Finding the best job has never been easier
Share
What you will accomplish
HSM Integration: Design, implement, and integrate HSM solutions into our existing infrastructure, ensuring seamless operation and high security standards.
Key and Secrets Management: Develop and maintain efficient and secure key(KMS) and secrets management systems, including generation, storage, rotation, and revocation.
Security Policy Enforcement: Enforce strict security policies and processes to protect sensitive cryptographic materials and system integrity.
Performance Optimization: Optimize HSM performance to minimize latency and improve throughput for critical cryptographic operations.
Incident Response: Respond to security incidents involving KMS, HSMs, conducting thorough investigations and implementing corrective measures.
Documentation: Create comprehensive documentation, including system design documents, operational procedures, and security guidelines.
Stay Updated: Stay abreast of the latest advancements in HSM technologies, cryptographic algorithms, and security best practices.
Identify gaps and issues across systems and functional areas, proposes solutions, and drives those resolutions.
Champion best practices and advanced concepts and impact the business by delivering solutions that address business needs.
Lead and empower others, taking responsibility for small projects and collaborating across functional teams to influence change.
Actively seek feedback and ways to improve team performance and projects, demonstrating strong communication skills.
What you will bring
Strong understanding of cryptographic algorithms (RSA, ECC, AES, etc.) and protocols (TLS, SSL, SSH)
Proficiency in HSM technologies, including PCIe HSMs
Experience with programming languages such as C, C++, Java (and spring.io), Python, or Golang
Knowledge of security standards and compliance frameworks (PCI DSS, NIST, FIPS)
Strong problem-solving and analytical skills
Excellent attention to detail
Strong communication and documentation skills
Passion for security and a commitment to excellence
Preferred Qualifications:
Experience with cloud technologies
Knowledge of secure coding practices
Certification in security-related fields (CISSP, CISM, CISA)
This website uses cookies to enhance your experience. By continuing to browse the site, you agree to our use of cookies. Visit our for more information.
These jobs might be a good fit