for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role Successful candidates will join the young, vibrant, and interdisciplinary FINATRAX Research Group, which builds bridges More ❯
Systems. Ability to understand and utilize various programming or scripting languages such as shell scripting, Perl, and PowerShell. Practical knowledge of SSL/TLS cryptography and PKI. Knowledge of LDAP and Active Directory services. Desired Qualifications: Strong knowledge and troubleshooting experiences in Windows, Linux, Oracle and MS SQL env platforms More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role The successful candidate will join the CritiX research group ( ) headed by Prof. Marcus Völp. The More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role The successful candidate will join the young, vibrant, and interdisciplinary FINATRAX Research Group, which builds More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role The position is linked to the Interdisciplinary Research Group in Socio-technical Cybersecurity (IRiSC- ). More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. The Centre is rapidly expanding its research activities and is seeking highly motivated doctoral candidates who wish More ❯
e-commerce platform ever built. We value broad and deep technical knowledge, specifically in the fields of forensics, malware analysis, network security, application security, cryptography, and security intelligence. Key job responsibilities - Responding to security incidents, and coordinating a cohesive response involving multiple teams across Amazon. - Providing security engineering solutions and More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role The successful candidate will join the young, vibrant, and interdisciplinary FINATRAX Research Group, which builds More ❯
background and experience (Java, C++, .NET, SQL, XML) You have a good sense of IT security awareness You have basic knowledge and background in Cryptography and Security, including PKI, digital signature, encryption, certificates, HSM and cryptographic APIs (PKCS, OpenSSL, ) Knowledge of legacy products : EFT, payshield 9000, P3CM YOUR CAREER AT More ❯
modification Experience with network stack development, mesh networking, or tactical handheld radios Experience with the Rust programming language Practical knowledge of symmetric and asymmetric cryptography in software, such as working with OpenSSL or other cryptographic libraries Knowledge of cryptographic systems for vulnerabilities and attack vectors including security proofs, cryptanalysis techniques More ❯
Facilities (SCIF) in accordance with ICD-705 specifications and customer specific government requirements (physical security, facility security and access control, network and IT security, cryptography, personnel, etc.) Administer and coordinate applicable aspects of security activities in accordance with company policies and procedures to ensure compliance with federal security regulations, directives More ❯
draft Authorization to Operate (ATO) letters. Conduct security assessments using automated tools and manual techniques to evaluate vulnerabilities across domains such as access control, cryptography, network security, and incident response. Perform vulnerability scans, analyze findings, and recommend remediation strategies. Conduct penetration testing, web application security testing, wireless network assessments, and More ❯
SC Clearance for UK-caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯
SC Clearance for UK-caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯
SC Clearance for UK-caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯
SC Clearance for UK-caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯
SC Clearance for UK-caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯
experience in C/C++ Good practical knowledge developing for User-mode Linux (UML) Understanding of public key infrastructure (PKI) and other uses of cryptography Understanding of the OSI network model, especially the TCP/IP protocols Additional knowledge or experience in any of the following would be beneficial but More ❯
. - Experience with public sector programmes. - Desirable: PCiIAA, SABSA & TOGAF, and enterprise architecture/framework expertise. - Knowledge of identity management, public key infrastructure, SIEM, cryptography, firewalls, and vulnerability scanning. - A security-based master’s degree or a STEM degree is preferred. - Eligibility and willingness to gain UK Security Clearance. If More ❯
. - Experience with public sector programmes. - Desirable: PCiIAA, SABSA & TOGAF, and enterprise architecture/framework expertise. - Knowledge of identity management, public key infrastructure, SIEM, cryptography, firewalls, and vulnerability scanning. - A security-based master’s degree or a STEM degree is preferred. - Eligibility and willingness to gain UK Security Clearance. If More ❯
. - Experience with public sector programmes. - Desirable: PCiIAA, SABSA & TOGAF, and enterprise architecture/framework expertise. - Knowledge of identity management, public key infrastructure, SIEM, cryptography, firewalls, and vulnerability scanning. - A security-based master’s degree or a STEM degree is preferred. - Eligibility and willingness to gain UK Security Clearance. If More ❯
MCS Group | Your Specialist Recruitment Consultancy
on cloud-native network security solutions. Ideal for engineers stepping into architecture, with strong Azure security and CNAPP/CASB experience. Senior PKI/Cryptography Architect Lead enterprise-scale PKI and cryptographic system design. You'll work with Azure Key Vault, HSMs, and Microsoft integrity services. A deep background in More ❯
MCS Group | Your Specialist Recruitment Consultancy
on cloud-native network security solutions. Ideal for engineers stepping into architecture, with strong Azure security and CNAPP/CASB experience. Senior PKI/Cryptography Architect Lead enterprise-scale PKI and cryptographic system design. You'll work with Azure Key Vault, HSMs, and Microsoft integrity services. A deep background in More ❯
Embedded Software Team Leads - Bare Metal Networking Cryptography Reston, VA or McLean, VA Onsite U.S. Citizenship Required Top Secret Clearance Required District Partners is supporting a rapidly scaling defense tech firm is hiring multiple Embedded Software Team Leads (six roles available) to drive the development of mission-critical embedded platforms More ❯