Stoke-On-Trent, England, United Kingdom Hybrid / WFH Options
bet365
art anti-tamper and defence systems. Demonstrated experience in architecting and implementing advanced security features, anti-tamper and robust defence mechanisms. Strong understanding of cryptography, encryption algorithms, hashing, and secure key management practices. Passionate for uncovering vulnerabilities and staying ahead of potential attackers. Creative approach to security challenges, with a More ❯
of Things. AWS Platform is the glue that holds the AWS ecosystem together. Whether its Identity features such as access management and sign on, cryptography, console, builder & developer tools, and even projects like automating all of our contractual billing systems, AWS Platform is always innovating with the customer in mind. More ❯
certification within 6-months of hire Active Top-Secret Clearance with SCI eligibility Extensive experience with software/firmware Reverse Engineering Advanced Technical understanding cryptography and cryptographic algorithms Advanced Technical understanding software/firmware architecture Advanced Technical understanding of file system structures and functions Advanced Technical understanding Linux architecture Extensive More ❯
virtualized environments Experience with kernel-level development Experience with Windows and Linux driver development Experience with analyzing network protocols Knowledge of IA concepts, including cryptography Bachelor's degree in CS, EE, Computer Engineering, Physics, or a related technical field preferred Clearance: Applicants selected will be subject to a security investigation More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role We are seeking a highly skilled Frontend Engineer with expertise in TypeScript, CSS, HTML, JavaScript More ❯
or computer network enumeration experience required. Scripting or analytic modeling preferred. Experience with CNO, AI/ML, telecommunications engineering, forensic analysis, reverse engineering, or cryptography preferred. MDOPS Preferred Education, Experience, & Skills Master's Degree preferred. Pay Information Full-Time Salary Range: $112420 - $191070 Please note: This range is based on More ❯
At Protegrity, we lead innovation by using AI and quantum-resistant cryptography to transform data protection across cloud-native, hybrid, on-premises, and open source environments. We leverage advanced cryptographic methods such as tokenization, format-preserving encryption, and quantum-resilient techniques to protect sensitive data. As a global leader in More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role Successful candidate will join the young, vibrant, and interdisciplinary FINATRAX Research Group, which builds bridges More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role Successful candidate will join the young, vibrant, and interdisciplinary FINATRAX Research Group, which builds bridges More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
civil operators, are based upon innovative use of radiocommunications, networks, and cybersecurity. We are ground breaking new digital technologies such as 4G mobile communications, cryptography, cloud computing and big data for use in physical protection systems, and critical information systems.Together we offer fantastic opportunities for committed employees to learn and More ❯
and requirements. You join a slack channel and submit a coding challenge in Golang or Rust using Github. Requirements: Golang experience Linux systems engineering Cryptography engineering experience is a plus The Benefits While many companies flaunt their benefits and perks to convince you to join their company, we believe your More ❯
expert in the development of systems and equipment that protect classified National Security information. S/he will be responsible for applying security and cryptography expertise throughout the Systems Engineering process to develop and successfully certify National Security systems on time, within the allotted budget, and with low residual risk. More ❯
Union nationality or a work permit for Luxembourg Java Fullstack Developer Skills in SpringBoot, SpringBatch, APIs rest, IntelliJ, GIT, Maven, Knowledge of IT security, cryptography, certificate management JavaScript, HTML, CSS, Nodejs Sense of organization, respecting the procedures in place Autonomous and willing to work in a team Propose solutions/ More ❯
. Responsibilities: Conducting risk analyses and contributing to security architectures Ensuring compliance with standards such as ISO 27001, IEC 62443, and EN 50701 Applying cryptography and vulnerability assessments Advising and communicating with both technical and non-technical stakeholders We encourage you to apply if: You hold a Master's degree More ❯
Embedded Software Team Leads - Bare Metal Networking Cryptography Reston, VA or McLean, VA Onsite U.S. Citizenship Required Top Secret Clearance Required District Partners is supporting a rapidly scaling defense tech firm is hiring multiple Embedded Software Team Leads (six roles available) to drive the development of mission-critical embedded platforms More ❯
delivering quantum-safe encryption to secure data and communications for enterprises, governments, and critical national infrastructure (CNI). Powered by its advanced symmetric key cryptography, the Arqit SKA-Platform offers scalable encryption that is resilient to quantum threats. The platform allows devices to seamlessly generate and share secure encryption keys More ❯
foundational understanding of how data is represented and flows through mobile systems Is familiar with, or has some experience with: Connectivity, Security, C, NDK, cryptography, KMP. Candidates should also: be able to demonstrate a high level of professionalism. demonstrable ability to build strong and trusted relationships with external parties and More ❯
foundational understanding of how data is represented and flows through mobile systems Is familiar with, or has some experience with: Connectivity, Security, C, NDK, cryptography, KMP They will also: be able to demonstrate a high level of professionalism; demonstrable ability to build strong and trusted relationships with external parties and More ❯
setup, and operations Experience with certificate lifecycle management and automation Knowledge of certificate policies and certificate contents Knowledge of Linux systems Knowledge of asymmetric cryptography concepts and applications TS/SCI clearance HS diploma or GED Nice If You Have: Experience with Active Directory Certificate Services Experience with Keyfactor and More ❯
logs to determine information, including converting raw logs into ECS formatted documents Experience with Logstash plugins, filters, regular expressions, and grok patterns Knowledge of cryptography protocols and standards, including TLS, mTLS, hashing algorithms, and Public Key Infrastructure ( PKI ) Knowledge of federal compliance standards, including NIST 800-53, FIPS, STIG, and More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
defence, security, and civil operators, based on innovative radiocommunications, networks, and cybersecurity technologies. Our work includes groundbreaking digital technologies such as 4G mobile communications, cryptography, cloud computing, and big data, applied in physical protection systems and critical information systems. We offer exciting opportunities for dedicated employees to learn and grow More ❯
infrastructure/tooling, and other low-level software for various blockchain networks including for the Moonbeam Network ( ), zkSync, Starkware, and Polkadot. Problem domains include cryptography, security, networking, game theory, zero knowledge, finance, political science, and programming language design. The Role The Principal Engineer is responsible for scoping, designing, and implementing More ❯
response and playbook development Detection creation within SIEM tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability to understand client-specific challenges and tailor solutions accordingly More ❯
or PCI-DSS. Experience and/or certification in AWS products and services. Experience in threat modeling, secure coding, identity management and authentication, cryptography, Responsible AI and hands-on technical expertise in building security capabilities in code and deploying infrastructure as code. Understanding of automation and DevOps concepts and how More ❯