Overview :
We’re hiring an experienced Key Management & HSM Security Engineer to lead the design, deployment, and management of secure cryptographic infrastructure within the organization. The focus will be on Thales HSM (Luna) and CipherTrust platforms, enabling secure root key management and cryptographic operations for enterprise-scale workloads.
This role demands deep expertise in HSM integration , key lifecycle management , and cryptographic standards , along with the ability to work cross-functionally with application, infrastructure, and security teams.
Total Experience :
5 years of experience
Job Skills :
- Minimum 5 years of experience in HSM security, key management, and cryptographic services
- Hands-on experience with Thales Luna HSM and CipherTrust Manager
- Deep understanding of PKI, digital certificates, encryption algorithms (AES, RSA, ECC, SHA-256)
- Familiarity with key lifecycle controls, secure key storage, and enterprise-grade access controls
- Proficiency in scripting and automation using Python, Shell, or PowerShell
- Knowledge of compliance frameworks : ISO 27001, PCI DSS, NIST 800-57, FIPS 140-2 / 3
- Experience working with on-prem security appliances and cloud KMS (AWS, Azure, GCP)
Preferred Qualifications
Professional certifications : CISSP, CISM, CCSP , or Thales HSM certificationsExperience integrating HSMs with IAM systems, CI / CD pipelines, and enterprise applicationsFamiliarity with DevSecOps , API security, and secure software development principlesResponsibilities :
Lead deployment, configuration, and administration of Thales Luna HSM and CipherTrust ManagerImplement root key security controls to safeguard cryptographic assetsDefine and manage key lifecycle processes—creation, rotation, archival, decommissioningAutomate key provisioning and audit workflows using Python, Shell, or PowerShellEnsure adherence to compliance frameworks : FIPS 140-2 / 3, PCI DSS, NIST, GDPRSecurity Architecture & Compliance
Establish secure architecture for on-prem HSMs and integrate them into broader enterprise security posturePerform threat assessments and lead incident response efforts related to key compromise or misuseMaintain detailed documentation of architecture, operational procedures, and compliance reportsAlign HSM implementation with enterprise identity, access management, and PKI systemsIntegration & Support
Integrate HSMs with enterprise systems : applications, databases, file storage, certificate authoritiesProvide technical support for HSM infrastructure—troubleshooting key issues, crypto failures, performance bottlenecksDeliver internal training sessions and enforce key management best practices across technical teams