Job Title: Security Architect (SAP) Work Arrangement: Hybrid (2 days in office) Office Locations: Swindon and London Rate Payable to Contractors: £500- £525 per day Duration of Assignment: 6 months Role Description: As a Security Architect with SAP expertise, you more »
Location: Wiltshire (5 days per week) Duration: 12 months We have an exciting opportunity for a DV Cleared Cryptography Accountant, managing Cryptographic Material in support of the MOD. We are looking for anyone who has any previous MOD crypto management and/or crypto accountancy experience, ideally ex R SIGNALS more »
and external stakeholders through documentation, customer meetings, and events. * Support the marketing and business development teams with strategy and customer profiling. * Collaborate with the cryptography team to document the development of the hardware API and provide feedback on external stakeholder requirements. * Offer technical support during onboarding and prototype stages, acting … to-date CV or get in touch with me on 0203 103 9992. Keywords: Product Engineer, Prototype Development, User Testing, Experimental Analysis, Design Systems, Cryptography, AWS, C++, Physics, Maths, Computer Science, BSc, MSc, BEng, MEng, Graduate BeTechnology Group Limited is acting as an Employment Agency in relation to this vacancy. more »
and external stakeholders through documentation, customer meetings, and events. Support the marketing and business development teams with strategy and customer profiling. Collaborate with the cryptography team to document the development of the hardware API and provide feedback on external stakeholder requirements. Offer technical support during onboarding and prototype stages, acting … to-date CV or get in touch with me on 0113 453 6570. Keywords: Product Engineer, Prototype Development, User Testing, Experimental Analysis, Design Systems, Cryptography, AWS, C++, Physics, Maths, Computer Science, BSc, MSc, BEng, MEng, Graduate BeTechnology Group Limited is acting as an Employment Agency in relation to this vacancy. more »
elements of technical designs/solutions and have a proven ability to constructively challenge to deliver better business and security outcomes; Good knowledge of cryptography Please apply directly and i will be in touch to discuss further more »
software, authentication systems, and log management. knowledge of security approaches including ISMS, risk analysis and assessments, the CIA triad, attack vectors (including social engineering), cryptography, confidentiality issues, and best practices for cyber security incident response (including triage and chain of custody). to proactively identify areas for improvement, share lessons more »
knowledge in at least 3 of the following areas:general information security; security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks, single sign-on technologies; exploit automation platforms; RESTful web servicesBank of America:Every day, across the globe, our employees bring more »
a financial or regulatory environmentDesirable Criteria Sound understanding of financial and, in particular, central bank infrastructure Experience in broader areas such as API development, cryptography, data science or internet of things Awareness and interest in trends in across wider technology e.g. fintech, regtech, cloud, dataYou should not be put off more »
Stoke-On-Trent, England, United Kingdom Hybrid / WFH Options
GivEnergy
Zigbee, Modbus, etc. Proven experience on developing firmware with RTOS, e.g. FreeRTOS, RT-Linux, Threadx, etc. Hands on development with IoT infrastructure, MQTT, Protobuf, cryptography, secure boot, etc. Bare metal driver, BSP, board bring up. Basic knowledge of electronics e.g. reading schematics, using test equipment such as DVM and oscilloscope more »
they have planned for you, you will need deep familiarity with UNIX and Windows authentication systems with systems level understanding of other areas. Some cryptography and OS development in either Kernel or Userland is a plus too, as well as some familiarity with Kerberos. You will be working with a more »
Job Type: Contract Pay: £400 - £650 pd DOE (Inside IR35) Contract Length: 6 Months with potential to extend Work Location: Tewkesbury Clearance Level Required: SC A bit about us… Amiosec is an exciting and growing UK technology company with innovation more »
Are you passionate about cryptography and cyber security? Do you enjoy solving complex problems and designing innovative solutions? Do you want to work on cutting-edge technologies that will shape the future of security and privacy? We are working with a leading company in the field of IoT security, developing … authentication and encryption products that are reliable, scalable and secure. We are looking for a talented and motivated security engineer in cryptography (cryptographer) to join our clients' research team to create the next generation of security solutions. The role: Assist with the design of cryptographic protocols that are efficient, robust … fully integrated within our hardware security module To be successful in this role, you will need: A MSc degree or higher in cyber security, cryptography, mathematics, computer science, or any other subject with substantial mathematical content Strong knowledge and understanding of cyber security fundamentals and best practices Strong applied cryptographic more »
hold a full UK driving license. Key Responsibilities: Deploy, administer, and maintain Network & Security platforms, including routers, switches, wireless, firewalls, IDS/IPS, NAC, cryptography systems, monitoring, and cloud technologies. Conduct diagnostics and analysis on Cisco-based Network & Security technologies, including firewalls, VPNs, IDS/IPS, and network policies to more »
