Reading, England, United Kingdom Hybrid / WFH Options
Vallum Associates
infrastructure, IP networking, security best practices, and automation technologies. • Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. • Infrastructure security: including but not limited to: network more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Hays Technology
Experience with a range of skills relevant to Cyber Security such as Operations, Architecture, Forensics, Software Development, System Administration (Windows and Linux), Incident Response, Cryptography, Compliance, System Integrations (API and Microservices), Testing, Endpoint security, Cloud Services, Data Management, Networking, End-User/Client devices, Identity and Access Management, Application Development more »
PCI-DSS and CIS). Practice expert level assessment skills using technology-based controls of a cybersecurity program including cloud security, penetration testing results, cryptography & network security fundamentals, malware defense, data loss prevention and endpoint security. Compile professional security assessment reports, slides, and lead discussions to effectively communicate the risks more »
Rolling out, managing, and configuring a range of network security tools and appliances. Key Skills: SIEM Tenable.io/Nessus IDS/IPS, MFA, Proxies, Cryptography Security assessments Information Security best practices, policies, and procedures Penetration Testing/Ethical Hacking Solid understanding of computer networking - Routing/Switching, LAN/WAN more »
design security controls, solve complex operational issues Expertise with infrastructure-as-code and orchestration tools Strong background in security fundamentals in Linux, Networking and Cryptography #LI-AM3 Benefits Roku is committed to offering a diverse range of benefits as part of our compensation package to support our employees and their more »
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Planet Recruitment
WAF, Wi-Fi, mobile security, Data Loss Prevention, digital certificates, encryption and authentication techniques, forensics, and LAN/WANs. Solid understanding of security protocols, cryptography, authentication, authorisation, and security. Able to manage own workload, resolve competing demands, and cope with changing priorities in a flexible and proactive way. High level more »
access management, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls, WAFs, DLP, cryptography, vulnerability scanning, identity and access management, etc). The ability to carry out threat modelling, vulnerability assessment, control effectiveness review and risk assessment of a more »
Winnersh, England, United Kingdom Hybrid / WFH Options
IDEMIA
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography, we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
Dartford, England, United Kingdom Hybrid / WFH Options
Europa Worldwide Group
administer, and maintain Network & Security platforms and any other related software, such as routers, switches, wireless, firewalls, intrusion detection/prevention, network access control, cryptography systems, monitoring, and cloud technologies/applications. Perform diagnostics, appraisal, and analysis on predominantly Cisco based Network & Security technologies, such as, firewalls, VPN’s, intrusion more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
Bluecoat, Riverbed, and Infoblox. • Previous experience in the defence/aerospace sector or familiarity with working at elevated security levels is essential. • Experience in cryptography (commercial and high-grade) is desirable. • Self-motivated and ambitious, capable of working under pressure to meet deadlines. • Strong team player, providing support to the more »
Hatfield, Hertfordshire, South East, United Kingdom
Henderson Scott
Palo Alto/Bluecoat/Riverbed/Infoblox Previous Aerospace sector experience or appreciation-of/working-at elevated security levels essential Experience of Cryptography (commercial and high grade) desirable Self-motivated and ambitious with the ability to work under pressure to meet deadlines Team player, helping and supporting the more »
IP for the semiconductor industry, on a global scale. You will be working closely with other ASIC engineers and architects, as well as security, cryptography, embedded hardware & software, firmware, and verification engineers to architect, design, implement, and integrate the latest solutions for digital hardware in the security market, including crypto more »
MVC/WebAPI Entity Framework T-SQL RESTful web services and JSON JavaScript HTML/CSS Desirable Skills and Experience: Docker Python Web security Cryptography Mobile device management React Qualities: Team player Problem solver Excellent communicator Shows great attention to detail Self-motivated Sense of humour Package & discretionary benefits more »
to present complex technical information to non-technical audiences. Experience of working with both hardware and software based cross domain approaches. Strong knowledge of cryptography and public key infrastructure. Active SC Clearance What’s in it For You? Exciting and interesting work. Bonus scheme Professional Development opportunities. Private Healthcare. Contributory more »
Cheltenham, Gloucestershire, South West, United Kingdom
Searchability NS&D Ltd
85k DoE plus 15% clearance bonus Full time on site in Cheltenham Skills required in problem solving, IDA Pro, Wireshark, Kali, C/C++, Cryptography Who are we? We are seeking a dynamic and resourceful individual to join our team as a Security Researcher. The ideal candidate will possess a more »