Sheffield, Yorkshire, United Kingdom Hybrid/Remote Options
N Consulting Limited
of working with Continuous Integration (CI), Continuous Delivery (CD) and continuous testing tools. • Experience working within an Agile environment. • Programming experience in following languages: Golang & Python. • Good understanding of cryptography (authentication, data encryption). • Ability to quickly acquire new skills and tools. • Good non-functional testing experience. Desirable Skills • Experience working in financial services or other regulated environments. • GCP certifications More ❯
Edinburgh, Midlothian, United Kingdom Hybrid/Remote Options
N Consulting Limited
of working with Continuous Integration (CI), Continuous Delivery (CD) and continuous testing tools. • Experience working within an Agile environment. • Programming experience in following languages: Golang & Python. • Good understanding of cryptography (authentication, data encryption). • Ability to quickly acquire new skills and tools. • Good non-functional testing experience. Desirable Skills • Experience working in financial services or other regulated environments. • GCP certifications More ❯
Birmingham, Staffordshire, United Kingdom Hybrid/Remote Options
N Consulting Limited
of working with Continuous Integration (CI), Continuous Delivery (CD) and continuous testing tools. • Experience working within an Agile environment. • Programming experience in following languages: Golang & Python. • Good understanding of cryptography (authentication, data encryption). • Ability to quickly acquire new skills and tools. • Good non-functional testing experience. Desirable Skills • Experience working in financial services or other regulated environments. • GCP certifications More ❯
Farnborough, Hampshire, South East, United Kingdom
Sanderson Government and Defence
a good understanding of modern IT technologies and services, such as Cloud Computing, AI (ISO42001), Mobile Computing, IT Security, Infrastructure technologies, Zero Trust, Data at Rest/In Transit Cryptography, Cross Domain Solutions and demonstrate an understanding of security architecture both physical and cloud (be able to read and understand HLDs/LLDs). Strong working knowledge of : Security Assurance More ❯
Glasgow, Scotland, United Kingdom Hybrid/Remote Options
Smarter Grid Solutions
Atlassian, Maven, Docker, Terraform, Ansible, etc.) Linux and Windows experience Networking experience The following skills are additionally deemed highly advantageous to candidates. Cyber security related experience, including system hardening, cryptography, encryption, authentication and authorization Practical experience deploying on-premise applications using Kubernetes Practical experience working with Azure, AWS or Google Cloud Experience working within an ISO certified QA environment Previous More ❯
Maven, Docker, Terraform, Ansible, etc.). Linux and Windows experience. Networking experience. The following skills are additionally deemed highly advantageous to candidates. Cyber security related experience, including system hardening, cryptography, encryption, authentication and authorization. Practical experience deploying on-premise applications using Kubernetes. Practical experience working with Azure, AWS or Google Cloud. Experience working within an ISO certified QA environment. Previous More ❯
databases; Good knowledge of DevOps tools (Git, Atlassian, Maven, Docker, Terraform, Ansible, etc.); Linux and Windows experience; Networking experience. Highly advantageous skills Cyber security related experience, including system hardening, cryptography, encryption, authentication and authorization; Practical experience deploying on-premise applications using Kubernetes; Practical experience working with Azure, AWS or Google Cloud; Experience working within an ISO certified QA environment; Previous More ❯
Preferred Qualifications: Certifications: CISSP, CISM, CEH, GIAC, Microsoft Certified: Identity and Access, or other IDAM equivalent Technologies. Experience with Zero Trust Architecture and Identity Federation. Exposure to quantum-safe cryptography principles and roadmaps This role will require you to be willing and eligible to undergo a high level of UK security clearance If you're interested in the above, apply More ❯
Cambridgeshire, England, United Kingdom Hybrid/Remote Options
Sanderson
experience of tooling relating to cloud security posture management offerings, cloud native security (AWS/Azure) and endpoint security. Proficient in Public Key Infrastructure, Data at Rest/inTransit, Cryptography, Privileged User Access Management, Zero Trust, Cross Domain Solutions and Role-based Access Controls. Thrives on tackling challenges with creative solutions, challenging the normal. What's in it for You More ❯
Cambridgeshire, East Anglia, United Kingdom Hybrid/Remote Options
Sanderson Government and Defence
experience of tooling relating to cloud security posture management offerings, cloud native security (AWS/Azure) and endpoint security. Proficient in Public Key Infrastructure, Data at Rest/inTransit, Cryptography, Privileged User Access Management, Zero Trust, Cross Domain Solutions and Role-based Access Controls. Thrives on tackling challenges with creative solutions, challenging the normal. What's in it for You More ❯
Hampshire, South East, United Kingdom Hybrid/Remote Options
Sanderson Government and Defence
experience of tooling relating to cloud security posture management offerings, cloud native security (AWS/Azure) and endpoint security. Proficient in Public Key Infrastructure, Data at Rest/inTransit, Cryptography, Privileged User Access Management, Zero Trust, Cross Domain Solutions and Role-based Access Controls. Thrives on tackling challenges with creative solutions, challenging the normal. What's in it for You More ❯
