National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

PKI Security Architect

Swift
London
1 month ago
Applications closed

Related Jobs

View all jobs

PKI Engineer

Security Architect Lead

SECURITY ARCHITECT

Senior Cloud Security Architect (UK Nationals Only)

Cyber Security Engineer

Cyber Security Engineer

ABOUT US

We’re the world’s leading provider of secure financial messaging services, headquartered in Belgium. We are the way the world moves value – across borders, through cities and overseas. No other organisation can address the scale, precision, pace and trust that this demands, and we’re proud to support the global economy. 

We’re unique too. We were established to find a better way for the global financial community to move value – a reliable, safe and secure approach that the community can trust, completely. We’re always striving to be better and are constantly evolving in an ever-changing landscape, without undermining that trust. Five decades on, our vibrant community reflects the complexity and diversity of the financial ecosystem. We innovate diligently, test exhaustively, then implement fast. In a connected and exciting era, our mission has never been more relevant. Swift now has a presence in 200+ countries and legal territories to serve a community of more than 12,000 banks and financial institutions.

We are actively looking for candidates who are open and willing to relocate to the Netherlands. For selected candidates, we offer various types of support to make the relocation process as smooth as possible — including assistance with visa procedures, housing tips, and integration support.

What to expect

Define a broad enterprise PKI strategy and reach alignment across the organization. Design the security architecture for a state-of-the-art and future-proof PKI infrastructure, with adequate Certificate Authority (CA) topology, PKI technology, certificate lifecycle management tools and other components. Lead the strategic transition of the PKI infrastructure to Post-Quantum Cryptography (PQC), ensuring that cryptographic systems are designed with cryptographic agility in mind. Closely collaborate with the IT and Operations teams in charge of deploying and operating the PKI infrastructure. Oversee critical PKI processes such as root key ceremonies and other essential CA processes to maintain the integrity and trust of our PKI systems. Develop and maintain detailed documentation of PKI processes. Ensure proper governance framework, certificate policies and practices statement are implemented and maintained. Define and implement robust and reliable incident, response, and recovery procedures.  Ensure compliance with relevant regulations and industry standards. Support internal and external audit reviews. Act as PKI centre of expertise, providing specialized knowledge and guidance on all aspects of PKI systems. Keep abreast with the latest trends, technologies, and industry best practices and serve as a key advisor.

What you need to be successful

Master’s degree in information technology, computer science, cybersecurity, or a related field. Over 10 years of professional experience, of which at least 3 years with proven track records in designing, deploying, managing, or auditing PKI infrastructures. Expertise in classic and post quantum cryptography, asymmetric algorithms (RSA, ECC, ECDH, ML-KEM, ML-DSA), and related protocols and standards (TLS, IPSec, S/MIME, CMS, XMLDsig…). Strong PKI expertise, including on digital certificates (X.509), public/private key, digital signature, non-repudiation, certificate revocation lists, key management, hardware security modules, ... Hands-on experience with Certification Authority and certificate lifecycle management solutions, such as Microsoft CA, Entrust, Venafi, AppViewX, Keyfactor or OpenSSL. Experience in developing, implementing, and managing PKI governance frameworks, policies and procedures (eg. policy management authority, certificate policies and practices statement, …). In-depth knowledge of PKI-relevant industry regulations and compliance standards. Excellent communication skills, with the ability to articulate complex technical concepts to non-expert audience. Drive and dynamism, with a strong result-orientation are also critical to your future success.

What we offer

We put you in control of career

We give you a competitive package

We help you perform at your best

We help you make a difference

We give you the freedom to be yourself

We give you the freedom to be yourself. We are creating an environment of unique individuals – like you – with different perspectives on the financial industry and the world. A diverse and inclusive environment in which everyone’s voice counts and where you can reach your full potential.

If you believe you require a reasonable accommodation to participate in the job application or interview process, please contact us to request accommodation.

Don’t meet every single requirement? At Swift, we are dedicated to building a workplace where people can bring their full selves and ideas to the team, so if you are excited about this role, we encourage you to apply even if you do not meet every single qualification.

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.

Part-Time Study Routes That Lead to Cyber Security Jobs: Evening Courses, Bootcamps & Online Masters

The frequency and sophistication of cyber-attacks have exploded in recent years, making cyber security one of the UK’s most in-demand skill sets. From safeguarding NHS patient data to defending FTSE 100 financial systems, organisations across sectors require qualified professionals—penetration testers, security analysts, incident responders and security architects—to protect critical infrastructure. Yet many professionals cannot pause their careers to upskill full time. Fortunately, an ecosystem of part-time learning pathways—evening courses, intensive bootcamps and flexible online master’s programmes—enables you to learn cyber security while working. This comprehensive guide explores every route: foundational CPD, immersive bootcamps, accredited online MScs, plus funding options, planning strategies and a real-world case study. Whether you’re an IT support technician, a software developer or a compliance manager aiming to pivot into security, you’ll discover how to build expertise at your own pace.

The Ultimate Assessment-Centre Survival Guide for Cyber Security Jobs in the UK

Assessment centres for cyber security positions in the UK are designed to mirror real-world threat landscapes and test both your technical acumen and soft skills under pressure. Across multiple stages—psychometric assessments, penetration testing exercises, incident response group tasks, case studies, interviews and even informal networking breaks—employers assess your ability to identify vulnerabilities, collaborate in high-stakes scenarios and communicate effectively. This guide walks you through each component, equipping you to stand out and secure your next role in cyber defence.