Reading, England, United Kingdom Hybrid / WFH Options
Vallum Associates
infrastructure, IP networking, security best practices, and automation technologies. • Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. • Infrastructure security: including but not limited to: network more »
green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master's degree or alternatively STEM degree are needed with an ability more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Hays Technology
Experience with a range of skills relevant to Cyber Security such as Operations, Architecture, Forensics, Software Development, System Administration (Windows and Linux), Incident Response, Cryptography, Compliance, System Integrations (API and Microservices), Testing, Endpoint security, Cloud Services, Data Management, Networking, End-User/Client devices, Identity and Access Management, Application Development more »
Rolling out, managing, and configuring a range of network security tools and appliances. Key Skills: SIEM Tenable.io/Nessus IDS/IPS, MFA, Proxies, Cryptography Security assessments Information Security best practices, policies, and procedures Penetration Testing/Ethical Hacking Solid understanding of computer networking - Routing/Switching, LAN/WAN more »
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Planet Recruitment
WAF, Wi-Fi, mobile security, Data Loss Prevention, digital certificates, encryption and authentication techniques, forensics, and LAN/WANs. Solid understanding of security protocols, cryptography, authentication, authorisation, and security. Able to manage own workload, resolve competing demands, and cope with changing priorities in a flexible and proactive way. High level more »
access management, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls, WAFs, DLP, cryptography, vulnerability scanning, identity and access management, etc). The ability to carry out threat modelling, vulnerability assessment, control effectiveness review and risk assessment of a more »
Winnersh, England, United Kingdom Hybrid / WFH Options
IDEMIA
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography, we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
Dartford, England, United Kingdom Hybrid / WFH Options
Europa Worldwide Group
administer, and maintain Network & Security platforms and any other related software, such as routers, switches, wireless, firewalls, intrusion detection/prevention, network access control, cryptography systems, monitoring, and cloud technologies/applications. Perform diagnostics, appraisal, and analysis on predominantly Cisco based Network & Security technologies, such as, firewalls, VPN’s, intrusion more »
Bluecoat, Riverbed, and Infoblox. • Previous experience in the defence/aerospace sector or familiarity with working at elevated security levels is essential. • Experience in cryptography (commercial and high-grade) is desirable. • Self-motivated and ambitious, capable of working under pressure to meet deadlines. • Strong team player, providing support to the more »
design security controls, solve complex operational issues Expertise with infrastructure-as-code and orchestration tools Strong background in security fundamentals in Linux, Networking and Cryptography #LI-AM3 The Roku Culture Roku is a great place for people who want to work in a fast-paced environment where everyone is focused more »
Hatfield, Hertfordshire, South East, United Kingdom
Henderson Scott
Palo Alto/Bluecoat/Riverbed/Infoblox Previous Aerospace sector experience or appreciation-of/working-at elevated security levels essential Experience of Cryptography (commercial and high grade) desirable Self-motivated and ambitious with the ability to work under pressure to meet deadlines Team player, helping and supporting the more »
MVC/WebAPI Entity Framework T-SQL RESTful web services and JSON JavaScript HTML/CSS Desirable Skills and Experience: Docker Python Web security Cryptography Mobile device management React Qualities: Team player Problem solver Excellent communicator Shows great attention to detail Self-motivated Sense of humour Package & discretionary benefits more »
to present complex technical information to non-technical audiences. Experience of working with both hardware and software based cross domain approaches. Strong knowledge of cryptography and public key infrastructure. Active SC Clearance What’s in it For You? Exciting and interesting work. Bonus scheme Professional Development opportunities. Private Healthcare. Contributory more »
Cheltenham, Gloucestershire, South West, United Kingdom
Searchability NS&D Ltd
85k DoE plus 15% clearance bonus Full time on site in Cheltenham Skills required in problem solving, IDA Pro, Wireshark, Kali, C/C++, Cryptography Who are we? We are seeking a dynamic and resourceful individual to join our team as a Security Researcher. The ideal candidate will possess a more »
LS1, Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Picture More Ltd
log management, content filtering, etc. An excellent understanding of security approaches: ISMS, risk analysis and assessments, the CIA triad, attack vectors including social engineering, cryptography, confidentiality issues and cyber security incident response best practices, including triage and chain of custody Security certifications are highly advantageous more »
Stevenage, England, United Kingdom Hybrid / WFH Options
Anson McCade
/Checkpoint/Infoblox (NB: Bluecoat is essential) Previous Aerospace sector experience or appreciation-of/working-at elevated security levels essential Experience of Cryptography (commercial and high grade) desirable Self-motivated and ambitious with the ability to work under pressure to meet deadlines. Team player, helping and supporting the more »
Palo Alto/Bluecoat/Riverbed/Infoblox Previous Aerospace sector experience or appreciation-of/working-at elevated security levels essential Experience of Cryptography (commercial and high grade) desirable Self-motivated and ambitious with the ability to work under pressure to meet deadlines. Team player, helping and supporting the more »
85k DoE plus 15% clearance bonus Full time on site in Cheltenham Skills required in problem solving, IDA Pro, Wireshark, Kali, C/C++, Cryptography Who are we? We are seeking a dynamic and resourceful individual to join our team as a Security Researcher. The ideal candidate will possess a more »
and wireless communication technologies and interfacing with (or ideally implementing) various communication protocols. Understanding OSes and concurrency issues Experience with on-device security and cryptography Build systems (Make, CMake) and tools (shell scripting, Docker) FPGA experience If you are available and interested in this new role please send an application more »
protocols Experience in mobile security, including OS, RF, and App security. Ability in software development or programming/Scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threat modelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life more »
protocols Experience in mobile security, including OS, RF, and App security. Ability in software development or programming/scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threat modelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life more »
and interpersonal skills. Ability to work independently and prioritize tasks effectively. Willingness to learn and adapt in a dynamic environment. Desirable Attributes: Knowledge of cryptography and cryptographic systems. Experience in OS development (Kernel or Userland). Familiarity with authentication technologies like Kerberos. If you are a seasoned security professional with more »
the team as they grow. The founders are open regarding experience level and are happy to speak with Engineers from a PhD background in Cryptography or with Engineers with +2 years’ experience and tape out practice in the area of RISC-V. You should have had exposure to SOC microarchitectures more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »