security solutions. Efficiency is key Administering HashiCorp Vault for secrets management Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure Applying cryptography and security design principles to cloud environments Documenting playbooks, procedures, and architecture Providing subject matter expertise to software development groups to assist in cryptography and key management/authentication API. … digital assets. Experience implementing custom, cloud-agnostic IAM at scale Navigate the complexities of working with consumer products, web apps, and mobile apps Proficiency in understanding authentication, authorization, and cryptography, with familiarity around modern security standards and best practices. Proficiency in data modelling of roles, permissions, and capabilities Experience with OAuth 2.0 nuances, best practices, and shortcomings Experience securely running More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Leidos
on one or more of: Windows, macOS, Linux, iOS, or Android. Commitment to code correctness and quality assurance through static analysis, code review, automated testing, and continuous integration. Desirable Cryptography: Understanding of encryption algorithms and protocols for securing audio streams. USB Communication: Proficient in interfacing with a computer via USB. Knowledge of USB protocols and device drivers. Wireless Protocols: Understanding More ❯
Sheffield, South Yorkshire, United Kingdom Hybrid / WFH Options
Experis
testing experience. Desirable Skills Experience working in financial services or other regulated environments. AWS/GCP certifications (e.g., AWS Solutions Architect, Google Professional Cloud Engineer). Good understanding of cryptographyMore ❯
Programming Language) - Highly desirable. Familiarity with Elasticsearch (Search/Storage Technology) - Highly desirable. Comprehensive understanding of SQL (Search Query Language for relational databases). Basic understanding of symmetric key cryptography Basic understanding of common file formats and serialization techniques. Strong analytical and problem-solving skills. Excellent communication and team collaboration abilities. As an equal opportunities' employer, we welcome applications from More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
Matlab and Simulink tools Derivation of detailed FPGA/Firmware requirements and architecture from system requirements A structured approach to FPGA/firmware design (RTCA DO-254 or similar) Cryptography and anti-tamper techniques Artificial Intelligence including machine learning and genetic algorithms Electronics test methods and equipment Good verbal and written communication skills Working in mixed discipline teams HNC/ More ❯
.Net, C++ or similar object oriented language experience. - Extensive experience and expertise in any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience. - Experience using Large Language Models (LLM) in security engineering. PREFERRED QUALIFICATIONS - Master's or PhD in cyber security or artificial intelligence. - Strong interest in More ❯
define and deliver major technical projects/strategies/architectures. You should have established knowledge and skills in the following areas: A sound and extensive knowledge of PKI and Cryptography solution design Experience in MS Certificate Management Services (Certification Authority, Online Responder, Network Device Enrollment (NDES) Services, Certificate Enrollment Web Services (CEP/CES), Active Directory Domain Services and certificate … technology. Direct experience with Thales HSM platforms is highly desirable. Expert level experience in cloud solution development with Azure or AWS architectures as is related to PKI management. Extensive Cryptography & PKI solution design experience (HLD & LLD) required. If you would like to discuss this PKI Architect in more detail, please send your updated CV to (url removed) and I will More ❯
candidate will have a good mix of deep technical knowledge and a demonstrated background in information security. We value broad and deep technical knowledge, specifically in the fields of cryptography, network security, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. Key Responsibilities Confidently and intelligently respond to security incidents, and proactively consider how to prevent … our organization. Ability to communicate effectively at multiple levels of sensitivity, and multiple audiences. Recognize, adopt and instill the best practices in security engineering fields throughout the organization: development, cryptography, network security, security operations, incident response, security intelligence. Provide subject matter expertise on architecture, authentication and system security. Fulfill regular on-call responsibilities. BASIC QUALIFICATIONS Bachelor's degree in computer … division level or equivalent PREFERRED QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Experience in cyber security incident response within corporate and cloud environments. Amazon is an equal opportunities More ❯
Toshiba Europe Limited has pioneered the development of quantum communication systems over the past decade, setting new standards for cryptography and data security. We are currently seeking an Embedded Software Engineer (or Senior Embedded Software Engineer, depending on experience) to join the growing team developing our products within Toshiba's new Quantum Technology Centre, based in Cambridge, UK. The successful … of multiple programming languages (e.g. Rust, Python, etc.) Experience with PCIe devices & FPGAs Familiarity with PCB design concepts and ability to independently interpret PCB schematics Experience in cyber-security, cryptography and/or systems hardening Software engineering experience in the communications industry Enthusiasm to learn new skills and pursue new knowledge, with a self-starter team-player mindset More ❯
