green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning A varied background, diverse programme exposure and a security based master's degree or alternatively STEM degree would be preferrable - however, an more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Hays Technology
Experience with a range of skills relevant to Cyber Security such as Operations, Architecture, Forensics, Software Development, System Administration (Windows and Linux), Incident Response, Cryptography, Compliance, System Integrations (API and Microservices), Testing, Endpoint security, Cloud Services, Data Management, Networking, End-User/Client devices, Identity and Access Management, Application Development more »
Qualifications and Skills: Minimum 5 years of experience in security architecture or a related field. Profound knowledge of security principles, such as access control, cryptography, and network/application security. Familiarity with security frameworks (e.g., NIST CF, ISO 27001, CSA CCM). Experience with SIEM systems, threat modeling (STRIDE, PASTA more »
log management, content filtering, etc. An excellent understanding of security approaches: ISMS, risk analysis and assessments, the CIA triad, attack vectors including social engineering, cryptography, confidentiality issues and cyber security incident response best practices, including triage and chain of custody Proactively identifies areas for improvement, shares lessons learned with colleagues more »
Rolling out, managing, and configuring a range of network security tools and appliances. Key Skills: SIEM Tenable.io/Nessus IDS/IPS, MFA, Proxies, Cryptography Security assessments Information Security best practices, policies, and procedures Penetration Testing/Ethical Hacking Solid understanding of computer networking - Routing/Switching, LAN/WAN more »
Winnersh, England, United Kingdom Hybrid / WFH Options
IDEMIA
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography, we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
Dartford, England, United Kingdom Hybrid / WFH Options
Europa Worldwide Group
administer, and maintain Network & Security platforms and any other related software, such as routers, switches, wireless, firewalls, intrusion detection/prevention, network access control, cryptography systems, monitoring, and cloud technologies/applications. Perform diagnostics, appraisal, and analysis on predominantly Cisco based Network & Security technologies, such as, firewalls, VPN’s, intrusion more »
Quantique is building the most secure end-to-end IoT platform. We are a transformative cybersecurity technology company, using the most advanced techniques in cryptography and quantum physics, designed to ensure that both device security becomes foundational and end-to-end IoT security standard practice. We operate from silicon to more »
phases (e.g. Cyber Kill Chain and/or Mitre Attack Framework). * Knowledge of a broad range of security capabilities, technologies and concepts (e.g. cryptography, data security, network security, endpoint security, security penetration testing, identity and access management, vulnerability management etc). Desirable skills/Preferred Qualifications: * Understanding of the more »
the business. Ability to obtain SC clearance with UK-eyes only caveat. Enterprise Security Architectures (SABSA, MODAF). Desirable: DV Clearance. Knowledge of Quantum Cryptography & Quantum Key management. Current threat intelligence awareness. Knowledge of NATO security policy, risk management and Accreditation. Understanding of the role of advisory boards within the more »
Kafka. Must Have Experience Worked in financially regulated environments (eg.PCI) Secure systems design Security design Experience with application security issues (XSS, SSRF, OWASP etc) Cryptography experience Knowledge of CI/CD topics Financial/General cloud security knowledge If you have the above experience in the financial industry and are more »
Hatfield, Hertfordshire, South East, United Kingdom
Henderson Scott
Palo Alto/Bluecoat/Riverbed/Infoblox Previous Aerospace sector experience or appreciation-of/working-at elevated security levels essential Experience of Cryptography (commercial and high grade) desirable Self-motivated and ambitious with the ability to work under pressure to meet deadlines Team player, helping and supporting the more »
MVC/WebAPI Entity Framework T-SQL RESTful web services and JSON JavaScript HTML/CSS Desirable Skills and Experience: Docker Python Web security Cryptography Mobile device management React Qualities: Team player Problem solver Excellent communicator Shows great attention to detail Self-motivated Sense of humour Package & discretionary benefits more »
Cheltenham, Gloucestershire, South West, United Kingdom
Searchability NS&D Ltd
85k DoE plus 15% clearance bonus Full time on site in Cheltenham Skills required in problem solving, IDA Pro, Wireshark, Kali, C/C++, Cryptography Who are we? We are seeking a dynamic and resourceful individual to join our team as a Security Researcher. The ideal candidate will possess a more »
Weetabix Mills, Burton Latimer, Kettering, Northamptonshire, England
WEETABIX LIMITED
Security+ EC Council Certified Network Defender Key areas covered are: Networking & Cyber Security Fundamentals Network Security Threat, Vulnerability and Risk Assessment Operating System Security Cryptography Information Security & Management Frameworks Access Control Systems Security Policies The role offers a permanent role upon completion of the apprenticeship depending on performance. Apprenticeship Standard more »
85k DoE plus 15% clearance bonus Full time on site in Cheltenham Skills required in problem solving, IDA Pro, Wireshark, Kali, C/C++, Cryptography Who are we? We are seeking a dynamic and resourceful individual to join our team as a Security Researcher. The ideal candidate will possess a more »
Technology start-up. Working remotely, you’ll become a key member of a security research focused team with combined expertise in program analysis, algorithms, cryptography, compilers and mathematics. Applicants must have graduated (or expect to achieve) a minimum of a 2:1 Masters Degree in Computer Science or Mathematics from more »
and wireless communication technologies and interfacing with (or ideally implementing) various communication protocols. Understanding OSes and concurrency issues Experience with on-device security and cryptography Build systems (Make, CMake) and tools (shell scripting, Docker) FPGA experience If you are available and interested in this new role please send an application more »
protocols Experience in mobile security, including OS, RF, and App security. Ability in software development or programming/scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threat modelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life more »
and interpersonal skills. Ability to work independently and prioritize tasks effectively. Willingness to learn and adapt in a dynamic environment. Desirable Attributes: Knowledge of cryptography and cryptographic systems. Experience in OS development (Kernel or Userland). Familiarity with authentication technologies like Kerberos. If you are a seasoned security professional with more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
ecosystem. The ideal Protocol Engineer will have the following skills and experiences: Experience with protocol engineering in a blockchain setting Understanding of blockchain concepts, cryptography and consensus mechanisms Proficiency and production experience with Rust or Golang Degree in Computer Science, Software Engineering or relevant field If you're looking for more »