Hereford, Herefordshire, West Midlands, United Kingdom Hybrid/Remote Options
Leidos Innovations UK Limited
to new hardware, tools, and use cases. Familiarity with unit testing, debugging tools, and Git-based workflows. Desirable: Experience with security-focused projects (e.g., Government, MoD). Exposure to cryptography and secure audio/data transport. Knowledge of Bluetooth, Ultra-Wideband, or other wireless protocols. Familiarity with USB device drivers or USB communication. Use of RTOS or bare-metal development More ❯
Wokingham, Berkshire, England, United Kingdom Hybrid/Remote Options
KBC Technologies UK LTD
Apply industry frameworks such as NIST Cybersecurity Framework, ISO 27001, CIS Controls . Oversee and enhance security technologies: SIEM, vulnerability management, cloud security (OCI/Azure/AWS), PKI, cryptography, web/email security, logging and monitoring . Monitor network traffic for anomalies and potential breaches. Collaborate with IT teams (network engineers, sysadmins, developers) to ensure a holistic approach to More ❯
Leeds, Yorkshire, United Kingdom Hybrid/Remote Options
Stott and May
a minimum of 7-8 years focused on cybersecurity. Proven track record in cybersecurity strategy, team leadership, and incident management. Deep knowledge of blockchain protocols, smart contracts (Solidity, Rust), cryptography, and custody systems. Strong expertise in cloud security, DevSecOps, and secure software development lifecycle (SSDLC). Understanding of AI/ML systems security, including model attacks and data integrity risks. More ❯
have some degree of experience or exposure in at least 3 of the following: Pen testing, web dev frameworks (React, Flask, etc.) Networking (TCP/IP, routing/switching) Cryptography (applied, PQC, symmetric & asymmetric) OS internals (Windows, Linux, MacOS) Hardware testing, including embedded systems, firmware analysis, or physical device security Programming (Python, Java, C#, etc.) Cloud platforms (AWS, Azure, GCP More ❯
have some degree of experience or exposure in at least 3 of the following: Pen testing, web dev frameworks (React, Flask, etc.) Networking (TCP/IP, routing/switching) Cryptography (applied, PQC, symmetric & asymmetric) OS internals (Windows, Linux, MacOS) Hardware testing, including embedded systems, firmware analysis, or physical device security Programming (Python, Java, C#, etc.) Cloud platforms (AWS, Azure, GCP More ❯
Threat Intelligence Lifecycle Detection Engineering and Alert Development Experience with Scripting and Programming – e.g. Python/Bash/c/c Java Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Up to date knowledge of the most prevalent APTs and their TTPs. Knowledge of common More ❯
and ensuring compliance with Above Secret requirements and controls. Applying highly tailored advice, guidance, and controls to niche operating areas, with consideration for partners across government. Good knowledge of cryptography requirements and application. Good knowledge of IT systems covering traditional network infrastructure, cloud platforms, and SaaS. Working as a Security Assurance Co-Ordinator Working with various technical teams. Conducting Cyber More ❯
Leicester, England, United Kingdom Hybrid/Remote Options
Mattioli Woods
services, SIEM tools (MS Sentinel), and cloud security architectures knowledge of security frameworks such as ISO 27001, NIST, or CIS Controls strong understanding of network, system, and application security, cryptography, and identity management proven ability to lead projects, work autonomously, and influence stakeholders excellent collaboration and communication skills experience in financial services is desirable Why Mattioli Woods? At Mattioli Woods More ❯
TOGAF Experience following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as More ❯
model driven engineering using Matlab and Simulink tools Derivation of detailed Firmware requirements and architecture from system requirements A structured approach to firmware design (RTCA DO-254 or similar) Cryptography and anti-tamper techniques Artificial Intelligence including machine learning and genetic algorithms Electronics test methods and equipment Good verbal and written communication skills Working in mixed discipline teams HNC/ More ❯
model driven engineering using Matlab and Simulink tools Derivation of detailed Firmware requirements and architecture from system requirements A structured approach to firmware design (RTCA DO-254 or similar) Cryptography and anti-tamper techniques Artificial Intelligence including machine learning and genetic algorithms Electronics test methods and equipment Good verbal and written communication skills Working in mixed discipline teams HNC/ More ❯
and Simulink tools. Derive detailed Firmware requirements and architecture from system requirements. Apply a structured approach to firmware design following standards such as RTCA DO-254 or similar. Employ cryptography and anti-tamper techniques. Incorporate Artificial Intelligence, machine learning, and genetic algorithms into designs. Use various electronics test methods and equipment. Collaborate effectively within mixed discipline teams. Job Requirements: Strong More ❯
good understanding of modern IT technologies and services, such as Cloud Computing, AI (ISO42001 desirable), Mobile Computing, IT Security, Infrastructure technologies, Zero Trust, Data at Rest/In Transit Cryptography, Cross Domain Solutions and demonstrate an understanding of security architecture both physical and cloud (be able to read and understand HLDs/LLDs). As a team we're always More ❯