Permanent Cryptography Jobs in East London

4 of 4 Permanent Cryptography Jobs in East London

Enterprise Security Architect

East London, London, United Kingdom
HMRC
including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface Management. Cloud Security & Risk More ❯
Employment Type: Permanent
Salary: £80,000
Posted:

Senior JavaScript Security Software Developer, Fraud (Remote)

East London, London, United Kingdom
Hybrid / WFH Options
bet365
art anti-tamper and defence systems. Demonstrated experience in architecting and implementing advanced security features, anti-tamper and robust defence mechanisms. Strong understanding of cryptography, encryption algorithms, hashing, and secure key management practices. Passionate for uncovering vulnerabilities and staying ahead of potential attackers. Creative approach to security challenges, with a More ❯
Posted:

Android Security Software Developer, Fraud (Remote)

East London, London, United Kingdom
Hybrid / WFH Options
bet365
mobile applications. Clear interest in architecting and implementing advanced security features, anti-tamper and robust defence mechanisms. Experience in Android development. Strong knowledge of cryptography and an understanding of encryption algorithms, hashing and secure key management practices. Passionate about uncovering vulnerabilities and staying ahead of potential attackers. Proven ability to More ❯
Posted:

JavaScript Security Software Developer, Fraud (Remote)

East London, London, United Kingdom
Hybrid / WFH Options
bet365
secure, high-performance web applications. Expertise in web development, with additional exposure to native app security to enable cross-platform solutions. Strong knowledge of cryptography, encryption algorithms, hashing and secure key management practices. Passionate for uncovering vulnerabilities and staying ahead of potential attackers. Proven ability to work effectively with cross More ❯
Posted: