Birmingham, Staffordshire, United Kingdom Hybrid/Remote Options
N Consulting Limited
of working with Continuous Integration (CI), Continuous Delivery (CD) and continuous testing tools. • Experience working within an Agile environment. • Programming experience in following languages: Golang & Python. • Good understanding of cryptography (authentication, data encryption). • Ability to quickly acquire new skills and tools. • Good non-functional testing experience. Desirable Skills • Experience working in financial services or other regulated environments. • GCP certifications More ❯
Edinburgh, Midlothian, United Kingdom Hybrid/Remote Options
N Consulting Limited
of working with Continuous Integration (CI), Continuous Delivery (CD) and continuous testing tools. • Experience working within an Agile environment. • Programming experience in following languages: Golang & Python. • Good understanding of cryptography (authentication, data encryption). • Ability to quickly acquire new skills and tools. • Good non-functional testing experience. Desirable Skills • Experience working in financial services or other regulated environments. • GCP certifications More ❯
Sheffield, Yorkshire, United Kingdom Hybrid/Remote Options
N Consulting Limited
of working with Continuous Integration (CI), Continuous Delivery (CD) and continuous testing tools. • Experience working within an Agile environment. • Programming experience in following languages: Golang & Python. • Good understanding of cryptography (authentication, data encryption). • Ability to quickly acquire new skills and tools. • Good non-functional testing experience. Desirable Skills • Experience working in financial services or other regulated environments. • GCP certifications More ❯
Glasgow, Scotland, United Kingdom Hybrid/Remote Options
Smarter Grid Solutions
Atlassian, Maven, Docker, Terraform, Ansible, etc.) Linux and Windows experience Networking experience The following skills are additionally deemed highly advantageous to candidates. Cyber security related experience, including system hardening, cryptography, encryption, authentication and authorization Practical experience deploying on-premise applications using Kubernetes Practical experience working with Azure, AWS or Google Cloud Experience working within an ISO certified QA environment Previous More ❯
Maven, Docker, Terraform, Ansible, etc.). Linux and Windows experience. Networking experience. The following skills are additionally deemed highly advantageous to candidates. Cyber security related experience, including system hardening, cryptography, encryption, authentication and authorization. Practical experience deploying on-premise applications using Kubernetes. Practical experience working with Azure, AWS or Google Cloud. Experience working within an ISO certified QA environment. Previous More ❯
databases; Good knowledge of DevOps tools (Git, Atlassian, Maven, Docker, Terraform, Ansible, etc.); Linux and Windows experience; Networking experience. Highly advantageous skills Cyber security related experience, including system hardening, cryptography, encryption, authentication and authorization; Practical experience deploying on-premise applications using Kubernetes; Practical experience working with Azure, AWS or Google Cloud; Experience working within an ISO certified QA environment; Previous More ❯
Preferred Qualifications: Certifications: CISSP, CISM, CEH, GIAC, Microsoft Certified: Identity and Access, or other IDAM equivalent Technologies. Experience with Zero Trust Architecture and Identity Federation. Exposure to quantum-safe cryptography principles and roadmaps This role will require you to be willing and eligible to undergo a high level of UK security clearance If you're interested in the above, apply More ❯
Cambridgeshire, England, United Kingdom Hybrid/Remote Options
Sanderson
experience of tooling relating to cloud security posture management offerings, cloud native security (AWS/Azure) and endpoint security. Proficient in Public Key Infrastructure, Data at Rest/inTransit, Cryptography, Privileged User Access Management, Zero Trust, Cross Domain Solutions and Role-based Access Controls. Thrives on tackling challenges with creative solutions, challenging the normal. What's in it for You More ❯
Cambridgeshire, East Anglia, United Kingdom Hybrid/Remote Options
Sanderson Government and Defence
experience of tooling relating to cloud security posture management offerings, cloud native security (AWS/Azure) and endpoint security. Proficient in Public Key Infrastructure, Data at Rest/inTransit, Cryptography, Privileged User Access Management, Zero Trust, Cross Domain Solutions and Role-based Access Controls. Thrives on tackling challenges with creative solutions, challenging the normal. What's in it for You More ❯
Hampshire, South East, United Kingdom Hybrid/Remote Options
Sanderson Government and Defence
experience of tooling relating to cloud security posture management offerings, cloud native security (AWS/Azure) and endpoint security. Proficient in Public Key Infrastructure, Data at Rest/inTransit, Cryptography, Privileged User Access Management, Zero Trust, Cross Domain Solutions and Role-based Access Controls. Thrives on tackling challenges with creative solutions, challenging the normal. What's in it for You More ❯
Hereford, Herefordshire, West Midlands, United Kingdom Hybrid/Remote Options
Leidos Innovations UK Limited
