operations whilst also continuing to develop out their Cyber footprint. Key Responsibilities: * To deploy, manage and maintain all security systems including Firewalls, intrusion detection, cryptography and ant-virus * Ensure and oversee industry-standard best practices * Manage connection security for local network and e-mail * Manage penetration testing - identifying vulnerabilities * Actively more »
protocols Experience in mobile security, including OS, RF, and App security. Ability in software development or programming/scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threat modelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life more »
and interpersonal skills. Ability to work independently and prioritize tasks effectively. Willingness to learn and adapt in a dynamic environment. Desirable Attributes: Knowledge of cryptography and cryptographic systems. Experience in OS development (Kernel or Userland). Familiarity with authentication technologies like Kerberos. If you are a seasoned security professional with more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
Stoke-On-Trent, England, United Kingdom Hybrid / WFH Options
GivEnergy
Zigbee, Modbus, etc. Proven experience on developing firmware with RTOS, e.g. FreeRTOS, RT-Linux, Threadx, etc. Hands on development with IoT infrastructure, MQTT, Protobuf, cryptography, secure boot, etc. Bare metal driver, BSP, board bring up. Basic knowledge of electronics e.g. reading schematics, using test equipment such as DVM and oscilloscope more »
support development. Requirements: Strong understanding of blockchain tech like EVM, Cosmos, and some familiarity with Solana, Bitcoin, Tron, and TON Network. Knowledge of blockchain cryptography and secure communication protocols. Experience with TypeScript, React, and frontend tech. Skills in optimizing builds and using tools like TurboRepo. Previous work with blockchain libraries more »
they have planned for you, you will need deep familiarity with UNIX and Windows authentication systems with systems level understanding of other areas. Some cryptography and OS development in either Kernel or Userland is a plus too, as well as some familiarity with Kerberos. You will be working with a more »
Leeds, England, United Kingdom Hybrid / WFH Options
Optalysys
external-facing documents, customer meetings, and/or events) Assist marketing/business development teams with strategy and customer profiling Work closely with the cryptography team to document the development of our hardware API and provide feedback on external stakeholder requirements Provide technical support to during onboarding, prototypes as both more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Optalysys
both expert and non-expert audiences Knowledge of analogue/mixed-signal design (Desirable) Experience of software and processor based systems (Desirable) Knowledge of cryptography and/or FHE (Desirable) Location Bristol/Hybrid working more »
and Simulink tools • Derivation of detailed Firmware requirements and architecture from system requirements • A structured approach to firmware design (RTCA DO-254 or similar) • Cryptography and anti-tamper techniques • Artificial Intelligence including machine learning and genetic algorithms • Electronics test methods and equipment more »
Cyber Security Manager Join a leading global investment bank as a Cyber Security manager within our clients IT department. In this hands-on role, you will be instrumental in providing Cyber Security services globally, focusing on driving the Cyber Assurance more »
management or tooling hugely beneficia (Data Lakes, Snowflake or Databricks). Experience working closely with engineering teams (particularly those working on Machine Learning and Cryptography products). Ability to deliver product presentations, and showcase software whilst leading pre-sales activities. Product experience with privacy-enhancing technologies, data analysis, data management … equipped to leverage our technology. In return, you will have the opportunity to work with world leaders in the fields of data science and cryptography, as well as the chance to contribute to our mission of enabling organizations to collaborate on sensitive data while protecting data privacy, confidentiality, and regulatory more »
management or tooling hugely beneficia (Data Lakes, Snowflake or Databricks). Experience working closely with engineering teams (particularly those working on Machine Learning and Cryptography products). Ability to deliver product presentations, and showcase software whilst leading pre-sales activities. Product experience with privacy-enhancing technologies, data analysis, data management … equipped to leverage our technology. In return, you will have the opportunity to work with world leaders in the fields of data science and cryptography, as well as the chance to contribute to our mission of enabling organizations to collaborate on sensitive data while protecting data privacy, confidentiality, and regulatory more »
Employment Type: Contract
Rate: From £1,100 to £1,300 per day Outside of IR35
Job Type: Contract Pay: £400 - £650 pd DOE (Inside IR35) Contract Length: 6 Months with potential to extend Work Location: Tewkesbury Clearance Level Required: SC A bit about us… Amiosec is an exciting and growing UK technology company with innovation more »
Leading defence firm seeks a Junior Cryptography Specialist to work with customers on complex challenges. You will work on a portfolio of technical cryptography work, identifying security requirements and developing solutions in the crypto-security domain. Examples of projects may include integrating high grade cryptography into existing systems and key … management, or proposing new designs to meet security requirements for a crypto system. The successful candidate will have previous knowledge/experience of cryptography and key management/PKI experience and will be eligible for SC clearance. The role is based in Malvern but flexible working is available. more »
as Windows, and Linux administration. Proficiency in web service development using variety of protocol including SOAP, XML/HTTP and RESTful HTTP. Experience in cryptography programming, HSM (Hardware Security Module), PKCS#11, Cryptographic Services Provider (CSP) and Cryptographic API Next Generation (CNG) would be an advantage. Work Requirements : Must be legally … Linux administration. Proficiency in web service development using variety of protocol including SOAP, XML/HTTP and RESTful HTTP. Computer Skills Advantageous Experience in cryptography programming, HSM (Hardware Security Module), PKCS#11, Cryptographic Services Provider (CSP) and Cryptographic API Next Generation (CNG) would be an advantage. Why apply? Empowerment: You’ll more »
Job Title: Security Architect (SAP) Work Arrangement: Hybrid (2 days in office) Office Locations: Swindon and London Rate Payable to Contractors: £500- £525 per day Duration of Assignment: 6 months Role Description: As a Security Architect with SAP expertise, you more »
A bit about us… Amiosec is an exciting and growing UK technology company with innovation, agility, and state of the art technology at its core. We work in partnerships with UK government customers and commercial providers to deliver research, technology more »
Are you passionate about cryptography and cyber security? Do you enjoy solving complex problems and designing innovative solutions? Do you want to work on cutting-edge technologies that will shape the future of security and privacy? We are working with a leading company in the field of IoT security, developing … authentication and encryption products that are reliable, scalable and secure. We are looking for a talented and motivated security engineer in cryptography (cryptographer) to join our clients' research team to create the next generation of security solutions. The role: Assist with the design of cryptographic protocols that are efficient, robust … fully integrated within our hardware security module To be successful in this role, you will need: A MSc degree or higher in cyber security, cryptography, mathematics, computer science, or any other subject with substantial mathematical content Strong knowledge and understanding of cyber security fundamentals and best practices Strong applied cryptographic more »
protection, communication integrity and data provenance by creating trusted connections, even over untrustworthy networks. The role We are looking for a Security Engineer in Cryptography (Cryptographer), who loves challenges and has a research-oriented mindset. You will help develop ground-breaking research into commercially viable and reliable, authentication and encryption … contributing significantly to our growth. You will also have the rare opportunity to work on projects with technologies that are shaping the future, from cryptography and quantum resistant computing, to autonomous vehicles to drones. What you will do: Assist with the design of cryptographic protocols using cryptographic primitives Collaborate with … code, into robust production software fully integrated within our hardware security module Keep up with new research in the space, in particular: post-quantum cryptography, zero-knowledge, privacy preserving technologies and confidential computing What we are looking for: Qualified to at least an MSc degree in cyber security, cryptography, mathematics more »
Location: Wiltshire (5 days per week) Duration: 12 months We have an exciting opportunity for a DV Cleared Cryptography Accountant, managing Cryptographic Material in support of the MOD. We are looking for anyone who has any previous MOD crypto management and/or crypto accountancy experience, ideally ex R SIGNALS more »
Location: Wiltshire (5 days per week) Duration: 12 months We have an exciting opportunity for a DV Cleared Cryptography Accountant, managing Cryptographic Material in support of the MOD. We are looking for anyone who has any previous MOD crypto management and/or crypto accountancy experience, ideally ex R SIGNALS more »