Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Hays Technology
Experience with a range of skills relevant to Cyber Security such as Operations, Architecture, Forensics, Software Development, System Administration (Windows and Linux), Incident Response, Cryptography, Compliance, System Integrations (API and Microservices), Testing, Endpoint security, Cloud Services, Data Management, Networking, End-User/Client devices, Identity and Access Management, Application Development more »
design security controls, solve complex operational issues Expertise with infrastructure-as-code and orchestration tools Strong background in security fundamentals in Linux, Networking and Cryptography #LI-AM3 The Roku Culture Roku is a great place for people who want to work in a fast-paced environment where everyone is focused more »
Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Counter Fraud Authority
Integration oTelecommunications oInternetworking oNetwork Security oNetwork File Servers oNetwork Data Storage Desirable Demonstrate knowledge of web security techniques: oUse of public/private Key cryptography oDefending against common exploits/vulnerabilities in web applications Qualifications Essential Degree in Computer Science, or related subject or equivalent in IT qualifications OR Equivalent more »
LS1, Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Picture More Ltd
log management, content filtering, etc. An excellent understanding of security approaches: ISMS, risk analysis and assessments, the CIA triad, attack vectors including social engineering, cryptography, confidentiality issues and cyber security incident response best practices, including triage and chain of custody Security certifications are highly advantageous more »
protocols Experience in mobile security, including OS, RF, and App security. Ability in software development or programming/Scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threat modelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life more »
protocols Experience in mobile security, including OS, RF, and App security. Ability in software development or programming/scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threat modelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
Our client is a leading technology company specialising in Optical development for cryptography. They are dedicated to delivering innovative solutions in data management and encryption, shaping the future of technology. As they expand their operations, they are seeking a motivated more »