Bethesda, pembrokeshire, united kingdom Hybrid/Remote Options
Noblis
data storage (e.g., AES, RSA, hashing algorithms). Familiarity with Zero Trust architecture and identity and access management (IAM) principles. Foundation in programming languages such as Python, C/C++, Java, or Assembly for vulnerability research, code analysis, and tool development. Experience with offensive security tools like Metasploit, Burp Suite, or Kali Linux for penetration testing and exploit development. Understanding More ❯
distributed systems. What we will love about your background Understanding of security best practices: OAuth2, JWT, TLS, and "security by design" principles. Proficient in .NET Core &/or C, C++ & C# Familiarity with messaging and event technologies such as MQTT Strong understanding of software design principles — modularity, SOLID, and domain-driven design. Experience with CI/CD pipelines, automated testing More ❯
the lab we'd love to hear from you! 📩 Apply now or get in touch for a confidential chat. Desired Skills and Experience Embedded systems, Firmware development, C/C++ programming, RTOS, Microcontrollers, I2C/SPI/UART/CAN, Hardware debugging, Git, Agile development, System testing To find out more about Computer Futures please visit www.computerfutures.com Computer Futures, a More ❯
resolve technical problems. Good knowledge of data protection and information security/governance issues. Good knowledge of providing proactive IT System/Network performance monitoring. Desirable Excellent skills in C++/Perl/Visual basic/Unix Scripting skills Disclosure and Barring Service Check This post is subject to the Rehabilitation of Offenders Act (Exceptions Order) 1975 and as such More ❯