National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Cyber Security Consultant

Searchability NS&D
Leeds
3 days ago
Create job alert

PKI Engineer


KEY BULLET POINTS

  • PKI Engineer– 3-month contract
  • £45ph / £340 per day (via Umbrella)
  • Mostly remote with occasional Central London site meetings
  • Experience withVenafi,TLS, andKubernetesrequired


ABOUT THE CLIENT

Our client is a major enterprise organisation operating across global markets, with high-scale security infrastructure at the heart of their operations. Due to a short-term delivery window, they’re seeking aPKI Engineerwith Venafi deployment expertise and deep TLS knowledge to support a critical project around secure certificate lifecycle management and Kubernetes integration.


THE BENEFITS

  • £340 per day / £45 per hour (via Umbrella, Inside IR35)
  • Initial 3-month contract
  • Mostly remote – occasional meetings onsite in central London
  • Opportunity to deliver on a security-critical enterprise project
  • Join a project with fast deployment timelines and high visibility


THE PKI ENGINEER ROLE

You’ll take a role in delivering secure PKI and TLS configuration usingVenafi Zero TouchandTLS Protect, with a strong focus on Kubernetes environments. You’ll be responsible for producing design documentation, shaping integration models, and supporting deployment strategy and implementation across the business.


PKI ENGINEER ESSENTIAL SKILLS

  • Experience deployingVenafi PKI Zero Touch
  • Venafi TLS Protectexperience
  • TLS for Kubernetes
  • Proven experience producingdesign documentationfor deployment/integration
  • Strong understanding of enterprise certificate management


TO BE CONSIDERED:

Please either apply through this advert or email me directly at . For more info, call me on/ 07889 589 648.

By applying, you give consent for us to process and submit your application to our client for this vacancy only.


KEY SKILLS

PKI, Venafi, TLS Protect, Zero Touch, TLS for Kubernetes, Certificate Management, Security Engineering, Design Documentation, NSD

Related Jobs

View all jobs

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.

Part-Time Study Routes That Lead to Cyber Security Jobs: Evening Courses, Bootcamps & Online Masters

The frequency and sophistication of cyber-attacks have exploded in recent years, making cyber security one of the UK’s most in-demand skill sets. From safeguarding NHS patient data to defending FTSE 100 financial systems, organisations across sectors require qualified professionals—penetration testers, security analysts, incident responders and security architects—to protect critical infrastructure. Yet many professionals cannot pause their careers to upskill full time. Fortunately, an ecosystem of part-time learning pathways—evening courses, intensive bootcamps and flexible online master’s programmes—enables you to learn cyber security while working. This comprehensive guide explores every route: foundational CPD, immersive bootcamps, accredited online MScs, plus funding options, planning strategies and a real-world case study. Whether you’re an IT support technician, a software developer or a compliance manager aiming to pivot into security, you’ll discover how to build expertise at your own pace.