access management, and secrets management technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied cryptography and cryptographic protocols, such as E2E protection, authenticated encryption, mTLS, Key Exchange/Agreement, Key Derivation, Key Wrapping and Remote Key Attestation. Experience in identifying More ❯
access management, and secrets management technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied cryptography and cryptographic protocols, such as E2E protection, authenticated encryption, mTLS, Key Exchange/Agreement, Key Derivation, Key Wrapping and Remote Key Attestation. Experience in identifying More ❯
field (or equivalent experience). Proven experience (3+ years) as a Cyber Security Specialist or in a similar role. Strong understanding of security protocols, cryptography, firewalls, intrusion detection systems, and VPNs. Proficiency in security tools such as SIEM, anti-virus software, IDS/IPS, and vulnerability scanners. Knowledge of security More ❯
solution to all your blockchain/cryptocurrency needs. Role Description: Backend pro efficient in Node.js or Golang Blockchain expert (Solidity, Rust) Good knowledge of cryptography Must have solid understanding of hashing and encryption algorithms Efficient knowledge of SNARKs, proofs generation and verification Must be able to perform under pressure and More ❯
oriented language experience. - Extensive experience and expertise in any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience. - Experience using Large Language Models (LLM) in security engineering. PREFERRED QUALIFICATIONS - Master's or PhD in cyber security or More ❯
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; This is you: Bachelors degree (technical More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Mindbank Consulting Group
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; JOB RESPONSIBILITIES FOR THE CYBER SECURITY More ❯
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; This is you: Bachelors degree (technical More ❯
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; Requirements: Bachelors degree (technical discipline preferred More ❯
with Elasticsearch (Search/Storage Technology) - Highly desirable. Comprehensive understanding of SQL (Search Query Language for relational databases). Basic understanding of symmetric key cryptography Basic understanding of common file formats and serialization techniques. Strong analytical and problem-solving skills. Excellent communication and team collaboration abilities. As an equal opportunities More ❯
the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification, authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
Eligible for a Security Clearance MS degree in computer engineering, computer science or equivalent Experience with Remote Network Device Interface Specification (RNDIS) Experience with Cryptography tools such as OpenSSL Experience with Python scripting Global Comp $75,000 - $150,000 This represents the typical compensation range for this position based on More ❯
Information Assurance Services (Confidentiality, Integrity, Non repudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.) - Review and provide input to program and contract work breakdown structure (WBS), work packages and More ❯
AWS, Azure, Google) These Qualifications Would be Nice to Have: Experience with relational, noSQL, and file-based storage products Experience with Java Security and Cryptology (PKI Certificates) Understanding of Amazon Web Services (AWS) Experience with software configuration management processes and tools Knowledge of Intelligence Community (IC) processes, policies and guidance More ❯
the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
leonardo company
detailed FPGA/Firmware requirements and architecture from system requirements. A structured approach to FPGA/firmware design (RTCA DO-254 or similar). Cryptography and anti-tamper techniques. Artificial Intelligence including machine learning and genetic algorithms. Electronics test methods and equipment. Good verbal and written communication skills. Working in More ❯
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing. Requirements: Candidates must meet these requirements More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. The "Technical Standardisation for trustworthy and sustainable ICT, Construction, and Aerospace" programme represents a strategic collaboration between More ❯
performing threat modeling, configuring software and hardware test environments, guiding/monitoring internal and external test personnel, addressing technical questions around hardware implementations for cryptography, access, and threat mitigations. To succeed in this role, you will deliver on-time results based in your deep technical expertise that delight your customers. More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
WOOD Consulting Services, Inc
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. • Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). • Experience developing on Windows, and/or Linux operating systems. • Must have documented professional experience with web services. More ❯
networking (SDN) Must have and maintain a current/active Top Secret/SCI clearance. Desired Qualifications: Familiarity with emerging technologies like quantum-resistant cryptography, or advanced SD-WAN solutions. Scripting and automation skills (e.g., Python, PowerShell) to enhance network efficiency. Understanding of compliance standards (e.g., PCI-DSS, GDPR, HIPAA More ❯
SCI with Polygraph. PREFERRED QUALIFICATIONS - 2+ years of any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience - Experience with AWS products and services - Deep understanding of software development and deployment practices - feature branch management strategies, continuous More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