EC3V, Walbrook, Greater London, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
feature and product releases Strong scripting skills (Python, PowerShell, Bash). Experience in DevSecOps and Cloud Security. Technical Expertise: Endpoint and network security concepts. Cryptography and data security. Some knowledge of GDPR & PCI-DSS Strong experience of AWS and ideally certified Forensic investigation techniques. Experience with security technologies (e.g., SIEM more »
software, authentication systems, and log management. knowledge of security approaches including ISMS, risk analysis and assessments, the CIA triad, attack vectors (including social engineering), cryptography, confidentiality issues, and best practices for cyber security incident response (including triage and chain of custody). to proactively identify areas for improvement, share lessons more »
with public cloud: Microsoft Azure or Google Cloud Understanding of API-based architectures Experience in Securing AKS/GKE/Istio (Kubernetes) Understanding of Cryptography - Keys, certificates Experience with secret management solutions and network security - WAF/WAP/Firewalls And any experience of these would be really useful Ability more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Hays Technology
Experience with a range of skills relevant to Cyber Security such as Operations, Architecture, Forensics, Software Development, System Administration (Windows and Linux), Incident Response, Cryptography, Compliance, System Integrations (API and Microservices), Testing, Endpoint security, Cloud Services, Data Management, Networking, End-User/Client devices, Identity and Access Management, Application Development more »
Essential Advanced knowledge of security technologies including firewalls, anti-malware, IDS/IPS, web filtering, email filtering, SIEM, patch management, MDM, DLP, PKI and cryptography, IAM (Identity and access management) including MFA (multi-factor authentication) Advanced knowledge of ICT infrastructure including; networking and associated protocols, remote access, virtualisation (compute and more »
hold a full UK driving license. Key Responsibilities: Deploy, administer, and maintain Network & Security platforms, including routers, switches, wireless, firewalls, IDS/IPS, NAC, cryptography systems, monitoring, and cloud technologies. Conduct diagnostics and analysis on Cisco-based Network & Security technologies, including firewalls, VPNs, IDS/IPS, and network policies to more »
Winnersh, England, United Kingdom Hybrid / WFH Options
IDEMIA
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography, we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
winnersh, south east england, United Kingdom Hybrid / WFH Options
IDEMIA
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography, we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
London, England, United Kingdom Hybrid / WFH Options
Haleon
Capable of responding to audits related to IAM processes and tools. Expertise in security domains like Network Security, Email Security, Cloud Security, Compliance, Governance, Cryptography, IAM, Privacy, Risk Management, and more. Understanding of managing Identity lifecycle across complex organizations. Skilled in crafting simplified processes that surpass security and compliance standards. more »
Dartford, England, United Kingdom Hybrid / WFH Options
Europa Worldwide Group
administer, and maintain Network & Security platforms and any other related software, such as routers, switches, wireless, firewalls, intrusion detection/prevention, network access control, cryptography systems, monitoring, and cloud technologies/applications. Perform diagnostics, appraisal, and analysis on predominantly Cisco based Network & Security technologies, such as, firewalls, VPN’s, intrusion more »
Quantique is building the most secure end-to-end IoT platform. We are a transformative cybersecurity technology company, using the most advanced techniques in cryptography and quantum physics, designed to ensure that both device security becomes foundational and end-to-end IoT security standard practice. We operate from silicon to more »
Quantique is building the most secure end-to-end IoT platform. We are a transformative cybersecurity technology company, using the most advanced techniques in cryptography and quantum physics, designed to ensure that both device security becomes foundational and end-to-end IoT security standard practice. We operate from silicon to more »
Cheltenham, Gloucestershire, South West, United Kingdom
Searchability NS&D Ltd
85k DoE plus 15% clearance bonus Full time on site in Cheltenham Skills required in problem solving, IDA Pro, Wireshark, Kali, C/C++, Cryptography Who are we? We are seeking a dynamic and resourceful individual to join our team as a Security Researcher. The ideal candidate will possess a more »
Good grasp of application security issues, knowing XSS vs SSRF for example. Know their way around OWASP T10 + API etc Good knowledge of cryptography Able to keep up with conversations around common CI/CD topics Person Specification: Previous experience in working in UK Financial Services or similar highly more »
london, south east england, United Kingdom Hybrid / WFH Options
Maclean Moore
Good grasp of application security issues, knowing XSS vs SSRF for example. Know their way around OWASP T10 + API etc Good knowledge of cryptography Able to keep up with conversations around common CI/CD topics Person Specification: Previous experience in working in UK Financial Services or similar highly more »
Gloucester, England, United Kingdom Hybrid / WFH Options
Lockheed Martin Corporation
at varying roles and levels. Cloud Security - Understanding of security in the cloud and how to design and implement strategies on hyperscale cloud providers. Cryptography - Applying principles of cryptography to secure communications and to protect data from unauthorised access or alteration. Security Architecture - Designing, building, and maintaining secure systems based more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Matchtech
SIEM, firewalls, intrusion detection/prevention systems, antivirus software, authentication systems, and log management. Strong knowledge of security approaches, including risk analysis, attack vectors, cryptography, and cyber security incident response best practices. If the above role sounds like the right step in your career then please get in touch for more »
85k DoE plus 15% clearance bonus Full time on site in Cheltenham Skills required in problem solving, IDA Pro, Wireshark, Kali, C/C++, Cryptography Who are we? We are seeking a dynamic and resourceful individual to join our team as a Security Researcher. The ideal candidate will possess a more »
administer, and maintain Network & Security platforms and any other related software, such as routers, switches, wireless, firewalls, intrusion detection/prevention, network access control, cryptography systems, monitoring, and cloud technologies/applications. Perform diagnostics, appraisal, and analysis on predominantly Cisco based Network & Security technologies, such as, firewalls, VPNs, intrusion detection more »
operations whilst also continuing to develop out their Cyber footprint. Key Responsibilities: * To deploy, manage and maintain all security systems including Firewalls, intrusion detection, cryptography and ant-virus * Ensure and oversee industry-standard best practices * Manage connection security for local network and e-mail * Manage penetration testing - identifying vulnerabilities * Actively more »
protocols Experience in mobile security, including OS, RF, and App security. Ability in software development or programming/scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threat modelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life more »
and interpersonal skills. Ability to work independently and prioritize tasks effectively. Willingness to learn and adapt in a dynamic environment. Desirable Attributes: Knowledge of cryptography and cryptographic systems. Experience in OS development (Kernel or Userland). Familiarity with authentication technologies like Kerberos. If you are a seasoned security professional with more »
and interpersonal skills. Ability to work independently and prioritize tasks effectively. Willingness to learn and adapt in a dynamic environment. Desirable Attributes: Knowledge of cryptography and cryptographic systems. Experience in OS development (Kernel or Userland). Familiarity with authentication technologies like Kerberos. If you are a seasoned security professional with more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »