Sheffield, Yorkshire, United Kingdom Hybrid/Remote Options
N Consulting Limited
of working with Continuous Integration (CI), Continuous Delivery (CD) and continuous testing tools. • Experience working within an Agile environment. • Programming experience in following languages: Golang & Python. • Good understanding of cryptography (authentication, data encryption). • Ability to quickly acquire new skills and tools. • Good non-functional testing experience. Desirable Skills • Experience working in financial services or other regulated environments. • GCP certifications More ❯
Edinburgh, Midlothian, United Kingdom Hybrid/Remote Options
N Consulting Limited
of working with Continuous Integration (CI), Continuous Delivery (CD) and continuous testing tools. • Experience working within an Agile environment. • Programming experience in following languages: Golang & Python. • Good understanding of cryptography (authentication, data encryption). • Ability to quickly acquire new skills and tools. • Good non-functional testing experience. Desirable Skills • Experience working in financial services or other regulated environments. • GCP certifications More ❯
Birmingham, Staffordshire, United Kingdom Hybrid/Remote Options
N Consulting Limited
of working with Continuous Integration (CI), Continuous Delivery (CD) and continuous testing tools. • Experience working within an Agile environment. • Programming experience in following languages: Golang & Python. • Good understanding of cryptography (authentication, data encryption). • Ability to quickly acquire new skills and tools. • Good non-functional testing experience. Desirable Skills • Experience working in financial services or other regulated environments. • GCP certifications More ❯
Glasgow, Scotland, United Kingdom Hybrid/Remote Options
Smarter Grid Solutions
Atlassian, Maven, Docker, Terraform, Ansible, etc.) Linux and Windows experience Networking experience The following skills are additionally deemed highly advantageous to candidates. Cyber security related experience, including system hardening, cryptography, encryption, authentication and authorization Practical experience deploying on-premise applications using Kubernetes Practical experience working with Azure, AWS or Google Cloud Experience working within an ISO certified QA environment Previous More ❯
Maven, Docker, Terraform, Ansible, etc.). Linux and Windows experience. Networking experience. The following skills are additionally deemed highly advantageous to candidates. Cyber security related experience, including system hardening, cryptography, encryption, authentication and authorization. Practical experience deploying on-premise applications using Kubernetes. Practical experience working with Azure, AWS or Google Cloud. Experience working within an ISO certified QA environment. Previous More ❯
databases; Good knowledge of DevOps tools (Git, Atlassian, Maven, Docker, Terraform, Ansible, etc.); Linux and Windows experience; Networking experience. Highly advantageous skills Cyber security related experience, including system hardening, cryptography, encryption, authentication and authorization; Practical experience deploying on-premise applications using Kubernetes; Practical experience working with Azure, AWS or Google Cloud; Experience working within an ISO certified QA environment; Previous More ❯
Preferred Qualifications: Certifications: CISSP, CISM, CEH, GIAC, Microsoft Certified: Identity and Access, or other IDAM equivalent Technologies. Experience with Zero Trust Architecture and Identity Federation. Exposure to quantum-safe cryptography principles and roadmaps This role will require you to be willing and eligible to undergo a high level of UK security clearance If you're interested in the above, apply More ❯
Cambridgeshire, England, United Kingdom Hybrid/Remote Options
Sanderson
experience of tooling relating to cloud security posture management offerings, cloud native security (AWS/Azure) and endpoint security. Proficient in Public Key Infrastructure, Data at Rest/inTransit, Cryptography, Privileged User Access Management, Zero Trust, Cross Domain Solutions and Role-based Access Controls. Thrives on tackling challenges with creative solutions, challenging the normal. What's in it for You More ❯
Cambridgeshire, East Anglia, United Kingdom Hybrid/Remote Options
Sanderson Government and Defence
experience of tooling relating to cloud security posture management offerings, cloud native security (AWS/Azure) and endpoint security. Proficient in Public Key Infrastructure, Data at Rest/inTransit, Cryptography, Privileged User Access Management, Zero Trust, Cross Domain Solutions and Role-based Access Controls. Thrives on tackling challenges with creative solutions, challenging the normal. What's in it for You More ❯
Hampshire, South East, United Kingdom Hybrid/Remote Options
Sanderson Government and Defence
experience of tooling relating to cloud security posture management offerings, cloud native security (AWS/Azure) and endpoint security. Proficient in Public Key Infrastructure, Data at Rest/inTransit, Cryptography, Privileged User Access Management, Zero Trust, Cross Domain Solutions and Role-based Access Controls. Thrives on tackling challenges with creative solutions, challenging the normal. What's in it for You More ❯
Hereford, Herefordshire, West Midlands, United Kingdom Hybrid/Remote Options
Leidos Innovations UK Limited
to new hardware, tools, and use cases. Familiarity with unit testing, debugging tools, and Git-based workflows. Desirable: Experience with security-focused projects (e.g., Government, MoD). Exposure to cryptography and secure audio/data transport. Knowledge of Bluetooth, Ultra-Wideband, or other wireless protocols. Familiarity with USB device drivers or USB communication. Use of RTOS or bare-metal development More ❯
