Reading, England, United Kingdom Hybrid / WFH Options
Oracle
As a member of our technical leadership team, you will be responsible for leading the planning and delivery of in-depth security assessments across a variety of products and services, you will author reports and be the owner from cradle to grave while presenting to executive leadership your findings and taking ownership of your teams work. Your next project … new programming language, to analysis and reverse engineering of firmware used in the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for computersecurity Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help … engineering teams identify security-related weaknesses Collaborate with engineering teams to help them triage and fix security issues Mentor members of the team in computer and software security as a role model and team leader Career Level - IC5 What You’ll Bring Bachelor’s or Master’s degree in Computer Science or related field (e.g. More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
Senior Principal Offensive Security Researcher Senior Principal Offensive Security Researcher 2 days ago Be among the first 25 applicants Get AI-powered advice on this job and more exclusive features. Direct message the job poster from Oracle As a member of our technical leadership team, you will be responsible for leading the planning and delivery of in-depth … security assessments across a variety of products and services, you will author reports and be the owner from cradle to grave while presenting to executive leadership your findings and taking ownership of your teams work. Your next project could be anything from secure systems design, static and dynamic analysis of a multi-node Java infrastructure, to writing a fuzzer … new programming language, to analysis and reverse engineering of firmware used in the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for computersecurity Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Entrust
About the Company Join us at Entrust. At Entrust, we’re shaping the future of identity centric security solutions. From our comprehensive portfolio of solutions to our flexible, global workplace, we empower careers, foster collaboration, and build solutions that help keep the world moving safely. Headquartered in Minnesota, Entrust is an industry leader in identity-centric security solutions … We are looking for Staff Software Developer to join our Cambridge, UK team! A highly skilled C designer and developer with Python skills, to work on a major crypto-security product. You must be based in the UK and have the right to work in the UK. Responsibilities Play a major role in the design and development of our … system. Embedded Linux in Hardware Security Modules, Windows/Linux drivers & client-side tools, API libraries. Lead features from inception to delivery. Software design & coding, testing, and review. Integrate effort across disciplines. Lead by example, mentor juniors, set standards. Supporting architecture team in feature analysis. Qualifications Degree or equivalent, in Software Engineering, Computer Science, Maths or relevant discipline. More ❯
Developer role at Entrust Get AI-powered advice on this job and more exclusive features. Join us at Entrust At Entrust, we’re shaping the future of identity-centric security solutions. From our comprehensive portfolio of solutions to our flexible, global workplace, we empower careers, foster collaboration, and build solutions that help keep the world moving safely. About Entrust … Headquartered in Minnesota, Entrust is an industry leader in identity-centric security solutions, serving over 150 countries with cutting-edge, scalable technologies. Our success is driven by our people—curiosity, dedication, and innovation are at our core. We are looking for a Principal Software Developer to join our Cambridge, UK team. Position Overview A highly skilled C/Python … developer to work on a major crypto-security product. Responsibilities Design and develop our full-stack system, including software embedded in HSMs, client-side tools, and API libraries. Lead features from inception to delivery, including design, coding, testing, and review. Coordinate efforts across disciplines and lead by example, mentoring juniors and setting standards. Support the architecture team in feature More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Entrust
Continue with Google Continue with Google Continue with Google Continue with Google Direct message the job poster from Entrust At Entrust, we’re shaping the future of identity centric security solutions. From our comprehensive portfolio of solutions to our flexible, global workplace, we empower careers, foster collaboration, and build solutions that help keep the world moving safely. Get to … Know Us Headquartered in Minnesota, Entrust is an industry leader in identity-centric security solutions, serving over 150 countries with cutting-edge, scalable technologies. But our secret weapon? Our people. It’s the curiosity, dedication, and innovation that drive our success and help us anticipate the future. We are looking for Senior Software Developer to join our Cambridge-UK … team! Position Overview: A highly skilled developer with strong C programming and good Python exposure as well as good design skills, to work on a major crypto-security product. You must be based in the UK and have the right to work in the UK. Responsibilities: Play a significant role in the design and development of our full-stack More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Entrust
Join us at Entrust At Entrust, we’re shaping the future of identity centric security solutions. From our comprehensive portfolio of solutions to our flexible, global workplace, we empower careers, foster collaboration, and build solutions that help keep the world moving safely. Get to Know Us Headquartered in Minnesota, Entrust is an industry leader in identity-centric security … Cambridge-UK team! Position Overview: A highly skilled developer with strong C programming and good Python exposure as well as good design skills, to work on a major crypto-security product. You must be based in the UK and have the right to work in the UK. Responsibilities: Play a significant role in the design and development of our … software embedded in HSMs, client-side tools, API libraries. Develop features from inception to delivery Software design & coding, testing, and review. Essential Qualifications: Degree or equivalent, in Software Engineering, Computer Science, Maths or relevant discipline. Large-scale development & design on Linux/Windows. Experienced in C & Python development Embedded and application development over the range from embedded code & drivers More ❯
