implement enhancements to the organization's security posture. Lead security awareness training and education initiatives for employees. Requirements In-depth knowledge of security protocols, cryptography, authentication, and authorization. Strong understanding of network security, endpoint security, application security, and cloud security. Familiarity with security frameworks such as NIST, ISO 27001, and more »
Winnersh, England, United Kingdom Hybrid / WFH Options
IDEMIA
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography, we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
Quantique is building the most secure end-to-end IoT platform. We are a transformative cybersecurity technology company, using the most advanced techniques in cryptography and quantum physics, designed to ensure that both device security becomes foundational and end-to-end IoT security standard practice. We operate from silicon to more »
Advanced certifications such as OSCP, OSWE, GPEN, GXPN, eWPT, eWPTX, CREST CWAT, CSSLP. Extensive experience in security source code review. High-level knowledge of cryptography concepts. Experience in security testing and assessments of cloud services. Hands-on experience with red teaming. Active participation in CTF events and competitions. Additional Information more »
the team as they grow. The founders are open regarding experience level and are happy to speak with Engineers from a PhD background in Cryptography or with Engineers with +2 years’ experience and tape out practice in the area of RISC-V. You should have had exposure to SOC microarchitectures more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
ecosystem. The ideal Protocol Engineer will have the following skills and experiences: Experience with protocol engineering in a blockchain setting Understanding of blockchain concepts, cryptography and consensus mechanisms Proficiency and production experience with Rust or Golang Degree in Computer Science, Software Engineering or relevant field If you're looking for more »
Leeds, England, United Kingdom Hybrid / WFH Options
Optalysys
external-facing documents, customer meetings, and/or events) Assist marketing/business development teams with strategy and customer profiling Work closely with the cryptography team to document the development of our hardware API and provide feedback on external stakeholder requirements Provide technical support to during onboarding, prototypes as both more »
Cyber Security Manager Join a leading global investment bank as a Cyber Security manager within our clients IT department. In this hands-on role, you will be instrumental in providing Cyber Security services globally, focusing on driving the Cyber Assurance more »
as Windows, and Linux administration. Proficiency in web service development using variety of protocol including SOAP, XML/HTTP and RESTful HTTP. Experience in cryptography programming, HSM (Hardware Security Module), PKCS#11, Cryptographic Services Provider (CSP) and Cryptographic API Next Generation (CNG) would be an advantage. Work Requirements : Must be legally … Linux administration. Proficiency in web service development using variety of protocol including SOAP, XML/HTTP and RESTful HTTP. Computer Skills Advantageous Experience in cryptography programming, HSM (Hardware Security Module), PKCS#11, Cryptographic Services Provider (CSP) and Cryptographic API Next Generation (CNG) would be an advantage. Why apply? Empowerment: You’ll more »
protection, communication integrity and data provenance by creating trusted connections, even over untrustworthy networks. The role We are looking for a Security Engineer in Cryptography (Cryptographer), who loves challenges and has a research-oriented mindset. You will help develop ground-breaking research into commercially viable and reliable, authentication and encryption … contributing significantly to our growth. You will also have the rare opportunity to work on projects with technologies that are shaping the future, from cryptography and quantum resistant computing, to autonomous vehicles to drones. What you will do: Assist with the design of cryptographic protocols using cryptographic primitives Collaborate with … code, into robust production software fully integrated within our hardware security module Keep up with new research in the space, in particular: post-quantum cryptography, zero-knowledge, privacy preserving technologies and confidential computing What we are looking for: Qualified to at least an MSc degree in cyber security, cryptography, mathematics more »
Kernel and Bootloader Development: Utilize your expertise in Linux kernel and bootloader development to build and maintain secure, reliable system foundations. Device Security and Cryptography: Implement advanced cryptographic techniques to protect data and maintain the confidentiality, integrity, and availability of information on the device. Trusted Execution Environments (TEE): Design and … ensuring device integrity from startup. Linux Kernel and Bootloader Development: Strong background in Linux kernel programming and bootloader development, with a focus on security. Cryptography: In-depth knowledge of cryptographic principles and their application in securing devices. Trusted Execution Environments: Familiarity with TEEs and their role in enhancing device security. more »
