Hands-on experience with vulnerability management, penetration testing, and common attack vectors; familiarity with SAST, DAST, and SCA tools. Strong understanding of the OWASP Top 10, secure coding principles, cryptography, and threat modeling. Proven track record leading client-facing security projects and transformation initiatives. Experience configuring and supporting SIEMs, managing security alerts, and writing custom scripts in PowerShell, Python, or More ❯
Farnborough, Hampshire, South East, United Kingdom
Sanderson Government and Defence
a good understanding of modern IT technologies and services, such as Cloud Computing, AI (ISO42001), Mobile Computing, IT Security, Infrastructure technologies, Zero Trust, Data at Rest/In Transit Cryptography, Cross Domain Solutions and demonstrate an understanding of security architecture both physical and cloud (be able to read and understand HLDs/LLDs). Strong working knowledge of : Security Assurance More ❯
Bethesda, pembrokeshire, united kingdom Hybrid/Remote Options
Noblis
fuzzing tools for testing code and discovering security flaws. Desired Qualifications Experience with Cloud Security (e.g., AWS, Azure, Google Cloud) and securing cloud-based applications and infrastructure. Knowledge of cryptography and its application in securing communications and data storage (e.g., AES, RSA, hashing algorithms). Familiarity with Zero Trust architecture and identity and access management (IAM) principles. Foundation in programming More ❯
Cambridgeshire, England, United Kingdom Hybrid/Remote Options
Sanderson
experience of tooling relating to cloud security posture management offerings, cloud native security (AWS/Azure) and endpoint security. Proficient in Public Key Infrastructure, Data at Rest/inTransit, Cryptography, Privileged User Access Management, Zero Trust, Cross Domain Solutions and Role-based Access Controls. Thrives on tackling challenges with creative solutions, challenging the normal. What's in it for You More ❯
Cambridgeshire, East Anglia, United Kingdom Hybrid/Remote Options
Sanderson Government and Defence
experience of tooling relating to cloud security posture management offerings, cloud native security (AWS/Azure) and endpoint security. Proficient in Public Key Infrastructure, Data at Rest/inTransit, Cryptography, Privileged User Access Management, Zero Trust, Cross Domain Solutions and Role-based Access Controls. Thrives on tackling challenges with creative solutions, challenging the normal. What's in it for You More ❯
Hampshire, South East, United Kingdom Hybrid/Remote Options
Sanderson Government and Defence
experience of tooling relating to cloud security posture management offerings, cloud native security (AWS/Azure) and endpoint security. Proficient in Public Key Infrastructure, Data at Rest/inTransit, Cryptography, Privileged User Access Management, Zero Trust, Cross Domain Solutions and Role-based Access Controls. Thrives on tackling challenges with creative solutions, challenging the normal. What's in it for You More ❯
Preferred Qualifications: Certifications: CISSP, CISM, CEH, GIAC, Microsoft Certified: Identity and Access, or other IDAM equivalent Technologies. Experience with Zero Trust Architecture and Identity Federation. Exposure to quantum-safe cryptography principles and roadmaps This role will require you to be willing and eligible to undergo a high level of UK security clearance If you're interested in the above, apply More ❯
using Terraform Strong knowledge and experience in a variety of technologies including UNIX, Networking, Databases, and Storage. Strong knowledge of Information security controls. Knowledge of software development security and cryptography, AI security. CISSP/CCSK or GCP security related certifications is a plus. Permanent Role - Central London based - candidate must be eligible to work in the UK (no sponsorship) By More ❯
Wokingham, Berkshire, England, United Kingdom Hybrid/Remote Options
KBC Technologies UK LTD
Apply industry frameworks such as NIST Cybersecurity Framework, ISO 27001, CIS Controls . Oversee and enhance security technologies: SIEM, vulnerability management, cloud security (OCI/Azure/AWS), PKI, cryptography, web/email security, logging and monitoring . Monitor network traffic for anomalies and potential breaches. Collaborate with IT teams (network engineers, sysadmins, developers) to ensure a holistic approach to More ❯
enhance security operations. Assist with compliance efforts, ensuring alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint security solutions. Proficiency in scripting More ❯
a multi-disciplinary team working on complex problems, disruptive security technologies, and advanced embedded solutions. The work involves supporting government and industry partners on projects involving secure systems, applied cryptography, and cutting-edge software and microelectronics. About the Role This is an exciting opportunity for software engineers-ranging from early-career developers to highly experienced specialists-to contribute to the More ❯
Strong experience in web and infrastructure penetration testing Proficiency with offensive security tooling and methodologies Ability to produce clear, structured, executive-level reporting Knowledge across network security, application security, cryptography and authentication SC/NATO SECRET security clearance (or eligibility to obtain) Relevant certifications (OSCP, OSCE, OSWE, GPEN, CREST) beneficial This role offers the chance to contribute to a critical More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Cyber Talent Limited
skills and experience:- Experience of PKI lead or similar type roles. In depth experience with key ceremonies Experience in system development lifecycle and system integration is desirable. Proficiency in cryptography programming, nShield HSM (Hardware Security Module) Proficient in application development and databases desirable. Banking or telecoms background desirable Desirable background/skills:- Degree holder in Computer Science, Computer Engineering, or More ❯