Winnersh, England, United Kingdom Hybrid / WFH Options
IDEMIA
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography, we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
knowledge in at least 3 of the following areas:general information security; security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks, single sign-on technologies; exploit automation platforms; RESTful web servicesBank of America:Every day, across the globe, our employees bring more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Optalysys
both expert and non-expert audiences Knowledge of analogue/mixed-signal design (Desirable) Experience of software and processor based systems (Desirable) Knowledge of cryptography and/or FHE (Desirable) Location Bristol/Hybrid working more »
A bit about us… Amiosec is an exciting and growing UK technology company with innovation, agility, and state of the art technology at its core. We work in partnerships with UK government customers and commercial providers to deliver research, technology more »
Kernel and Bootloader Development: Utilize your expertise in Linux kernel and bootloader development to build and maintain secure, reliable system foundations. Device Security and Cryptography: Implement advanced cryptographic techniques to protect data and maintain the confidentiality, integrity, and availability of information on the device. Trusted Execution Environments (TEE): Design and … ensuring device integrity from startup. Linux Kernel and Bootloader Development: Strong background in Linux kernel programming and bootloader development, with a focus on security. Cryptography: In-depth knowledge of cryptographic principles and their application in securing devices. Trusted Execution Environments: Familiarity with TEEs and their role in enhancing device security. more »
scripting skills (Python, PowerShell, Bash). Experience in DevSecOps and Cloud Security. Technical Expertise: Endpoint and network security concepts. Okta, Microsoft Entra and others Cryptography and data security. Some knowledge of GDPR & PCI-DSS Strong experience of AWS and ideally certified Forensic investigation techniques. Experience with security technologies (e.g., SIEM more »
administer, and maintain Network & Security platforms and any other related software, such as routers, switches, wireless, firewalls, intrusion detection/prevention, network access control, cryptography systems, monitoring, and cloud technologies/applications. Perform diagnostics, appraisal, and analysis on predominantly Cisco based Network & Security technologies, such as, firewalls, VPNs, intrusion detection more »
Essential Advanced knowledge of security technologies including firewalls, anti-malware, IDS/IPS, web filtering, email filtering, SIEM, patch management, MDM, DLP, PKI and cryptography, IAM (Identity and access management) including MFA (multi-factor authentication) Advanced knowledge of ICT infrastructure including; networking and associated protocols, remote access, virtualisation (compute and more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Matchtech
SIEM, firewalls, intrusion detection/prevention systems, antivirus software, authentication systems, and log management. Strong knowledge of security approaches, including risk analysis, attack vectors, cryptography, and cyber security incident response best practices. If the above role sounds like the right step in your career then please get in touch for more »
phases (e.g. Cyber Kill Chain and/or Mitre Attack Framework). * Knowledge of a broad range of security capabilities, technologies and concepts (e.g. cryptography, data security, network security, endpoint security, security penetration testing, identity and access management, vulnerability management etc). Desirable skills/Preferred Qualifications: * Understanding of the more »
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Technical Futures
Software Researcher Remote Working Masters/PhD Mathematics or Computing Strong programming skills - technical skillset to include Compilers/Embedded/Cryptography/Algorithms/Blockchain Financial Security Applications. A Software Researcher with a Masters Degree and/or PhD in Mathematics or Computing and with strong programming skills will … start-up combining high-end security, blockchain and program analysis research. Youll undertake Security Research as part of a team of experts in Compilers, Cryptography, Mathematics and Finance, bringing an appreciation of real-world attacker mentality in order to reduce risk and fortify code. Working Remotely, the Software Researcher can … the following: Masters Degree/PhD in Mathematics, Physics or Computing gained from a top tier University. Project or working knowledge of Embedded, Compilers, Cryptography, Blockchain and/or Algorithms. Proficiency in one or more programming language ( ideally to include C++ and Python). Experience with low level software either more »
management or tooling hugely beneficia (Data Lakes, Snowflake or Databricks). Experience working closely with engineering teams (particularly those working on Machine Learning and Cryptography products). Ability to deliver product presentations, and showcase software whilst leading pre-sales activities. Product experience with privacy-enhancing technologies, data analysis, data management … equipped to leverage our technology. In return, you will have the opportunity to work with world leaders in the fields of data science and cryptography, as well as the chance to contribute to our mission of enabling organizations to collaborate on sensitive data while protecting data privacy, confidentiality, and regulatory more »
Employment Type: Contract
Rate: From £1,100 to £1,300 per day Outside of IR35