PKI Senior Consultant
Join to apply for the PKI Senior Consultant role at DXC Technology.
We want to grow – grow with us!
DXC Technology (NYSE: DXC) is the world’s leading independent, end-to-end IT services company, helping clients harness the power of innovation to thrive on change. Created by the merger of CSC and the Enterprise Services business of Hewlett Packard Enterprise, DXC Technology serves 6,000 private and public sector clients across 70 countries. The company’s technology independence, global talent and extensive partner alliance combine to deliver powerful next-generation IT services and solutions. DXC Technology is recognized among the best corporate citizens globally.
Job Description
Against this background, you will be involved in our business area Cyber Security – one of the strategic areas of growth at DXC. With our Digital Identity – Key and Certificate Services Team we support our customers from the analysis of business processes to the design and implementation of innovative end-to-end solutions up to the support and further development of existing security solutions.
The responsibility of the Key and Certificate Services Senior Consultant is to develop solution architectures and improvement roadmaps addressing trust services requirements with our customers – especially around PKI and Key Management.
What will you do?
The Key and Certificates Services Senior Consultant will be designing, building, and deploying scalable and fault tolerant systems in on‑Premises and Cloud Offerings for a variety of clients in different industries. The role may require flexibility; you will mostly work in an Agile manner in small dedicated and collocated teams, and may also be required to work as part of a larger team. This is not a developer role, but you will need coding/scripting ability and an understanding of development processes and tools. You will integrate and build solutions using cloud configuration management and version control tooling. You will have a strong understanding of Public Key Infrastructure and Key Management and a good understanding of virtualization, infrastructure as a service and networking.
This role requires the ability to interact and influence at a high level within client organizations such as with CISOs and CIOs, to help them improve their overall data protection posture. You will demonstrate industry expertise and understanding of the security market and future trends. The role requires a UK national who holds or is willing to undergo SC clearance and possibly DV clearance.
Required Qualifications
A Computing or business degree; or equivalent
10+ years’ experience working in IT Security and Information Security in various industry sectors
Proven track record in successfully designing and implementing data protection solutions such as rights management, data leakage prevention, PKI, and Key Management
Proven track record of assessing client’s needs, providing advice to, and influencing management
Working knowledge of EU General Data Protection Regulation (GDPR) and its implementations in the different countries
Excellent interpersonal skills and a track record of developing strong client relationships
Positive and ambitious attitude, and ability to work on own initiative
Strong organisation, planning, and problem‑solving skills, ability to multi‑task and demonstrate flexible thinking
Excellent presentation and reporting skills in English (written and verbal)
Full mobility required; candidate must be able to drive
Desired Professional Accreditations
CISSP
CISM
CISA
Prince2/PMP or similar
ITIL
Essential Job Functions & Attributes
Able to listen and communicate well within the team and to internal stakeholders.
Self‑motivated, with the ability to work effectively both alone and within teams.
An analytical, enquiring, and challenging mind with a desire to build, automate and improve.
Suggest improvements and changes to increase value.
Be focused on the automation of solutions.
Create low‑level designs and review, providing feedback on high‑level designs.
Participate in re‑engineering of existing client solutions and services to ensure they leverage additional benefits provided through our Cloud Offerings.
Build and refresh core components of the Public Key Infrastructure and Cloud Infrastructures.
Build and rollout Public Key Infrastructure and Infrastructure and Environments for multiple clients.
Engineer and develop scripts, code, and configurations.
Be proactive and helpful in everything you do.
Basic Experience
Solid Public Key Infrastructure experience.
Solid Key Management experience, including BYOK and HYOK.
Solid Certificate Management and Automation Experience.
Proven track record with 3+ years of hands‑on experience in the above.
Experience in scripting in PowerShell, REST API, JSON.
Other Experience Sought
Experience and proficiency in security implementation best practices for Public Key Infrastructure, Key Management, Linux, Wintel, and Cloud Platforms.
Good knowledge of Virtualization Technologies and Cloud Services.
Secure Cloud Virtual/Managed Private Cloud experience.
Understanding of common network protocols and services (DNS, HTTP(S), SSH, FTP, DHCP, TCP/IP, Subnetting, etc.).
Understanding and deployment based on Security Principals and Security Best Practices.
Experience in working with baselines and understanding good engineering and release practices.
Experience with continuous integration and continuous deployment.
Experience with containerization.
Technical degree or equivalent education and experience.
Work Environment
Remote working usually.
Travel may be required, planned and coordinated; flexibility is required at times.
Occasionally may require weekend and evening work.
At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in‑person collaboration while offering flexibility to support wellbeing, productivity, individual work styles and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.
#J-18808-Ljbffr