to bring 1B+ people onchain in the most secure way possible. We want to provide them secure platforms and tools to build and interact with exciting applications. The Protocol Security team ensures the security of all onchain development at Coinbase. We partner closely with product teams to make sure that our users can safely and confidently engage with … the onchain world. What you’ll be doing (ie. job duties): Perform threat modeling and security assessments of blockchain products and services. Propose, plan, and execute Red Team operations based on realistic threats. Write detailed reports covering the goals and outcomes of Red Team operations, including significant observations and recommendations. Collaborate with partner teams to improve detection and response … capabilities. Provide expert technical guidance to the team in building new security frameworks and analysis tools. Stay informed on current security trends, advisories, publications, and academic research. What we look for in you (ie. job requirements): Bachelor’s or Master’s degree in Computer Science, Cyber security, Software Engineering, or a related field. 3+ years of More ❯
are solving challenging problems to make our product more suited to customer needs. About the team As a team we build Ring Doorbell Wired - BASIC QUALIFICATIONS - Bachelors degree in Computer Science, Computer Engineering, Electrical Engineering, related field, or equivalent practical experience. - Proven experience in software and embedded development with C/C++ and familiarity with SoC and embedded … CPU. - Field experience with writing low-level drivers, interrupting service routines, and general troubleshooting/debugging with hardware. PREFERRED QUALIFICATIONS - Master's in Computer Science, Information Security, or related field, or equivalent work experience. - Extensive experience in computer architecture and embedded systems. - Extensive experience in two or more of the following technical categories: - Hardware security (PCB … JTAG, UART, SPI, ROM, microcode, custom ASIC/FPGA). - x86 and/or ARM chipset and firmware security (TPM, UEFI, TrustZone, Secure Boot, JTAG, PCIe). - Security assessment (e.g. penetration testing, incident response, forensics, network traffic analysis). - Performing security reviews and implementing defensive technical security controls. - Virtualization security, side-channel attack vectors, and More ❯
more competitive. Job Description In your role you will work within the team that investigates and analyses high priority cybersecurity incidents with precision. You will respond to and contain security threats effectively, following a robust Cyber Security Incident Response Plan (CIRP). Collaborating with both internal and external stakeholders, you will ensure seamless communication and effective outcomes. You … will document incident responses meticulously and create comprehensive reports. Additionally, you will be responsible for introducing and utilising security automation and scripting to enhance efficiency and security measures. Accountabilities: Monitor security alerts and logs to detect potential security incidents. Conduct initial triage and assessment of incidents to determine severity and impact. Conduct in-depth analysis of … security incidents to determine root cause, scope, and extent of compromise. Analyze malware samples, network traffic, and system logs to identify indicators of compromise (IOCs) and attack patterns. Lead and coordinate incident response efforts, including containment, eradication, and recovery activities. Collaborate with cross-functional teams to mitigate security incidents and minimize business impact. Assist partners in/and More ❯
sectors and geographies, giving you the opportunity to constantly update and grow your skills for lifelong professional development. Job Purpose As a Senior Penetration Tester, you'll lead complex security engagements across infrastructure, cloud, mobile, AI systems, and more. You will design and execute red team operations, mentor junior consultants, and directly influence our technical testing capability and methodology … to closure any issues that impact the service and its value to clients. Working with clients to develop appropriate remediation plans. Providing thought leadership and direction for the Cyber Security practice on malware, attack vectors and methods to protect against threats. Helping recruit, retain and develop the Ethical Hacking team by bringing superior leadership skills. Training and mentoring of … teaming, purple teaming, and social engineering techniques. Application, Infrastructure and Cloud penetration testing experience above and beyond running automated tools. A good understanding of Unix, Microsoft Windows, and network security skills. Excellent written and communication skills in English. Ability to work both independently and collaboratively in a team. Developing applications in one or more of the following: C#, ASP More ❯
London, England, United Kingdom Hybrid / WFH Options
Vantage Data Centers
