with Elasticsearch (Search/Storage Technology) - Highly desirable. Comprehensive understanding of SQL (Search Query Language for relational databases). Basic understanding of symmetric key cryptography Basic understanding of common file formats and serialization techniques. Strong analytical and problem-solving skills. Excellent communication and team collaboration abilities. As an equal opportunities More ❯
Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface Management. More ❯
compliance efforts, ensuring alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint More ❯
focused training. Support hiring and onboarding activities by leveraging your industry network. Personal Growth & Industry Engagement Stay up-to-date with emerging technologies in cryptography and PKI. Attend and speak at vendor/sales events as a trusted advisor/thought leader. Actively engage in personal development and contribute to More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
leonardo company
detailed FPGA/Firmware requirements and architecture from system requirements. A structured approach to FPGA/firmware design (RTCA DO-254 or similar). Cryptography and anti-tamper techniques. Artificial Intelligence including machine learning and genetic algorithms. Electronics test methods and equipment. Good verbal and written communication skills. Working in More ❯
including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface Management. Cloud Security & Risk More ❯
including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface Management. Cloud Security & Risk More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface Management. Cloud Security & Risk More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and More ❯
SKILLS AND EXPERIENCE CISSP, CISM, CCSP, CRISC or equivalent experience Good knowledge covering several of the following examples (this list is not exhaustive): AD, Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with More ❯
Plymouth, Devon, United Kingdom Hybrid / WFH Options
Thales Group
You can independently define architectures, are proficient in Infrastructure Security, Security Supervision, and Information Systems Security. You are familiar with Risk Analysis, Network Security, Cryptography, IAM, cloud technologies, and compliance monitoring. You excel in working with customers and technical teams. NICE TO HAVE: Domain expertise in Defence, Nuclear, Government, Aerospace More ❯
work at a technical level with teams; Identification/design/selection of appropriate security components to provide security enforcing functions (e.g. network, endpoints, cryptography, authentication, authorisation, data inspection etc) for a variety of infrastructures including cloud environments; Legal and regulatory topics that merit consideration when conducting various activities in More ❯
work at a technical level with teams; Identification/design/selection of appropriate security components to provide security enforcing functions (e.g. network, endpoints, cryptography, authentication, authorisation, data inspection etc) for a variety of infrastructures including cloud environments; Legal and regulatory topics that merit consideration when conducting various activities in More ❯
yourself to reach your own career goals with our support. You will also have the rare opportunity in NI to work on projects with cryptography, quantum computing, and a vast range of technology, from autonomous vehicles to drones. With the help and support of our software and firmware teams, the More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Advanced Resource Managers
technologies, and security best practice principles, with a proven ability to contextualize them within the current threat landscape. In-depth knowledge of network protocols, cryptography, security vulnerabilities, and common attack vectors employed by sophisticated threat actors. Demonstrated proficiency in utilizing a wide range of penetration testing tools and methodologies, including More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Advanced Resource Managers
technologies, and security best practice principles, with a proven ability to contextualize them within the current threat landscape. In-depth knowledge of network protocols, cryptography, security vulnerabilities, and common attack vectors employed by sophisticated threat actors. Demonstrated proficiency in utilizing a wide range of penetration testing tools and methodologies, including More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
Design, and Information Systems Security (ISS) You can advise and give support to the rest of the team Familiar with Risk Analysis, Network Security, Cryptography, Identity & Access Management (software/hardware development, the NIST Cybersecurity Framework, cloud technologies) Able to monitor and measure risk as well as compliance You have More ❯
glasgow, central scotland, United Kingdom Hybrid / WFH Options
FullProxy
and non-technical audiences Fortinet certification is a plus, such as Fortinet NSE4-77,/FCX, FCSS and FCP/FCX, FCSS and FCP Cryptography, Encryption, PKI knowledge would be fantastic Experience with cloud platforms such as AWS, Azure, or Google Cloud Platform is a plus You need to be More ❯
milton, central scotland, United Kingdom Hybrid / WFH Options
FullProxy
and non-technical audiences Fortinet certification is a plus, such as Fortinet NSE4-77,/FCX, FCSS and FCP/FCX, FCSS and FCP Cryptography, Encryption, PKI knowledge would be fantastic Experience with cloud platforms such as AWS, Azure, or Google Cloud Platform is a plus You need to be More ❯
paisley, central scotland, United Kingdom Hybrid / WFH Options
FullProxy
and non-technical audiences Fortinet certification is a plus, such as Fortinet NSE4-77,/FCX, FCSS and FCP/FCX, FCSS and FCP Cryptography, Encryption, PKI knowledge would be fantastic Experience with cloud platforms such as AWS, Azure, or Google Cloud Platform is a plus You need to be More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thales Group
CLM, .Net) and Client-Server architectures. Good knowledge of database servers (MSSQL, Oracle RAC, or MySQL). Good understanding of networking. Good knowledge of cryptography and key management. Strong written and oral communication skills. Self-driven and motivated individuals. You should have a good understanding of authentication and authorization traffic More ❯
SC Clearance for UK-caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯
SC Clearance for UK-caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯
SC Clearance for UK-caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