National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

PKI Security Architect

Qabird
London
6 days ago
Create job alert

ABOUT US
We’re the world’s leading provider of secure financial messaging services, headquartered in Belgium. We are the way the world moves value – across borders, through cities and overseas. No other organisation can address the scale, precision, pace and trust that this demands, and we’re proud to support the global economy.
We’re unique too. We were established to find a better way for the global financial community to move value – a reliable, safe and secure approach that the community can trust, completely. We’re always striving to be better and are constantly evolving in an ever-changing landscape, without undermining that trust. Five decades on, our vibrant community reflects the complexity and diversity of the financial ecosystem. We innovate diligently, test exhaustively, then implement fast. In a connected and exciting era, our mission has never been more relevant. Swift now has a presence in 200+ countries and legal territories to serve a community of more than 12,000 banks and financial institutions.
We are actively looking for candidates who are open and willing to relocate to the Netherlands. For selected candidates, we offer various types of support to make the relocation process as smooth as possible — including assistance with visa procedures, housing tips, and integration support. What to expect
Define a broad enterprise PKI strategy and reach alignment across the organization.
Design the security architecture for a state-of-the-art and future-proof PKI infrastructure, with adequate Certificate Authority (CA) topology, PKI technology, certificate lifecycle management tools and other components.
Lead the strategic transition of the PKI infrastructure to Post-Quantum Cryptography (PQC), ensuring that cryptographic systems are designed with cryptographic agility in mind.
Closely collaborate with the IT and Operations teams in charge of deploying and operating the PKI infrastructure.
Oversee critical PKI processes such as root key ceremonies and other essential CA processes to maintain the integrity and trust of our PKI systems. Develop and maintain detailed documentation of PKI processes.
Ensure proper governance framework, certificate policies and practices statement are implemented and maintained.
Define and implement robust and reliable incident, response, and recovery procedures.
Ensure compliance with relevant regulations and industry standards. Support internal and external audit reviews.
Act as PKI centre of expertise, providing specialized knowledge and guidance on all aspects of PKI systems.
Keep abreast with the latest trends, technologies, and industry best practices and serve as a key advisor.
What you need to be successful
Master’s degree in information technology, computer science, cybersecurity, or a related field.
Over 10 years of professional experience, of which at least 3 years with proven track records in designing, deploying, managing, or auditing PKI infrastructures.
Expertise in classic and post quantum cryptography, asymmetric algorithms (RSA, ECC, ECDH, ML-KEM, ML-DSA), and related protocols and standards (TLS, IPSec, S/MIME, CMS, XMLDsig…).
Strong PKI expertise, including on digital certificates (X.509), public/private key, digital signature, non-repudiation, certificate revocation lists, key management, hardware security modules, ...
Hands-on experience with Certification Authority and certificate lifecycle management solutions, such as Microsoft CA, Entrust, Venafi, AppViewX, Keyfactor or OpenSSL.
Experience in developing, implementing, and managing PKI governance frameworks, policies and procedures (eg. policy management authority, certificate policies and practices statement, …).
In-depth knowledge of PKI-relevant industry regulations and compliance standards.
Excellent communication skills, with the ability to articulate complex technical concepts to non-expert audience.
Drive and dynamism, with a strong result-orientation are also critical to your future success.
What we offer
We put you in control of career
We give you a competitive package
We help you perform at your best
We help you make a difference
We give you the freedom to be yourself
We give you the freedom to be yourself. We are creating an environment of unique individuals – like you – with different perspectives on the financial industry and the world. A diverse and inclusive environment in which everyone’s voice counts and where you can reach your full potential.
If you believe you require a reasonable accommodation to participate in the job application or interview process, please contact us to request accommodation.
Don’t meet every single requirement? At Swift, we are dedicated to building a workplace where people can bring their full selves and ideas to the team, so if you are excited about this role, we encourage you to apply even if you do not meet every single qualification.

#J-18808-Ljbffr

Related Jobs

View all jobs

PKI Engineer

PKI Architect

Splunk Security Architect - SC

Security Architect Lead

Principal Cyber Security Architect

Security Architect

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.

Cyber Security Jobs Employer Hotlist 2025: 50 UK Companies Actively Hiring Right Now

Bookmark this guide—refreshed every quarter—so you always know who’s really expanding their cyber security teams. Ransomware payouts broke records in 2024, the UK’s new Cyber Security Bill imposed mandatory breach disclosure, and the National Cyber Force’s move to Samlesbury has super‑charged the northern skills market. Result? Demand for security architects, SOC analysts, penetration testers, cloud‑security engineers, threat hunters & GRC specialists is at an all‑time high in 2025. Below you’ll find 50 organisations that have posted UK‑based cyber security vacancies or announced head‑count growth during the past eight weeks. They’re organised into five quick‑scan categories. For every employer you’ll see: Main UK hub Example live or recent vacancy Why it’s worth a look (tech stack, culture, mission) Search any company on CyberSecurityJobs.tech to view current ads, or set a free alert so fresh openings land straight in your inbox.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.