Farnborough, Hampshire, United Kingdom Hybrid / WFH Options
The Talent Locker Ltd
assurance bodies to meet regulatory requirements What you'll bring Strong experience in designing and assuring security architectures in Defence or similar secure sectors Deep understanding of security components (cryptography, access control, data inspection etc.) Familiarity with JSP 604/453 and MOD assurance frameworks High standards in documentation and stakeholder communication Currently DV (Developed Vetting) Cleared Bonus if you More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Talent Locker
assurance bodies to meet regulatory requirements What you'll bring Strong experience in designing and assuring security architectures in Defence or similar secure sectors Deep understanding of security components (cryptography, access control, data inspection etc.) Familiarity with JSP 604/453 and MOD assurance frameworks High standards in documentation and stakeholder communication Currently DV (Developed Vetting) Cleared Bonus if you More ❯
assurance bodies to meet regulatory requirements What you’ll bring Strong experience in designing and assuring security architectures in Defence or similar secure sectors Deep understanding of security components (cryptography, access control, data inspection etc.) Familiarity with JSP 604/453 and MOD assurance frameworks High standards in documentation and stakeholder communication Currently DV (Developed Vetting) Cleared Bonus if you More ❯
Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
The Talent Locker Ltd
assurance bodies to meet regulatory requirements What you'll bring Strong experience in designing and assuring security architectures in Defence or similar secure sectors Deep understanding of security components (cryptography, access control, data inspection etc.) Familiarity with JSP 604/453 and MOD assurance frameworks High standards in documentation and stakeholder communication Currently DV (Developed Vetting) Cleared Bonus if you More ❯
enhance security operations. Assist with compliance efforts, ensuring alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting More ❯
system concepts such as tasks, signals, timers, priorities, deadlocks, stacks, memory management, etc. Experience with JTAG-enabled devices and software debugger, with excellent debugging skills. Desirable : Working knowledge of cryptography and secure protocols. Qualcomm MSM and AMSS development experience. ARM architecture and software development experience. RISC-V architecture and software development experience. Experience with on-chip simulators/emulators. Experience More ❯
with security responsibilities). Familiarity with cloud/virtualization technologies (AWS, GCP and K8s) and automation (ansible, puppet, terraform etc.) Understanding of fundamental security concepts and terminologies (CIA, basic cryptography knowledge etc.) Advanced scripting skills in Python, Bash, PowerShell etc. Advanced Network knowledge, including Firewall management. Familiarity with SIEM tools (Splunk, Elastic Stack etc.) Good knowledge of identified operating system More ❯
be conducting security monitoring and response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of the domains mentioned above, but More ❯
deliver complex projects. - Experience in reviewing complex systems design/code for security best practices and compliance with industry standards. - Strong creative problem-solving abilities. - Knowledge and experience with cryptography and computer security. - Distributed systems experience. - Knowledge of Linux systems and operating system internals. - Experience with large scale systems. Amazon is an equal opportunities employer. We believe passionately that employing More ❯
business benefits and learn from the leaders in the secure financial transactions space. Qualifications What will make you successful Technical skills & knowledge: Broad knowledge of cyber security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience in regulatory reporting. More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Agoda
Strong foundations in software engineering. Minimum of 7 years of technical experience with any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security. Minimum 2 years experience with Software Development Life Cycle in one or more languages (Rust, Python, Go, Nodejs, etc.) Minimum 1 year experience with public More ❯
etc DESIRABLE SKILLS AND EXPERIENCE CISSP, CISM, CCSP, CRISC or equivalent experience Good knowledge covering several of the following examples (this list is not exhaustive): AD, Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with MITRE ATT&CK Familiarity with ITIL Who we More ❯
Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface Management. Cloud Security & Risk applied to all service and More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface Management. Cloud Security & Risk applied to all service and More ❯
DevOps, cloud platforms (AWS/Azure), and scripting (.NET, Java, Python). Ideally, .NET Relevant certifications (CISSP, CCSP, CEH, etc.). Excellent stakeholder management and communication skills. Knowledge of cryptography when it comes to applications would be important to have. For more information, please contact Ian Donnelly on i.donnelly@masonalexander.ie or appy below More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The MDU
Security Team led initiatives. Provide subject matter expertise in all areas of Cyber Security, including but not limited to: o Security Architecture o Application Security o Cloud Security o Cryptography Provide security engineering support to wider teams ensuring controls and assurance are delivered as part of projects and initiatives. Work with suppliers and vendors to coordinate contract security engineers, ensuring More ❯