ecosystem. The ideal Protocol Engineer will have the following skills and experiences: Experience with protocol engineering in a blockchain setting Understanding of blockchain concepts, cryptography and consensus mechanisms Proficiency and production experience with Rust or Golang Degree in Computer Science, Software Engineering or relevant field If you're looking for more »
ecosystem. The ideal Protocol Engineer will have the following skills and experiences: Experience with protocol engineering in a blockchain setting Understanding of blockchain concepts, cryptography and consensus mechanisms Proficiency and production experience with Rust or Golang Degree in Computer Science, Software Engineering or relevant field If you're looking for more »
support development. Requirements: Strong understanding of blockchain tech like EVM, Cosmos, and some familiarity with Solana, Bitcoin, Tron, and TON Network. Knowledge of blockchain cryptography and secure communication protocols. Experience with TypeScript, React, and frontend tech. Skills in optimizing builds and using tools like TurboRepo. Previous work with blockchain libraries more »
Glasgow, City of Glasgow, United Kingdom Hybrid / WFH Options
FPSG
groups. A technical background is desired, with exposure to complex Network Infrastructures, ideally to include CISCO kit or similar. Conceptual or practical understanding of cryptography, security and IOT would be a great advantage. Rewards Our client offers a competitive salary, an extensive benefits package and a flexible hybrid working pattern more »
they have planned for you, you will need deep familiarity with UNIX and Windows authentication systems with systems level understanding of other areas. Some cryptography and OS development in either Kernel or Userland is a plus too, as well as some familiarity with Kerberos. You will be working with a more »
they have planned for you, you will need deep familiarity with UNIX and Windows authentication systems with systems level understanding of other areas. Some cryptography and OS development in either Kernel or Userland is a plus too, as well as some familiarity with Kerberos. You will be working with a more »
Senior Security Developer Secure boot Linux kernel and bootloader development experience Experience with on device security and cryptography Familiarity with Trusted execution environments (TEE) C/C++ Low level karnel Development Experience in device driver development as well. Able to lead a team. 10+ Years more »
Senior Security Developer Secure boot Linux kernel and bootloader development experience Experience with on device security and cryptography Familiarity with Trusted execution environments (TEE) C/C++ Low level karnel Development Experience in device driver development as well. Able to lead a team. 10+ Years more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »