At a Glance
- Tasks: Join us as a PKI Integrator, applying security best practices to implement cutting-edge PKI technology.
- Company: Work with a leading IT systems integrator in the UK defence sector, making a real impact.
- Benefits: Enjoy a competitive salary, bonus, car allowance, and opportunities for professional growth.
- Why this job: Be part of a dynamic team, tackling complex challenges while enhancing your skills in cryptography.
- Qualifications: Experience with PKI technologies, strong cryptography knowledge, and good interpersonal skills are essential.
- Other info: Candidates must be willing to undergo SC and DV clearance for this role.
The predicted salary is between 44000 - 66000 £ per year.
A PKI Integrator will be responsible for applying security best practices and industry standards derived from threat analysis to implement PKI technology according to design requirements. The role is for a client who is a leading IT systems integrator operating within the UK defence sector. The position requires strong theoretical knowledge as well as industry experience in applying advanced cryptography schemes to secure complex IT infrastructure, customer-facing services, and sensitive customer and enterprise data.
Your transferable skills and experience:
- Experience of delivering on-premise PKI using technologies such as Keyfactor (EBJCA), Microsoft PKI and OpenSSL;
- Experience of delivery of high assurance PKI to support Microsoft and Linux platforms;
- Expertise in both mainstream encryption schemes and key exchange protocols as well as quantum-safe cryptography;
- Experience in Powershell and OpenSSL;
- Experience in creation of policy documentation via interpretation of customer Certificate Policies in relation to PKI usage i.e. CPS / Key Signing Ceremonies;
- Good interpersonal skills and the ability to learn and adapt to work across both legacy and new technologies as part of a live system transitioned programme;
- Responsible for the delivery of new and ongoing change to work packages, in response to evolving user requirements;
- Creation and ownership of all related documentation artefacts relating to work packages including HLD, LLD, Installation guides.
Desirable – Experience across technologies such as:
- Familiarity with NIST post-quantum cryptography standardization & migration efforts;
- Familiarity with NIST Cryptographic Standards and Guidelines;
- Familiarity with IETF RFC standard and guidelines for PKI;
- Experience in the development and delivery of software using Agile Methodologies;
- Experience of working in secure environments (preferred).
This role will require you to be eligible and willing to undergo a high level of security clearance.
PKI Integrator employer: CBSbutler
Contact Detail:
CBSbutler Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land PKI Integrator
✨Tip Number 1
Familiarise yourself with the specific PKI technologies mentioned in the job description, such as Keyfactor, Microsoft PKI, and OpenSSL. Having hands-on experience or even a solid understanding of these tools will give you an edge during discussions.
✨Tip Number 2
Network with professionals in the defence sector, especially those who work with PKI. Attend relevant industry events or join online forums to connect with others who can provide insights or even referrals for the role.
✨Tip Number 3
Stay updated on the latest trends in cryptography and security best practices, particularly around quantum-safe cryptography. This knowledge will not only help you in interviews but also demonstrate your commitment to staying ahead in the field.
✨Tip Number 4
Prepare to discuss your experience with policy documentation and how you've interpreted customer Certificate Policies in past roles. Being able to articulate this clearly will show your capability in handling the responsibilities outlined in the job description.
We think you need these skills to ace PKI Integrator
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience with PKI technologies, cryptography schemes, and relevant tools like Keyfactor, Microsoft PKI, and OpenSSL. Use specific examples to demonstrate your expertise in delivering high assurance PKI solutions.
Craft a Strong Cover Letter: In your cover letter, express your enthusiasm for the role and the company. Mention your understanding of the defence sector and how your skills align with the job requirements, particularly in relation to security best practices and industry standards.
Highlight Relevant Experience: When detailing your work experience, focus on projects where you applied advanced cryptography and PKI technology. Discuss your role in creating policy documentation and any experience you have with Agile methodologies or secure environments.
Proofread Your Application: Before submitting, carefully proofread your application materials. Check for spelling and grammatical errors, and ensure that all information is clear and concise. A polished application reflects your attention to detail, which is crucial for this role.
How to prepare for a job interview at CBSbutler
✨Showcase Your Technical Expertise
Be prepared to discuss your experience with PKI technologies like Keyfactor, Microsoft PKI, and OpenSSL. Highlight specific projects where you applied advanced cryptography schemes and how they contributed to securing IT infrastructure.
✨Understand Security Clearance Requirements
Since this role requires SC and DV clearance, demonstrate your understanding of the security protocols involved. Be ready to explain how you would handle sensitive data and comply with security standards in your previous roles.
✨Demonstrate Adaptability
The job involves working across both legacy and new technologies. Share examples of how you've successfully adapted to changing technologies or user requirements in past projects, showcasing your ability to learn quickly.
✨Prepare Documentation Examples
As documentation is a key part of the role, bring examples of policy documents or technical artefacts you've created. Discuss your process for interpreting customer Certificate Policies and how you ensure compliance with PKI usage.