looking for ways to strike the best balance between technology, performance and cost. The Vantage Cybersecurity Department also participates in designing each of our new data center building’s security infrastructure. If you like getting your hands dirty and helping to design, build and maintain Cybersecurity infrastructure in a modern data center, then come work at Vantage. We’re … Position Overview The OT Manager, Cybersecurity, Global at Vantage Data Centers is responsible for developing, managing, and strengthening the organization's cybersecurity posture. This role focuses on coordinating enterprise security programs, ensuring compliance with industry regulations, mitigating risks, and implementing standard processes. The ideal candidate will have a deep understanding of cybersecurity, risk management, and regulatory compliance, with the … ability to collaborate across departments and lead strategic security initiatives. This position requires a proactive approach to identifying and addressing security vulnerabilities while encouraging a culture of security awareness across the organization. The OT (Operational Technology) Manager, Cybersecurity, Global will be part of the leadership team responsible for protecting a rapidly expanding global enterprise. The OT Manager More ❯
necessary for true innovation. For more information about Draper, visit www.draper.com. Job Description Summary: The High Availability Architecture Group within the Systems Engineering directorate is seeking a Senior System Security Engineer to guide and facilitate concept development, mission-system analysis, and requirement definition & compliance for critical, yet novel & disruptive cyber resilient technologies. This handpicked candidate must possess a unified … System Security, Cybersecurity, and Cryptography expertise that can expand Draper's insight to address national security threats which remain prevalent throughout critical enterprises, infrastructure, systems, and operations. A successful candidate will be equipped to propose modern solutions embedded with security awareness, that adhere to NIST, NSA, and DoD standards, to proactively mitigate unacceptable loss and unrecoverable downtime … throughout their lifecycle. The multidisciplinary proficiencies supporting this initiative are System Security Concepts & Design Principles, Resilient Architecture, Anomaly & Contingency Management, and Cryptography & Key Management. Job Description: Daily Responsibilities Leveraging System Theoretic Process Analysis (STPA) for Attack Surface Analysis (ASA) to improve "blue team" designs and attack vector insights On-time delivery and maturating of System Security work packages More ❯
current frontier AI systems and considering what measures could and should be used to secure such systems in the future. The Safeguard Analysis Team takes a broad view of security threats and interventions. It's keen to hire researchers with expertise developing and analysing attacks and protections for systems based on large language models, but is also keen to … hire security researchers who have historically worked outside of AI, such as in - non-exhaustively - computersecurity, information security, web technology policy, and hardware security. Diverse perspectives and research interests are welcomed. The Team seeks people with skillsets leaning in the direction of either or both of Research Scientist and Research Engineer, recognising that some technical … seniority and experience. Person Specification You may be a good fit if you have some of the following skills, experience and attitudes: Experience working on machine learning, AI, AI security, computersecurity, information security, or some other security discipline in industry, in academia, or independently. Experience working with a world-class research team comprised of More ❯
About the AI Security Institute The AI Security Institute is the largest team in a government dedicated to understanding AI capabilities and risks in the world. Our mission is to equip governments with an empirical understanding of the safety of advanced AI systems. We conduct research to understand the capabilities and impacts of advanced AI and develop and … test risk mitigations. We focus on risks with security implications, including the potential of AI to assist with the development of chemical and biological weapons, how it can be used to carry out cyber-attacks, enable crimes such as fraud, and the possibility of loss of control. The risks from AI are not sci-fi, they are urgent. By … current frontier AI systems and considering what measures could and should be used to secure such systems in the future. The Safeguard Analysis Team takes a broad view of security threats and interventions. It's keen to hire researchers with expertise developing and analysing attacks and protections for systems based on large language models, but is also keen to More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Lloyds Banking Group
days) in one of our office locations ABOUT THIS OPPORTUNITY Are you an infrastructure engineer looking for your next role? We've got some exciting opportunities in our Chief Security Office for experienced infrastructure engineers who are passionate about secure, scalable tech! Our teams in the labs below are growing, and we'd love to hear from you: Lab1 … Cloud Enterprise and Compute Security Lab 2: Security Operations (Data Loss Management) Every day will bring something new. In these roles, you'll get to: Design, build, and manage secure infrastructure across Azure and GCP Use Infrastructure as Code (Terraform) to implement and maintain security controls Automate security processes with scripting and APIs Use native tools … and analytics to improve cloud & data security posture Collaborate across teams to deliver secure, scalable, and compliant solutions Creating and tuning DLP/Cyber policies for endpoints, email, cloud apps, and network traffic Work with other data professionals and AI engineers to understand business needs and develop effective AI solutions WHAT WE'RE LOOKING FOR We're committed to More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Lloyds Banking Group
days) in one of our office locations ABOUT THIS OPPORTUNITY Are you an infrastructure engineer looking for your next role? We’ve got some exciting opportunities in our Chief Security Office for experienced infrastructure engineers who are passionate about secure, scalable tech! Our teams in the labs below are growing, and we’d love to hear from you: Lab1 … Cloud Enterprise and Compute Security Lab 2: Security Operations (Data Loss Management) Every day will bring something new. In these roles, you’ll get to: Design, build, and manage secure infrastructure across Azure and GCP Use Infrastructure as Code (Terraform) to implement and maintain security controls Automate security processes with scripting and APIs Use native tools … and analytics to improve cloud & data security posture Collaborate across teams to deliver secure, scalable, and compliant solutions Creating and tuning DLP/Cyber policies for endpoints, email, cloud apps, and network traffic Work with other data professionals and AI engineers to understand business needs and develop effective AI solutions WHAT WE’RE LOOKING FOR We’re committed to More ❯
