access management, and secrets management technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied cryptography and cryptographic protocols, such as E2E protection, authenticated encryption, mTLS, Key Exchange/Agreement, Key Derivation, Key Wrapping and Remote Key Attestation. Experience in identifying More ❯
access management, and secrets management technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied cryptography and cryptographic protocols, such as E2E protection, authenticated encryption, mTLS, Key Exchange/Agreement, Key Derivation, Key Wrapping and Remote Key Attestation. Experience in identifying More ❯
Technology is seeking a Network Software Engineer with expertise in software development to play a crucial role in leading the development and implementation of cryptology network solutions for our company's products. You will provide technical guidance and ensure the successful delivery of high-quality software solutions. Key Responsibilities: Design More ❯
oriented language experience. - Extensive experience and expertise in any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience. - Experience using Large Language Models (LLM) in security engineering. PREFERRED QUALIFICATIONS - Master's or PhD in cyber security or More ❯
oriented language experience. - Extensive experience and expertise in any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience. - Experience using Large Language Models (LLM) in security engineering. PREFERRED QUALIFICATIONS - Master's or PhD in cyber security or More ❯
oriented language experience. - Extensive experience and expertise in any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience. - Experience using Large Language Models (LLM) in security engineering. PREFERRED QUALIFICATIONS - Master's or PhD in cyber security or More ❯
solution to all your blockchain/cryptocurrency needs. Role Description: Backend pro efficient in Node.js or Golang Blockchain expert (Solidity, Rust) Good knowledge of cryptography Must have solid understanding of hashing and encryption algorithms Efficient knowledge of SNARKs, proofs generation and verification Must be able to perform under pressure and More ❯
compliance efforts, ensuring alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint More ❯
world-leading encryption solutions to secure data and communications for enterprises, governments, defence, and critical national infrastructure (CNI). Powered by advanced symmetric key cryptography, the Arqit SKA-Platform offers scalable dynamic encryption that meets modern industry standards and is resilient to future threats, such as those posed by quantum More ❯
Public Cloud IaaS/PaaS services in Azure, AWS, or GCP. Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, CI/CD. Networking (Device configuration management) and Security knowledge. Excellent analytical skills with the ability to assess and prioritize data More ❯
Public Cloud IaaS/PaaS services running in Azure, AWS, or GCP. Familiarity with the latest cybersecurity and engineering concepts including defense in depth, cryptography, privileged access management, DevOps, Continuous Integration, and Continuous Deployment. Networking (Device configuration management) and Security knowledge. Excellent analytical skills with the ability to assess and More ❯
of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services particularly: VPC IAM Security Group Management EBS Outposts Amazon is an equal opportunities More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
leonardo company
detailed FPGA/Firmware requirements and architecture from system requirements. A structured approach to FPGA/firmware design (RTCA DO-254 or similar). Cryptography and anti-tamper techniques. Artificial Intelligence including machine learning and genetic algorithms. Electronics test methods and equipment. Good verbal and written communication skills. Working in More ❯
Python, Ruby, bash, C/C++, C#, Java) to identify security issues Solid knowledge of security engineering practices, including web application security, network security, cryptography, and automation Proven track record to use, coordinate, and solve Linux or Ubuntu, along with experience using security tools (e.g., Nessus, Metasploit, Burp Suite Pro More ❯
Python, Ruby, bash, C/C++, C#, Java) to identify security issues Solid knowledge of security engineering practices, including web application security, network security, cryptography, and automation Proven track record to use, coordinate, and solve Linux or Ubuntu, along with experience using security tools (e.g., Nessus, Metasploit, Burp Suite Pro More ❯
Python, Ruby, bash, C/C++, C#, Java) to identify security issues Solid knowledge of security engineering practices, including web application security, network security, cryptography, and automation Proven track record to use, coordinate, and solve Linux or Ubuntu, along with experience using security tools (e.g., Nessus, Metasploit, Burp Suite Pro More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and More ❯
the leaders in the secure financial transactions space. Qualifications What will make you successful Technical skills & knowledge: Broad knowledge of cyber security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience More ❯
SKILLS AND EXPERIENCE CISSP, CISM, CCSP, CRISC or equivalent experience Good knowledge covering several of the following examples (this list is not exhaustive): AD, Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with More ❯
with at least one of: multiple security technologies such as Firewalls, IDS/IPS, Web Proxies and DLP among others, Web Applications and Services, Cryptography, Social Engineering and Open Source Intelligence Gathering (OSINT), Mobile platforms, Software Security, malware reverse engineering Deep technical understanding of enterprise operating system environments, Active Directory More ❯
cybersecurity threats and risks they face. Broad cybersecurity experience with a combination of technology involvement, business knowledge and risk awareness (incl. on topics like cryptography, network design, application security, data protection, identity and access management, cloud security). Ability to analyse complex problems and to deliver insightful, practical and sustainable More ❯
IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise More ❯
IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise More ❯
IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise More ❯