Leeds, Yorkshire, United Kingdom Hybrid/Remote Options
Stott and May
a minimum of 7-8 years focused on cybersecurity. Proven track record in cybersecurity strategy, team leadership, and incident management. Deep knowledge of blockchain protocols, smart contracts (Solidity, Rust), cryptography, and custody systems. Strong expertise in cloud security, DevSecOps, and secure software development lifecycle (SSDLC). Understanding of AI/ML systems security, including model attacks and data integrity risks. More ❯
have some degree of experience or exposure in at least 3 of the following: Pen testing, web dev frameworks (React, Flask, etc.) Networking (TCP/IP, routing/switching) Cryptography (applied, PQC, symmetric & asymmetric) OS internals (Windows, Linux, MacOS) Hardware testing, including embedded systems, firmware analysis, or physical device security Programming (Python, Java, C#, etc.) Cloud platforms (AWS, Azure, GCP More ❯
have some degree of experience or exposure in at least 3 of the following: Pen testing, web dev frameworks (React, Flask, etc.) Networking (TCP/IP, routing/switching) Cryptography (applied, PQC, symmetric & asymmetric) OS internals (Windows, Linux, MacOS) Hardware testing, including embedded systems, firmware analysis, or physical device security Programming (Python, Java, C#, etc.) Cloud platforms (AWS, Azure, GCP More ❯
Threat Intelligence Lifecycle Detection Engineering and Alert Development Experience with Scripting and Programming – e.g. Python/Bash/c/c Java Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Up to date knowledge of the most prevalent APTs and their TTPs. Knowledge of common More ❯
and ensuring compliance with Above Secret requirements and controls. Applying highly tailored advice, guidance, and controls to niche operating areas, with consideration for partners across government. Good knowledge of cryptography requirements and application. Good knowledge of IT systems covering traditional network infrastructure, cloud platforms, and SaaS. Working as a Security Assurance Co-Ordinator Working with various technical teams. Conducting Cyber More ❯
Leicester, England, United Kingdom Hybrid/Remote Options
Mattioli Woods
services, SIEM tools (MS Sentinel), and cloud security architectures knowledge of security frameworks such as ISO 27001, NIST, or CIS Controls strong understanding of network, system, and application security, cryptography, and identity management proven ability to lead projects, work autonomously, and influence stakeholders excellent collaboration and communication skills experience in financial services is desirable Why Mattioli Woods? At Mattioli Woods More ❯
TOGAF Experience following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as More ❯
model driven engineering using Matlab and Simulink tools Derivation of detailed Firmware requirements and architecture from system requirements A structured approach to firmware design (RTCA DO-254 or similar) Cryptography and anti-tamper techniques Artificial Intelligence including machine learning and genetic algorithms Electronics test methods and equipment Good verbal and written communication skills Working in mixed discipline teams HNC/ More ❯
good understanding of modern IT technologies and services, such as Cloud Computing, AI (ISO42001 desirable), Mobile Computing, IT Security, Infrastructure technologies, Zero Trust, Data at Rest/In Transit Cryptography, Cross Domain Solutions and demonstrate an understanding of security architecture both physical and cloud (be able to read and understand HLDs/LLDs). As a team we're always More ❯
Greater Bristol Area, United Kingdom Hybrid/Remote Options
Queen Square Recruitment
understanding of secure coding practices and backend architecture . Excellent analytical, problem-solving, and strategic thinking skills . Desirable Skills/Experience: Experience in Java development . Familiarity with cryptography frameworks in Go or Java . Working knowledge of SQL databases . Interest or experience in application security or mobile app security . Exposure to cloud environments and DevOps pipelines More ❯
Guildford, England, United Kingdom Hybrid/Remote Options
Hawksworth
and COBIT frameworks Deep understanding of data centre/network and workplace architectures and operations both within the insurance industry and market generally Good understanding of security design, including cryptography, within infrastructure, application and workplace environments. Proven experience in IT including hands-on with security tooling, risk analysis, or governance roles within complex enterprise environments. Strong understanding of communication protocols More ❯
Farnborough, Hampshire, South East, United Kingdom
Damia Group Ltd
these into solution design. Ability to present complex technical information to non-technical audiences. Experience of working with both hardware- and software-based cross domain approaches. Strong knowledge of cryptography and public key infrastructure. Experience of MOD systems and assurance processes. It would also be desirable for you to have demonstrable experience of: Working with the MOD and Defence Digital More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Experience working with PAM solutions More ❯
Assessor qualification (e.g. Level 3 Award in Assessing) Industry experience or recent graduate status welcomed Relevant CompTIA qualifications (e.g. Security+, Network+) Understanding of core Cyber Security principles such as Cryptography, Incident Response, Information Security, and Forensics Next Steps Once you've applied, one of our friendly further education consultants will give you a call to discuss this opportunity. The college More ❯