protocol breaks, release control; Infrastructure/network service management monitoring tools, such as Splunk/CheckMK; Windows server OS builds, security hardening and patching & virtualisation; Communication Security, PKI and Cryptography including NCSC approved devices; 4G/5G/6G mobile technologies. Desirable skills and experience: In order to deliver this service, it is desirable that individuals have experience of- Design More ❯
protocol breaks, release control; Infrastructure/network service management monitoring tools, such as Splunk/CheckMK; Windows server OS builds, security hardening and patching & virtualisation; Communication Security, PKI and Cryptography including NCSC approved devices; 4G/5G/6G mobile technologies. Desirable skills and experience: In order to deliver this service, it is desirable that individuals have experience of- Design More ❯
protocol breaks, release control; Infrastructure/network service management monitoring tools, such as Splunk/CheckMK; Windows server OS builds, security hardening and patching & virtualisation; Communication Security, PKI and Cryptography including NCSC approved devices; 4G/5G/6G mobile technologies. Desirable skills and experience: In order to deliver this service, it is desirable that individuals have experience of- Design More ❯
rollback protection, anti-cloning). Prior work with TPMs, Secure Elements, or other hardware security modules. Contributions to security standards or academic research in system security, firmware security, embedded cryptography, side channel attacks. In Return: Arm is committed to global talent acquisition, offering an attractive relocation package. With offices worldwide, Arm is a diverse organization of dedicated, creative, and hardworking More ❯
qualifications and memberships (e.g. CISSP, etc.) are desirable, but not essential or demonstrable equivalent experience. Knowledge- Information Security broadly, knowledge of Access Control security, transportation security, secure architecture principles, cryptography and operational controls (such as back-ups, resilient design, anti-virus) are essential * Knowledge of Threat modelling, control frameworks and Risk assessment techniques (such as ISO2700x, COBIT, COSO, ITIL and More ❯
the-box solutions. Exhibit a hands-on approach to prototyping, and brainstorming business ideas and technical architectures to deliver them. Stay on top of the latest relevant (EVM ecosystem, Cryptography, ML Models) research and competitive efforts to identify synergistic ideas and approaches for Venture Studio projects. Keep an oversight over MSL core engineering services and projects for synergistic and project More ❯
Set yourself apart: Monitoring, incident response and playbook development Detection creation within SIEM tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability to understand client-specific challenges and tailor solutions accordingly Commitment to staying abreast of More ❯
and collaboration skills, and even greater resilience A curious, passionate, and growth-oriented mindset Deep experience as a hands-on software engineer creating well-crafted, maintainable code Experience with cryptography preferred Mobile-first background (ideally former mobile developer) What We Offer Office First: Collaboration is easier and more effective in person, which is why we have offices in Geneva, Zurich More ❯
experience would also be advantageous (complementary to large-scale/high-complexity experience). The ability to dive deep into specific problems, around automation, security and general operational excellence. Cryptography, cross-domain and deep security experience are all desired but not essential. Amazon is an equal opportunities employer. We believe passionately that employing a diverse workforce is central to our More ❯
and ECH), involves close collaboration with the IETF, and pushes the boundaries of what's possible in networking and security. You don't need to be an HTTP or cryptography expert to join - we're looking for excellent engineers who love tough problems, want to learn deeply, and are excited to contribute to one of the most technically demanding areas More ❯
Senior Test Specialist Basingstoke £50k plus 10% DV bonus I am looking for a Senior Test Specialist for a client of mine who are a leading IT Systems Integrator operating within the UK defence sector, this si a fantastic opportunity More ❯
design, and development C# MS SQL WinForms, WCF, WF, XML, ODBC, ADO.NET Entity Framework, Multi-threading, Multi-tier architecture Source Safe, Team Foundation Server MS Windows UML Knowledge of Cryptography Attributes of the Successful Candidate: Confident communicator at all levels Excellent analytical skills Calm under pressure Ability to prioritize tasks Work precisely Flexible Applicants are encouraged to apply promptly to More ❯
build and use the internet. With strong backing from top investors and 2 years of runway, this 5-person team is tackling interoperability, privacy, and decentralisation using zero-knowledge cryptography and local-first architecture. As a Software Engineer, you will: Initially build in TypeScript but have the opportunity to shape the stack with tools like Rust Ship early products and More ❯
build and use the internet. With strong backing from top investors and 2 years of runway, this 5-person team is tackling interoperability, privacy, and decentralisation using zero-knowledge cryptography and local-first architecture. As a Software Engineer, you will: Initially build in TypeScript but have the opportunity to shape the stack with tools like Rust Ship early products and More ❯
requirements for the development of communication systems and equipment. Demonstrable ability in verification and testing of communication systems. Experience with secure communication systems with knowledge of aspects such as cryptography, key exchange and physical layer protection. Good understanding of requirements for various space mission types in LEO, GEO and MEO environments and how different standards apply to each. Familiarity with More ❯
providers in contributing to national resilience; how Vodafone supports Europe's vision for technological sovereignty; public/private partnership opportunities in response to emerging technologies (e.g., AI, post-quantum cryptography) and hybrid threats. You will report to the Head of Government Security & Regulation within the Vodafone Group Corporate Security team and work closely with the public affairs team and wider More ❯
whether in production or on testnets. 2+ years of experience working with go-ethereum project or fork of it. Alternatively, any other blockchain client. Good understanding of blockchain related cryptography (public key, BLS signatures, MACs, etc). Autonomy & ability to design complex systems. Passion for growing others. BONUS: 2+ years of experience working with Go. BONUS: Experience working with low More ❯
and data-driven decision-making are essential aspects of this role. Current Projects: Developing innovative productivity tools that seamlessly integrate with our privacy-centric ecosystem. Advancing the frontiers of cryptography to ensure user data remains secure even in the face of emerging technologies such as quantum proof encryption. Expanding Proton's reach into the B2B segment, bringing privacy and security More ❯
Marketing Lead Web3/Encryption Category: Infrastructure/Web3/DeFi/Cryptography Location: Remote Salary: $150k$180k + equity A leading web3 infrastructure startup, backed by top-tier investors and partners, is building the future of encrypted blockchain applications. Theyre on a mission to make onchain encryption accessible, programmable, and as widespread as HTTPS is on the internet today. More ❯
Oxford, England, United Kingdom Hybrid / WFH Options
enable Technology
Well-versed in photonic device integration with laser diodes, splitters, amplifiers. R&D driven, comfortable working in a fast-paced startup environment. Any awareness of quantum computing, photonics or cryptography would be useful. What will my day-to-day look like? This position is involved from PoC design to product.You would bridge photonics & electronics, supporting the design & development of optoelectronic More ❯