EC3V, Walbrook, Greater London, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
DevSecOps and Cloud Security. Technical Expertise: Strong Cloud Security experience in AWS and Azure Endpoint and network security concepts. Okta, Microsoft Entra and others Cryptography and data security. Some knowledge of GDPR & PCI-DSS Strong experience of AWS and ideally certified Forensic investigation techniques. Experience with security technologies (e.g., SIEM more »
Employment Type: Permanent
Salary: £85000 - £95000/annum 10% pension, bonus, medical
and external stakeholders through documentation, customer meetings, and events. * Support the marketing and business development teams with strategy and customer profiling. * Collaborate with the cryptography team to document the development of the hardware API and provide feedback on external stakeholder requirements. * Offer technical support during onboarding and prototype stages, acting … to-date CV or get in touch with me on 0203 103 9992. Keywords: Product Engineer, Prototype Development, User Testing, Experimental Analysis, Design Systems, Cryptography, AWS, C++, Physics, Maths, Computer Science, BSc, MSc, BEng, MEng, Graduate BeTechnology Group Limited is acting as an Employment Agency in relation to this vacancy. more »
and external stakeholders through documentation, customer meetings, and events. Support the marketing and business development teams with strategy and customer profiling. Collaborate with the cryptography team to document the development of the hardware API and provide feedback on external stakeholder requirements. Offer technical support during onboarding and prototype stages, acting … to-date CV or get in touch with me on 0113 453 6570. Keywords: Product Engineer, Prototype Development, User Testing, Experimental Analysis, Design Systems, Cryptography, AWS, C++, Physics, Maths, Computer Science, BSc, MSc, BEng, MEng, Graduate BeTechnology Group Limited is acting as an Employment Agency in relation to this vacancy. more »
hold a full UK driving license. Key Responsibilities: Deploy, administer, and maintain Network & Security platforms, including routers, switches, wireless, firewalls, IDS/IPS, NAC, cryptography systems, monitoring, and cloud technologies. Conduct diagnostics and analysis on Cisco-based Network & Security technologies, including firewalls, VPNs, IDS/IPS, and network policies to more »
scripting skills (Python, PowerShell, Bash). Experience in DevSecOps and Cloud Security. Technical Expertise: Endpoint and network security concepts. Okta, Microsoft Entra and others Cryptography and data security. Some knowledge of GDPR & PCI-DSS Strong experience of AWS and ideally certified Forensic investigation techniques. Experience with security technologies (e.g., SIEM more »
administer, and maintain Network & Security platforms and any other related software, such as routers, switches, wireless, firewalls, intrusion detection/prevention, network access control, cryptography systems, monitoring, and cloud technologies/applications. Perform diagnostics, appraisal, and analysis on predominantly Cisco based Network & Security technologies, such as, firewalls, VPNs, intrusion detection more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Matchtech
SIEM, firewalls, intrusion detection/prevention systems, antivirus software, authentication systems, and log management. Strong knowledge of security approaches, including risk analysis, attack vectors, cryptography, and cyber security incident response best practices. If the above role sounds like the right step in your career then please get in touch for more »
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Technical Futures
Software Researcher Remote Working Masters/PhD Mathematics or Computing Strong programming skills - technical skillset to include Compilers/Embedded/Cryptography/Algorithms/Blockchain Financial Security Applications. A Software Researcher with a Masters Degree and/or PhD in Mathematics or Computing and with strong programming skills will … start-up combining high-end security, blockchain and program analysis research. Youll undertake Security Research as part of a team of experts in Compilers, Cryptography, Mathematics and Finance, bringing an appreciation of real-world attacker mentality in order to reduce risk and fortify code. Working Remotely, the Software Researcher can … the following: Masters Degree/PhD in Mathematics, Physics or Computing gained from a top tier University. Project or working knowledge of Embedded, Compilers, Cryptography, Blockchain and/or Algorithms. Proficiency in one or more programming language ( ideally to include C++ and Python). Experience with low level software either more »