EC3V, Walbrook, Greater London, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
feature and product releases Strong scripting skills (Python, PowerShell, Bash). Experience in DevSecOps and Cloud Security. Technical Expertise: Endpoint and network security concepts. Cryptography and data security. Some knowledge of GDPR & PCI-DSS Strong experience of AWS and ideally certified Forensic investigation techniques. Experience with security technologies (e.g., SIEM more »
software, authentication systems, and log management. knowledge of security approaches including ISMS, risk analysis and assessments, the CIA triad, attack vectors (including social engineering), cryptography, confidentiality issues, and best practices for cyber security incident response (including triage and chain of custody). to proactively identify areas for improvement, share lessons more »
green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning A varied background, diverse programme exposure and a security based master's degree or alternatively STEM degree would be preferrable - however, an more »
with public cloud: Microsoft Azure or Google Cloud Understanding of API-based architectures Experience in Securing AKS/GKE/Istio (Kubernetes) Understanding of Cryptography - Keys, certificates Experience with secret management solutions and network security - WAF/WAP/Firewalls And any experience of these would be really useful Ability more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Hays Technology
Experience with a range of skills relevant to Cyber Security such as Operations, Architecture, Forensics, Software Development, System Administration (Windows and Linux), Incident Response, Cryptography, Compliance, System Integrations (API and Microservices), Testing, Endpoint security, Cloud Services, Data Management, Networking, End-User/Client devices, Identity and Access Management, Application Development more »
Essential Advanced knowledge of security technologies including firewalls, anti-malware, IDS/IPS, web filtering, email filtering, SIEM, patch management, MDM, DLP, PKI and cryptography, IAM (Identity and access management) including MFA (multi-factor authentication) Advanced knowledge of ICT infrastructure including; networking and associated protocols, remote access, virtualisation (compute and more »
hold a full UK driving license. Key Responsibilities: Deploy, administer, and maintain Network & Security platforms, including routers, switches, wireless, firewalls, IDS/IPS, NAC, cryptography systems, monitoring, and cloud technologies. Conduct diagnostics and analysis on Cisco-based Network & Security technologies, including firewalls, VPNs, IDS/IPS, and network policies to more »
Winnersh, England, United Kingdom Hybrid / WFH Options
IDEMIA
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography, we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
winnersh, south east england, United Kingdom Hybrid / WFH Options
IDEMIA
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography, we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
software engineering. 5+ years in a Cybersecurity Security role with expertise in one or more of the following; network security, application security, cloud security, cryptography, or identity and access management. 2+ years in an ISO 27001, SOX, HIPAA or HITRUST environment. Demonstrated ability to perform the essential duties of the more »
London, England, United Kingdom Hybrid / WFH Options
Haleon
Capable of responding to audits related to IAM processes and tools. Expertise in security domains like Network Security, Email Security, Cloud Security, Compliance, Governance, Cryptography, IAM, Privacy, Risk Management, and more. Understanding of managing Identity lifecycle across complex organizations. Skilled in crafting simplified processes that surpass security and compliance standards. more »
Dartford, England, United Kingdom Hybrid / WFH Options
Europa Worldwide Group
administer, and maintain Network & Security platforms and any other related software, such as routers, switches, wireless, firewalls, intrusion detection/prevention, network access control, cryptography systems, monitoring, and cloud technologies/applications. Perform diagnostics, appraisal, and analysis on predominantly Cisco based Network & Security technologies, such as, firewalls, VPN’s, intrusion more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of more »
DynamoDB Front-end web technologies like HTML, CSS, JavaScript/TypeScript, React/Angular. Software automation experience for testing and deployments Experience of applied cryptography and secure systems You will be working as part of a global team, so good communication skills are essential. This is a hybrid role, located more »
Quantique is building the most secure end-to-end IoT platform. We are a transformative cybersecurity technology company, using the most advanced techniques in cryptography and quantum physics, designed to ensure that both device security becomes foundational and end-to-end IoT security standard practice. We operate from silicon to more »
Quantique is building the most secure end-to-end IoT platform. We are a transformative cybersecurity technology company, using the most advanced techniques in cryptography and quantum physics, designed to ensure that both device security becomes foundational and end-to-end IoT security standard practice. We operate from silicon to more »