Job ID: Amazon Support Services Pty Ltd Amazon is seeking qualified Security Engineers to join our innovative, high energy Information Security team in Sydney, Australia. In this role you will work within the Amazon Security Incident Response Team (SIRT). SIRT Security Engineers respond to security events, conduct analysis of threats such as malware and … intrusion attempts, and provide security services to safeguard highly sensitive data. They work hands-on with detection systems and vulnerability analysis tools to respond to potential threats to Amazon systems. SIRT Security Engineers are unique individuals prepared to relentlessly resolve security issues by gathering and analyzing event data and conducting root-cause analysis. With your technical expertise … you will be solving security challenges at scale, working to protect the applications powering the most sophisticated e-commerce platform ever built. We value broad and deep technical knowledge, specifically in the fields of forensics, malware analysis, network security, application security, threat hunting, and threat intelligence. This position is based in Sydney, Australia. Key job responsibilities - Responding More ❯
the robustness of communication technologies to attack. Furthermore, the project will examine the suitability of emerging network management approaches, which aim to minimise operational overheads, to realise important communication security and resilience requirements for new nuclear designs. The outcomes from this project are essential to the success of enabling new operating concepts and fleet management approaches. This project is … Doctoral Training) and sponsored by UKNNL . It is expected that this PhD project will contribute to a new International Atomic Energy Agency (IAEA) project that is investigating the computersecurity of SMRs . For informal enquiries, please contact Professor Paul Smith ( paul.smith@lancaster.ac.uk ) Candidates interested in applying should first send an email expressing interest to saturn@manchester.ac.uk More ❯
Apply to: IT Service Desk Analyst Apprentice (Fittleworth Medical Ltd) Apply From: 13/12/2024 Vacancy Description Setting up new PC’s, installing, configuring and supporting computer hardware, software, operating systems and applications. Setting up new users to the network and de-activating leavers. Logging support requests and managing the ticketing system. Coordinating tests and troubleshooting with … Assist in the upkeep and maintenance of IT inventory. To set up, maintain, and organise repairs for various computing, audio, visual and telephone equipment. To maintain high standards of computersecurity and safety in line with the Company’s IT Procedure. Taking ownership of and working proactively on support queries; developing the skills to complete resolution of incidents … Interview Begin From Possible Start Date 2025-01-13 00:00:00 Learning Provider FIREBRAND TRAINING LIMITED Skills Required Communication skills, Problem solving skills, Good computer literacy, Microsoft Word, Office & Excel, Microsoft Outlook, Troubleshooting skills, Logical & analytical thinker, Strong numerical skills, An effective collaborator, Interpersonal skills, Ambitious, Positive team player, Can do attitude, Customer focused, Self motivated, Ability to More ❯
Join to apply for the Head of Security Operations role at Votre Sommelier We are seeking a dynamic and experienced Head of Security Operations to lead and mature our security operations function. This pivotal role will be responsible for defining and driving the overall security operations strategy and lifecycle, ensuring the protection of our critical assets … and data. The ideal candidate will possess deep expertise in vulnerability management, threat intelligence, security operations centre (SOC) management, and incident response. This leader will build and mentor high-performing teams, optimise processes, and proactively mitigate security risks in ASOS's evolving environment. Day To Day Responsibilities: Develop and implement a comprehensive security operations strategy aligned with … the company's risk appetite and business objectives. Define and maintain the security operations roadmap, prioritising initiatives and resource allocation. Stay abreast of emerging threats, technologies, and industry best practices, and translate them into actionable strategies. Provide leadership and direction to the leads of the functional areas. Lead the Cyber Defence function that includes Security Operations, IAM, Vulnerability More ❯
Ready to leverage your technical skills and knowledge in Cyber Security? Are you passionate about identifying, investigating, and resolving security incidents? We have a fantastic opportunity for a CSOC Analyst and make a meaningful impact in our client's Cyber Security Operations Centre (CSOC)! Be an active player within a multi-disciplined CSOC team and work with … cutting-edge security tools and technologies. Responsibilities: Work within a multi-disciplined CSOC team identifying, owning, progressing, and resolving security incidents. Perform the prompt and effective triage and investigation of security events and incidents applying sound problem-solving methods to determine scope, urgency, and potential impact. Provide technical support for the identification and response to events or … incidents of a suspicious or malicious nature, and apparent security breaches. Work with internal and external stakeholders to resolve computersecurity incidents and vulnerability compliance. Drive customer satisfaction and continuously seek to improve operational performance. Maintain a continuous understanding of the threat landscape with in-depth knowledge around threat actors, TTPs, and vulnerabilities. Skills/Must have More ❯