Experience with secure coding practices and code review methodologies. • Familiarity with static and dynamic application security testing tools. • Strong understanding of encryption algorithms and cryptography standards. • Familiarity with version control systems (e.g., Git, SVN) and CI/CD pipeline integration. • Experience with security frameworks and industry best practices (e.g., NIST More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role The SigCom research group of SnT, headed by Prof. Symeon Chatzinotas, focuses on wireless/ More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. The Centre is rapidly expanding its research activities and is seeking highly motivated doctoral candidates who wish More ❯
stoke-on-trent, midlands, United Kingdom Hybrid / WFH Options
GivEnergy
Thread, Matter etc. Proven experience on developing firmware with RTOS, e.g. FreeRTOS, RT-Linux, Threadx, etc. Hands on development with IoT infrastructure, MQTT, Protobuf, cryptography, secure boot, etc. Bare metal driver, BSP, board bring up. Basic knowledge of electronics e.g. reading schematics, using test equipment such as DVM and oscilloscope More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. The SPARC group in SnT is pursuing research on signal processing applications in radar and communication systems More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cyber Talent Limited
development, preferably in Java and Python. In depth experience with key ceremonies Experience in system development lifecycle and system integration is desirable. Proficiency in cryptography programming, nShield HSM (Hardware Security Module) Proficient in application development and databases. Desirable background/skills:- Degree holder in Computer Science, Computer Engineering, or related More ❯
analyzing simulated and measured data, developing models, conducting formal verifications, and providing support to our DoD customers in areas such as Side-Channel Analysis Cryptography Physically Unclonable Functions (PUFs) Counterfeit detection Hardware Vulnerability research Anti-Tamper And other topics in the microelectronic security field Depending on candidate skillsets, this position More ❯
the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
National Telecommunications and Information Administration (NTIA and commercial (Federal Communications Commission (FCC frequency registration and approval process International Telecommunications Union (ITU) frequency allocation rules Cryptography implementation and Information Assurance accreditation More ❯
response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, detection and hunting, and emergent security intelligence. We don't expect you to be an expert More ❯
for Information Assurance Services (Confidentiality, Integrity, Nonrepudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary). Required Skills/Abilities: Excellent verbal and written communication skills. Excellent interpersonal, negotiation, and conflict resolution skills. Excellent organizational skills and attention to More ❯
business stakeholders. Information Security Guru: You've got a comprehensive understanding across a range of Information Security domains, including Identity & Access Management, Network Security, Cryptography and Public Key Infrastructure, Mobile & API security, and more. Analytical Ace: Your strong analytical skills help you interpret how industry trends, regulations, and the threat More ❯
firmware review), the ability to perform independent open-source research, and a comprehensive understanding of integrated circuit architectures. • Significant understanding of Networking, Cybersecurity, Linux, Cryptography (public/private key pairs, symmetric, and asymmetric ciphers), and computer programming (C++/Python) and debugging. • Experience with networking and communication protocols (TCP/ More ❯
Government (Azure-Gov) and Amazon Web Services Government (AWS-G). Responsible for assessing and facilitating network requests: including firewall policies, VPN, load balancing, cryptography, and network architecture. Design and implement security-first network policies and procedures to adhere with NIST 800.171 and CMMC compliance regulations. Communicates effectively with end More ❯
solving skills. Knowledge of electronic design & hardware is appreciated. Knowledge of communication interfaces over JTAG, SWD, UART, SPI, I2C is appreciated. Knowledge in applied cryptography and key management is appreciated. Knowledge of Agile/SCRUM is appreciated. Knowledge of RFID industry standards such as ISO7816, ISO14443, ISO15693 is appreciated. Why More ❯
solving skills. Knowledge of electronic design & hardware is appreciated. Knowledge of communication interfaces over JTAG, SWD, UART, SPI, I2C is appreciated. Knowledge in applied cryptography and key management is appreciated. Knowledge of Agile/SCRUM is appreciated. Knowledge of RFID industry standards such as ISO7816, ISO14443, ISO15693 is appreciated. Why More ❯
the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
in Computer Science, Engineering, or a related field is desirable. Additionally, it is highly beneficial if you have experience with any of the following: Cryptography knowledge Black-box reverse engineering Familiarity with UEFI platform firmware, ARM/x86 architectures, and secure boot architectures Experience with SDR, wireless protocols (Bluetooth, Wi More ❯
San Antonio, Texas, United States Hybrid / WFH Options
Kudu Dynamics, LLC
stack applications Experience with automated testing frameworks Experience with Python Experience with setting up Man in the Middle proxies to instrument applications Background in cryptography, privacy, virtual private networking, distributed computing protocols Experience in commonly used communications protocols such as TCP, UDP, HTTPS, TLS Experience evaluating open-source code for More ❯
problems. We are looking for you, if you have: Experience in information security, risk management or compliance, Experience with networks : TCP/IP protocols, cryptography algorithms, routing, firewalling, proxies, WAF, network segmentations, etc. Strong analytical skills, Familiarity with IT risk assessment methods and control frameworks such as ISO27001, NIST, COBIT More ❯
thought leadership in this field. Development: Program advanced mathematics in Rust. Software engineering: Design and manage the delivery of a ZKP-enabled blockchain application. Cryptography: Knowledge of hashes, PKCS standards, X509, signatures, and elliptic curve cryptography. STEM background, likely PhD qualified, though relevant experience is acceptable. Understand the volatile nature More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. The "Technical Standardisation for Trustworthy and Sustainable ICT, Construction, and Aerospace" research programme represents a strategic collaboration More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role SIGCOM group at SnT, University of Luxembourg, is currently seeking expressions of interest from outstanding More ❯