to new hardware, tools, and use cases. Familiarity with unit testing, debugging tools, and Git-based workflows. Desirable: Experience with security-focused projects (e.g., Government, MoD). Exposure to cryptography and secure audio/data transport. Knowledge of Bluetooth, Ultra-Wideband, or other wireless protocols. Familiarity with USB device drivers or USB communication. Use of RTOS or bare-metal development More ❯
Leeds, Yorkshire, United Kingdom Hybrid/Remote Options
Stott and May
a minimum of 7-8 years focused on cybersecurity. Proven track record in cybersecurity strategy, team leadership, and incident management. Deep knowledge of blockchain protocols, smart contracts (Solidity, Rust), cryptography, and custody systems. Strong expertise in cloud security, DevSecOps, and secure software development lifecycle (SSDLC). Understanding of AI/ML systems security, including model attacks and data integrity risks. More ❯
have some degree of experience or exposure in at least 3 of the following: Pen testing, web dev frameworks (React, Flask, etc.) Networking (TCP/IP, routing/switching) Cryptography (applied, PQC, symmetric & asymmetric) OS internals (Windows, Linux, MacOS) Hardware testing, including embedded systems, firmware analysis, or physical device security Programming (Python, Java, C#, etc.) Cloud platforms (AWS, Azure, GCP More ❯
have some degree of experience or exposure in at least 3 of the following: Pen testing, web dev frameworks (React, Flask, etc.) Networking (TCP/IP, routing/switching) Cryptography (applied, PQC, symmetric & asymmetric) OS internals (Windows, Linux, MacOS) Hardware testing, including embedded systems, firmware analysis, or physical device security Programming (Python, Java, C#, etc.) Cloud platforms (AWS, Azure, GCP More ❯
modern tools and practices. Work with Continuous Security, CI/CD, and automated testing approaches. Apply expertise in network security (OSI, TCP/IP), web application security (OWASP), and cryptography (PKI, TLS). Mentor, coach, and support the development of junior staff. Communicate complex security topics effectively to both technical and non-technical audiences. Essential Skills & Experience Proven track record More ❯
skills. Endpoint security concepts, controls, and best practices for Servers (e.g. Windows and Linux). General IT networking concepts, protocols, standards and network security concepts, controls, and best practices. Cryptography fundamentals and data security controls and best practices. Forensic investigation techniques. Prior experience deploying, configuring, managing, and/or operating security technologies is preferred, such as endpoint security (e.g. AV More ❯
Threat Intelligence Lifecycle Detection Engineering and Alert Development Experience with Scripting and Programming – e.g. Python/Bash/c/c Java Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Up to date knowledge of the most prevalent APTs and their TTPs. Knowledge of common More ❯
evolution of systems over time Good understanding of data storage approaches and tools and trade-offs involved (RBDMSs, key-value stores, column stores, log storage, ) Good understanding of applying cryptography in software development (e.g. TLS, PKI, HMAC, hashing algorithms, etc.) Good understanding of algorithms and data structures to solve distributed computing problems (e.g. content-based addressing, immutable data structures, CRDTs More ❯
and ensuring compliance with Above Secret requirements and controls. Applying highly tailored advice, guidance, and controls to niche operating areas, with consideration for partners across government. Good knowledge of cryptography requirements and application. Good knowledge of IT systems covering traditional network infrastructure, cloud platforms, and SaaS. Working as a Security Assurance Co-Ordinator Working with various technical teams. Conducting Cyber More ❯
Leicester, England, United Kingdom Hybrid/Remote Options
Mattioli Woods
services, SIEM tools (MS Sentinel), and cloud security architectures knowledge of security frameworks such as ISO 27001, NIST, or CIS Controls strong understanding of network, system, and application security, cryptography, and identity management proven ability to lead projects, work autonomously, and influence stakeholders excellent collaboration and communication skills experience in financial services is desirable Why Mattioli Woods? At Mattioli Woods More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Advanced Resource Managers
OT and IT asset profiles, technologies, and security best practice principles, with a proven ability to contextualize them within the current threat landscape. In-depth knowledge of network protocols, cryptography, security vulnerabilities, and common attack vectors employed by sophisticated threat actors. Demonstrated proficiency in utilizing a wide range of penetration testing tools and methodologies, including those specifically used for threat More ❯
OT and IT asset profiles, technologies, and security best practice principles, with a proven ability to contextualize them within the current threat landscape. In-depth knowledge of network protocols, cryptography, security vulnerabilities, and common attack vectors employed by sophisticated threat actors. Demonstrated proficiency in utilizing a wide range of penetration testing tools and methodologies, including those specifically used for threat More ❯
TOGAF Experience following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as More ❯