good understanding of modern IT technologies and services, such as Cloud Computing, AI (ISO42001 desirable), Mobile Computing, IT Security, Infrastructure technologies, Zero Trust, Data at Rest/In Transit Cryptography, Cross Domain Solutions and demonstrate an understanding of security architecture both physical and cloud (be able to read and understand HLDs/LLDs). As a team we're always More ❯
london, south east england, united kingdom Hybrid/Remote Options
stakefish
charge and get things done despite the unknowns What will be great to have? You have an understanding of the blockchain space and blockchain technology You possess knowledge of cryptography and security best practices You have contributions to open source communities If those describe you, this is the right opportunity for you Why are we awesome you ask? We are More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid/Remote Options
Searchability NS&D
Cryptography Analyst (contract) Hybrid role: 2 days onsite, 3 days remote Up to £312 per day (Inside IR35) Office in Knutsford Active BPSS clearance required Opportunity to work on enterprise-scale cryptographic infrastructure ABOUT THE CLIENT Our client is a global financial technology leader recognised for innovation and operational excellence. They are strengthening their cyber and cryptography capabilities to enhance … the resilience of their platforms. As part of this expansion, they are seeking a Cryptography Analyst to join their established security operations function. THE BENEFITS Hybrid working for a better work-life balance Work with market-leading cryptographic technologies Exposure to enterprise-level environments and global teams THE CRYPTOGRAPHY ANALYST ROLE As a Cryptography Analyst , you will ensure the integrity … tasks, and supporting incident, change, and configuration management. The role involves collaborating with multiple teams to maintain secure and compliant cryptographic services and to continuously improve processes and documentation. CRYPTOGRAPHY ANALYST ESSENTIAL SKILLS Strong background in cryptography or information security Hands-on experience managing HSMs (Thales, Entrust, or Gemalto) Proficiency with HSM monitoring tools and automation Coding skills in Python More ❯
agile development practices and continuous delivery Understand how to performance optimise and fine tune backend applications to meet demanding NFRs Desirable knowledge & experience Experience of JAVA development Experience with cryptography frameworks in go and JAVA Experience with SQL databases Experience and/or Interest in application security and/or mobile app security. Experience with cloud environments including DevOps functions More ❯
risks and recommending practical design improvements. Produce clear, high-quality architecture documentation and models using Sparx Enterprise Architect, ArchiMate, and NAFv4. Create and maintain technology management plans, including configuration, cryptography, and assurance processes. Work closely with security, architecture, and delivery stakeholders to ensure security is embedded across all system designs. Required Skills: Strong UK Defence background, ideally with experience on More ❯
Assessor qualification (e.g. Level 3 Award in Assessing) Industry experience or recent graduate status welcomed Relevant CompTIA qualifications (e.g. Security+, Network+) Understanding of core Cyber Security principles such as Cryptography, Incident Response, Information Security, and Forensics Next Steps Once you've applied, one of our friendly further education consultants will give you a call to discuss this opportunity. The college More ❯
experience in network security or a related field. Strong understanding of network infrastructure, including LAN/WAN, routers, switches, and related network devices. Youll have expertise in security protocols, cryptography, authentication, authorisation, and security. Excellent analytic and problem-solving skills, with the ability to make well-informed security decisions. Strong communication and interpersonal skills, with the ability to effectively communicate More ❯
and continuous delivery Understand how to performance optimise and fine tune backend applications to meet demanding NFRs Desirable Skills/Knowledge/Experience Experience of JAVA development Experience with cryptography frameworks in Go and JAVA Experience with SQL databases Experience and/or interest in application security and/or mobile app security Experience with cloud environments including DevOps functions More ❯
Rust Engineer | Fully remote | 550-650 per day - B2B Contract We are partnering with an advanced cryptography team operating at the forefront of blockchain infrastructure. They are seeking an experienced Rust Engineer to join their engineering team. This is a rare opportunity to work on cutting-edge cryptographic systems powering the next generation of confidential smart contract capabilities. What You More ❯
Andover, Hampshire, South East, United Kingdom Hybrid/Remote Options
Data Careers
integration across systems and deployments. Produce detailed architectural artefacts and documentation (e.g. in Sparx Enterprise Architect using ArchiMate/NAFv4 ). Develop and maintain security management plans covering configuration, cryptography, and assurance controls. Collaborate with senior stakeholders to align with governance and programme requirements. Essential Experience: Strong UK Defence background , ideally within the British Army or related MoD programmes. Expertise More ❯
and help with the running of the department. We're particularly interested in people with research interests around fundamental aspects of cybersecurity, including but not limited to post-quantum cryptography, formal methods and verification, complexity, logical systems and type theory. You'll be part of the Mathematical Foundations of Computation research group, within the Department of Computer Science. The group More ❯