AWS CloudHSM SME – PKI Implementation (Contract)

Luton
1 week ago
Create job alert

Job Title: AWS CloudHSM SME – PKI Implementation (Contract)

📍 Location: Hybrid /Luton
📅 Contract Length: 6+months
💰 Rate: [Competitive – Inside IR35]
🔐 Sector: Secure Cloud & Infrastructure Projects

We are seeking an experienced AWS CloudHSM Subject Matter Expert (SME) to support the design, deployment, and management of a secure Microsoft Active Directory Certificate Services (ADCS) Public Key Infrastructure (PKI) environment. This role is focused on implementing a robust AWS HSM-backed cryptographic architecture aligned with strict compliance and security standards.

The successful candidate will have deep expertise in AWS CloudHSM, cryptographic key management, and PKI implementations, and will work across multiple teams to ensure successful integration and operational stability in a secure cloud environment.

Key Responsibilities:🔹 AWS HSM & PKI Implementation:



Architect, deploy, and configure AWS CloudHSM to support Microsoft ADCS PKI environments.

*

Integrate HSM with Certificate Authorities (CAs), OCSP responders, and CRL management components.

*

Design secure key lifecycle management strategies – from generation to decommissioning.

*

Enable secure certificate issuance, revocation, and validation workflows.

*

Ensure high availability and disaster recovery configurations for HSM services.

*

Provide technical direction on cryptographic algorithms, protocols, and PKI operations.

🔹 Security & Compliance:

*

Ensure alignment with standards including FIPS 140-2 Level 3, NIST 800-57, ISO 27001, SOC2, and GDPR.

*

Implement role-based access control (RBAC), auditing, and key usage logging.

*

Conduct risk assessments and participate in compliance and security reviews.

*

Collaborate with InfoSec and Governance teams to enforce IAM and cloud security best practices.

🔹 Technical Support & Optimization:

*

Troubleshoot HSM-related issues, key/certificate lifecycle problems, and performance concerns.

*

Support cross-functional teams with integration, automation, and optimization initiatives.

*

Automate PKI and key management processes wherever applicable.

*

Maintain up-to-date documentation for architecture, processes, and support operations.

Key Skills & Experience:✅ AWS & HSM Expertise:

*

8+ years' experience with AWS CloudHSM, KMS, and cryptographic infrastructure.

*

Strong hands-on experience with IAM, EC2, VPC, CloudTrail, KMS, etc.

*

Deep understanding of HSM architecture, FIPS-compliant configurations, and secure key management practices.

✅ PKI & Cryptography:

*

Advanced knowledge of Microsoft ADCS, X.509 certificates, CA hierarchy, OCSP/CRL handling.

*

Familiarity with TLS/SSL, authentication protocols, and certificate-based access control.

*

Experience implementing PKI in cloud and hybrid enterprise environments

Related Jobs

View all jobs

AWS HSM SME

Cloud Security Architect, AWS ProServe India

AWS Enterprise / Technical Architect

AWS Technical Architect

Senior Cloud Security Engineer - AWS

Security Engineering Manager, AWS Security

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

BAE Systems Cybersecurity Jobs in 2025: Your Complete UK Guide to Protecting Governments, Businesses and Critical Infrastructure

From securing the Royal Navy’s new Dreadnought submarines to foiling multimillion‑pound fraud rings, BAE Systems Digital Intelligence (DI)—formerly Detica—sits at the sharp end of global cyber defence. Head‑quartered in Guildford with hubs in Gloucester, Leeds and London, the 5,500‑strong DI business delivers threat‑intelligence platforms, secure‑by‑design software and 24/7 SOC services to government and commercial clients worldwide. With escalating ransomware, AI‑driven disinformation and complex supply‑chain threats, BAE plans to expand its UK cyber workforce by 20 % in 2025. Whether you’re a graduate passionate about reverse engineering, a DevSecOps engineer who loves IaC, or an incident‑response pro comfortable in high‑side environments, this guide explains how to land a BAE Systems cybersecurity job in 2025.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.

Cyber Security Programming Languages for Job Seekers: Which Should You Learn First to Launch Your Security Career?

Cyber security has become a top priority for companies of all sizes, public institutions, and governments. As cyber threats evolve—from sophisticated ransomware attacks to large-scale data breaches—employers are eager to recruit talent with the skills to detect, prevent, and respond to security incidents. If you’re exploring roles on www.cybersecurityjobs.tech, a key question inevitably arises: Which programming language should you learn first for a career in cybersecurity? Cyber security is a multifaceted domain encompassing network security, application security, reverse engineering, digital forensics, ethical hacking (penetration testing), and more. Each niche may have unique language preferences—like Python for scripting tasks, C/C++ for exploit development, or Rust for building secure low-level tools. In this article, we’ll: Highlight the top programming languages used across cyber security. Break down pros, cons, and key use cases for each language. Present a simple beginner’s project for hands-on learning. Share essential resources and tips, so you can stand out in the competitive cybersecurity job market.