, United Kingdom
infrastructure across both private and public cloud environments. This position focuses heavily on enterprise PKI and trust services, integrating modern authentication, federation, and certificate management capabilities across highly assured platforms. You’ll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with … NCSC principles while delivering practical, scalable solutions to complex mission systems. Key Responsibilities: • Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities, and Certificate Lifecycle Management systems • Develop high-quality design artefacts, standards, and documentation for PKI, identity ...

Technical Security Consultant (Hands on) - SC Cleared/Outside

Hiring Organisation
Sanderson Government and Defence
Location
Corsham, Wiltshire, South West, United Kingdom
Employment Type
Contract
Contract Rate
£600 - £750 per day
operational information technologies. Experienced with Cross Domain Security and Zero Trust architectures and Data Centric Security approaches including Identity Federation, Attribute-based Access Control, Key management and other related security solutions. Experienced with secure transactional or message distribution technologies. Strong communication and stakeholder management skills. Further desireable ...