Location: Knutsford Job Type: Contract Industry: Cloud & Infrastructure Job reference: BBBH438064_1777630601 Posted: 3 days ago
Role Title: Cryptography SME
Duration: contract to run until 30/11/2026
Location: Knutsford, Hybrid 3 days per week onsite
Rate: up to £374.26 p/d Umbrella inside IR35
Role purpose / summary
1. Undertake all team activities in line with client wider strategy, Crypto strategy and departmental goals.
2. Ensure the integrity and availability of cryptographic and key management services to business functions and applications.
3. Maintain accurate environment documentation, process and device categorisation.
4. Provide ongoing assurance that risk and compliance requirements are being conducted to a satisfactory level & are evidenced to a required level.
5. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure.
6. SSH Key Management.
7. Certificate management
8. HSM configuration/installation/support
9. Incident management
10. Change management
11. ITIL
12. Ensure the integrity and availability of cryptographic and key management services to business functions and applications
Key Accountabilities
13. Cryptographic Hardware Management - including on site local configuration activities
14. Support with resourcing, scheduling and distribution of work requests for HSM and Key management. Work closely with dates set in cooperation with Service Management to ensure smooth continuity of services and operations. Deliver to the required SLAs for all service.
15. Gather, distribute, store, recover and delete cryptographic keys in accordance with defined procedures and to meet service, risk and governance requirements as part of a component handling team across a variety of platforms across core geographic locations globally.
16. Management of Cryptographic infrastructure to include Out of Hours Support, production of Monthly management information and risk statements.
17. Adherence to Group IT Security Standards.
18. Problem, Incident & Change Management including root cause identification.
19. Procedure / process development.
20. Project delivery.
21. Auditable Record Management.
22. Excellent Risk and Control Maintenance
23. Ensure governance and clear record keeping of activities undertaken to ensure an accurate audit trail required for attestation/Audit support.
24. Take a proactive approach to improving operations and customer experience / turnaround.
25. Assist in the management of any control issues identified via audits or other control issues.
Essential Skills/Basic Qualifications:
26. Experience in Cryptography / Information Security
27. ITIL Foundation
28. Batchelor Degree in Computer Science
29. Strong stakeholder management, able to influence and negotiate at all levels
30. Attention to detail and accuracy of work
31. Experienced at making informed decisions, against tight timescales
32. Able to prioritise and manage multiple tasks concurrently
33. Proficient in MS Office applications
Desirable skills/Preferred Qualifications:
34. Experience in IT Security roles
35. Knowledge of cryptography
36. Industry relevant Security qualifications.
37. Industry relevant Project Management qualifications.
38. Experience in an Operational environment
39. Operational documentation creation and maintenance.
40. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality
41. Strong in incident response procedures and standards, strong communication skills and ability to articulate complex events to management.
42. Experience of Sharepoint, Confluence and JIRA.
43. Unix/Windows O/S skills
44. Strong background in delivering privacy, compliance and data protection services
45. HSM vendors: Thales (primary), Entrust, Gemalto
46. Key management: Centralised, HSM backed, full lifecycle
47. PKI: Enterprise PKI, certificate and SSH key management
48. Crypto scope: Application, database, platform, legacy and distributed systems
49. Automation: Python/scripting expected for HSM and crypto ops
50. Governance: CISO owned, audit heavy, risk driven, on site controls
Key skills
51. Cryptography knowledge
52. Risk & Controls
53. Strategic thinking
54. PKI
55. HSM Management/Configuration
56. Key Management
57. Working with Vendors / working knowledge of their products (Thales/Entrust/Cryptomathic etc)
All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only be able to respond to successful applicants in the first instance. We thank you for your interest and the time taken to apply!