access management, and secrets management technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied cryptography and cryptographic protocols, such as E2E protection, authenticated encryption, mTLS, Key Exchange/Agreement, Key Derivation, Key Wrapping and Remote Key Attestation. Experience in identifying More ❯
access management, and secrets management technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied cryptography and cryptographic protocols, such as E2E protection, authenticated encryption, mTLS, Key Exchange/Agreement, Key Derivation, Key Wrapping and Remote Key Attestation. Experience in identifying More ❯
field (or equivalent experience). Proven experience (3+ years) as a Cyber Security Specialist or in a similar role. Strong understanding of security protocols, cryptography, firewalls, intrusion detection systems, and VPNs. Proficiency in security tools such as SIEM, anti-virus software, IDS/IPS, and vulnerability scanners. Knowledge of security More ❯
performing threat modeling, configuring software and hardware test environments, guiding/monitoring internal and external test personnel, addressing technical questions around hardware implementations for cryptography, access, and threat mitigations. To succeed in this role, you will deliver on-time results based in your deep technical expertise that delight your customers. More ❯
networking (SDN) Must have and maintain a current/active Top Secret/SCI clearance. Desired Qualifications: Familiarity with emerging technologies like quantum-resistant cryptography, or advanced SD-WAN solutions. Scripting and automation skills (e.g., Python, PowerShell) to enhance network efficiency. Understanding of compliance standards (e.g., PCI-DSS, GDPR, HIPAA More ❯
SCI with Polygraph. PREFERRED QUALIFICATIONS - 2+ years of any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience - Experience with AWS products and services - Deep understanding of software development and deployment practices - feature branch management strategies, continuous More ❯
with Elasticsearch (Search/Storage Technology) - Highly desirable. Comprehensive understanding of SQL (Search Query Language for relational databases). Basic understanding of symmetric key cryptography Basic understanding of common file formats and serialization techniques. Strong analytical and problem-solving skills. Excellent communication and team collaboration abilities. As an equal opportunities More ❯
the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification, authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
solution to all your blockchain/cryptocurrency needs. Role Description: Backend pro efficient in Node.js or Golang Blockchain expert (Solidity, Rust) Good knowledge of cryptography Must have solid understanding of hashing and encryption algorithms Efficient knowledge of SNARKs, proofs generation and verification Must be able to perform under pressure and More ❯
compliance efforts, ensuring alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint More ❯
Eligible for a Security Clearance MS degree in computer engineering, computer science or equivalent Experience with Remote Network Device Interface Specification (RNDIS) Experience with Cryptography tools such as OpenSSL Experience with Python scripting Global Comp $75,000 - $150,000 This represents the typical compensation range for this position based on More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role We are seeking a highly skilled Backend Engineer with expertise in Python and Docker. The More ❯
world-leading encryption solutions to secure data and communications for enterprises, governments, defence, and critical national infrastructure (CNI). Powered by advanced symmetric key cryptography, the Arqit SKA-Platform offers scalable dynamic encryption that meets modern industry standards and is resilient to future threats, such as those posed by quantum More ❯
the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
leonardo company
detailed FPGA/Firmware requirements and architecture from system requirements. A structured approach to FPGA/firmware design (RTCA DO-254 or similar). Cryptography and anti-tamper techniques. Artificial Intelligence including machine learning and genetic algorithms. Electronics test methods and equipment. Good verbal and written communication skills. Working in More ❯
oriented language experience. - Extensive experience and expertise in any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience. - Experience using Large Language Models (LLM) in security engineering. PREFERRED QUALIFICATIONS - Master's or PhD in cyber security or More ❯
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing. Requirements: Candidates must meet these requirements More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. The "Technical Standardisation for trustworthy and sustainable ICT, Construction, and Aerospace" programme represents a strategic collaboration between More ❯
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; This is you: Bachelors degree (technical More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Mindbank Consulting Group
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; JOB RESPONSIBILITIES FOR THE CYBER SECURITY More ❯
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; This is you: Bachelors degree (technical More ❯
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; Requirements: Bachelors degree (technical discipline preferred More ❯
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; This is you: Bachelors degree (technical More ❯
the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