with DBA skills in PostgreSQL and MySQL, with expertise in securing, hardening, authentication, authorization, and auditing of databases. Proficiency in understanding authentication, authorization, and cryptography, with familiarity around modern security standards and best practices. Experience with Infrastructure-as-Code using Terraform. Experience deploying and operating infrastructure in at least one More ❯
solution to all your blockchain/cryptocurrency needs. Role Description: Backend pro efficient in Node.js or Golang Blockchain expert (Solidity, Rust) Good knowledge of cryptography Must have solid understanding of hashing and encryption algorithms Efficient knowledge of SNARKs, proofs generation and verification Must be able to perform under pressure and More ❯
compliance efforts, ensuring alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint More ❯
world-leading encryption solutions to secure data and communications for enterprises, governments, defence, and critical national infrastructure (CNI). Powered by advanced symmetric key cryptography, the Arqit SKA-Platform offers scalable dynamic encryption that meets modern industry standards and is resilient to future threats, such as those posed by quantum More ❯
work at a technical level with teams; Identification/design/selection of appropriate security components to provide security enforcing functions (e.g. network, endpoints, cryptography, authentication, authorisation, data inspection etc) for a variety of infrastructures including cloud environments; Legal and regulatory topics that merit consideration when conducting various activities in More ❯
work at a technical level with teams; Identification/design/selection of appropriate security components to provide security enforcing functions (e.g. network, endpoints, cryptography, authentication, authorisation, data inspection etc) for a variety of infrastructures including cloud environments; Legal and regulatory topics that merit consideration when conducting various activities in More ❯
of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services particularly: VPC IAM Security Group Management EBS Outposts Amazon is an equal opportunities More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
leonardo company
detailed FPGA/Firmware requirements and architecture from system requirements. A structured approach to FPGA/firmware design (RTCA DO-254 or similar). Cryptography and anti-tamper techniques. Artificial Intelligence including machine learning and genetic algorithms. Electronics test methods and equipment. Good verbal and written communication skills. Working in More ❯
the leaders in the secure financial transactions space. Qualifications What will make you successful Technical skills & knowledge: Broad knowledge of cyber security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience More ❯
SKILLS AND EXPERIENCE CISSP, CISM, CCSP, CRISC or equivalent experience Good knowledge covering several of the following examples (this list is not exhaustive): AD, Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with More ❯
cybersecurity threats and risks they face. Broad cybersecurity experience with a combination of technology involvement, business knowledge and risk awareness (incl. on topics like cryptography, network design, application security, data protection, identity and access management, cloud security). Ability to analyse complex problems and to deliver insightful, practical and sustainable More ❯
knowledge in Simulation and Modelling using Matlab and SysML/CAMEO. Knowledge of system architecture development. Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities. Strong interpersonal skills with the ability to steer technical interchange discussions. Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯
Science, Cybersecurity, or a related field. 3+ years of experience in security engineering, information security, or a similar role. Strong understanding of security principles, cryptography, and network protocols. Hands-on experience with security tools (e.g., SIEM, IDS/IPS, vulnerability scanners). Familiarity with cloud platforms (e.g., AWS, Azure, GCP More ❯
Science, Cybersecurity, or a related field. 3+ years of experience in security engineering, information security, or a similar role. Strong understanding of security principles, cryptography, and network protocols. Hands-on experience with security tools (e.g., SIEM, IDS/IPS, vulnerability scanners). Familiarity with cloud platforms (e.g., AWS, Azure, GCP More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
CTI Clinical Trial and Consulting Services
Ruby, Python, or C/C++. Linux or OS X environment competence. Experience with version control systems like Git. Desirable Attributes Bioinformatics, coding theory, cryptography, laboratory automation, biosecurity, DNA data storage, molecular computation skills. Experience presenting at scientific meetings. Additional for Research Associates and Senior Research Associates Grant writing experience. More ❯
or similar object oriented language PREFERRED QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ - Experience applying threat modeling or other risk identification techniques or equivalent More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and More ❯
SANS ) Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2) Working knowledge of cryptography including encryption, signing and digital certificates Principles of securing mobile applications and web services Docker or Kubernetes and infrastructure as code Event driven streaming technologies More ❯
and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science More ❯
and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science More ❯
Additional qualities include a passion for security research, participation in security competitions or bug bounty programs, domain expertise in security architecture, communication security, IAM, cryptography, or software security, and a data-driven approach to supporting ideas with evidence. More ❯
of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols. PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services particularly: VPC IAM Security Group Management EBS Outposts Amazon is an equal opportunities More ❯
response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of More ❯
PowerPoint, Excel). Strong stakeholder engagement and communication skills. Desirable: CISSP, CISM, CompTIA Security+, or a recognised Vendor Certification. If you are passionate about cryptography and PKI, and you're ready to take the next step in your career, we would love to hear from you. More ❯