system design across large-scale microservice environments. You'll engage directly with senior stakeholders, influence architecture strategy, and design secure solutions across cloud (AWS), database (MongoDB/PostgreSQL), and dataencryption-heavy systems. Mandatory requirements: CISSP certification Active SC Clearance Strong AWS, application, and database security experience Expertise in secure system architecture & communication of technical risk Other requirements More ❯
performance tuning, security and integrations with services, such as AWS Experience with Infrastructure as Code (Terraform, CloudFormation) and automations tools Strong understanding of cloud security best practise, IAM policies, dataencryption and compliance frameworks Proficiency in Python, PowerShell, MS Graph for automation Ability to take lead on major incidents and communicate effectively with senior stakeholders. Desirable Criteria: Snowflake … SnowPro Advanced Certifications Administration Matillion Data Productivity Cloud Foundations Certification AWS Solutions Architect Professional AWS DevOps Engineer Professional AWS Speciality in Advanced Networking or Security Microsoft Certified Azure engineer #J-18808-Ljbffr More ❯
Kingston Upon Thames, Surrey, England, United Kingdom
BOSS Professional Services LTD
hours support on a rota basis. Azure 3rd Line Support Engineer skills required: Infrastructure Management: Cloud and on-premises environments. Azure App Service: Deployment, management, troubleshooting. Azure Blob Storage: Data management, secure access. SQL Database Management: Azure SQL, on-premises SQL. Azure Active Directory (AD): Identity management, hybrid integration. Azure Entra: Identity governance, access policies. Security & Compliance: Identity protection … data encryption. Enterprise Integration: Hybrid cloud and on-prem systems. Desirable As an experienced Azure 3rd Line Support Engineer you will: Be a reliable self-starter who is service driven that enjoys getting the job done. Be a good troubleshooter in a methodical manner and escalate as required. Lead on projects. Have a good understanding of IT security. Likes More ❯
interfaces for desktop environments Implement complex state management to handle POS operations Integrate with hardware devices such as printers and card readers via Electron Ensure secure authentication, authorization, and dataencryption Write and maintain automated tests (unit, integration, end-to-end) Use WebSockets for real-time updates and data sync Support offline-first functionality and robust data … management solutions Exposure to Electron or desktop app development Experience working with REST APIs and WebSocket communications Ability to write reliable automated tests Understanding of secure coding principles and encryption Confident using Git and collaborative development workflows Nice to Have Experience working on POS or retail software systems Knowledge of mobile app development Experience with hardware integration (e.g. thermal More ❯
interfaces for desktop environments Implement complex state management to handle POS operations Integrate with hardware devices such as printers and card readers via Electron Ensure secure authentication, authorization, and dataencryption Write and maintain automated tests (unit, integration, end-to-end) Use WebSockets for real-time updates and data sync Support offline-first functionality and robust data … management solutions Exposure to Electron or desktop app development Experience working with REST APIs and WebSocket communications Ability to write reliable automated tests Understanding of secure coding principles and encryption Confident using Git and collaborative development workflows Nice to Have Experience working on POS or retail software systems Knowledge of mobile app development Experience with hardware integration (e.g. thermal More ❯
London, England, United Kingdom Hybrid / WFH Options
Capgemini
protocols (MQTT, CoAP, HTTP), and cloud integration. • Experience testing hardware, firmware, and IoT device performance. • Verification of communication protocols (Wi-Fi, Zigbee, Bluetooth) and network coverage. • Ensuring secure authentication, dataencryption, and conducting penetration tests. • Security testing, data privacy, and vulnerability assessments. • Data integrity, synchronization, and handling big data in IoT systems. • Knowledge of scripting More ❯
London, England, United Kingdom Hybrid / WFH Options
Allen & Overy LLP
security of the firm’s externally facing AI-powered products. They will establish and maintain a robust security posture, ensuring the confidentiality, integrity, and availability of our AI models, data, and infrastructure, with a specific focus on the unique security challenges presented by Contract Matrix and further inhouse built AI products. You will work closely with legal, compliance, IT … their environment. Define, develop, and maintain security policies, procedures, and standards specific to the firm’s AI products, with a deep understanding of the product's architecture and functionality. Data Security & Privacy Ensure the secure storage, processing, and transmission of any sensitive data stored on the firm’s AI products. Manage the dataencryption and access … responding to queries or requests from external parties or auditors pertaining to AI products. Collaborate with legal teams to assess the impact of the AI product on client confidentiality, data protection, and professional responsibility. AI Risk Assessments and Review Establish repeatable processes for security risk assessments and security assessments for any new AI products or new use cases existing More ❯
IoT protocols (MQTT, CoAP, HTTP), and cloud integration. Testing hardware, firmware, and performance of IoT devices. Verifying communication protocols (Wi-Fi, Zigbee, Bluetooth) and network coverage. Ensuring secure authentication, dataencryption, and penetration testing for IoT devices. Conducting security tests on IoT devices, ensuring data privacy and vulnerability assessments. Verifying data integrity, synchronization, and handling of … big data in IoT systems. Knowledge of writing & automating IoT testing scripts and integrating with CI/CD pipelines (optional). Knowledge of cloud platforms like AWS IoT, Azure IoT for cloud-IoT device integration. Worked in agile teams, understand agile methodologies and proficient in JIRA and defect lifecycle management. Perform manual test execution and API testing for integration More ❯
the globe. The goal is to deliver a seamless, high-quality, and interactive experience for both internal teams and external clients. You'll be working on challenges such as data synchronization , network performance optimization , and video stream security . xSTUDIO is already in daily use by over 7,000 artists, producers, and supervisors across DNEG. Now, we're pushing … or equivalent experience Strong programming skills in modern C/C++ (2011, 2017) A good understanding of networking technologies, protocols and physical network infrastructure Knowledge of network security and dataencryption Ability and enthusiasm for learning new technologies and APIs rapidly Interpersonal: Excellent written, verbal, and graphical communication Experience drafting, reviewing and maintaining technical documentation Working experience in More ❯
London, England, United Kingdom Hybrid / WFH Options
Thrive Learning Limited
protections). Nice-to-haves • Experience with SOC2/ISO27001, Vanta, or security questionnaires for enterprise customers. • Familiarity with identity & access management (SSO, SCIM, RBAC), secure frontend patterns, and dataencryption at rest/in transit. • Incident response experience or interest in setting up robust response playbooks. • Experience working in SaaS or L&D platforms, or building security More ❯
London, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
or redeployment of IT assets. Support asset lifecycle management, including maintenance and compliance with device policies and regulations. Promote and implement best practices for device security, ensuring endpoint protection, dataencryption, and policy compliance. Identify trends and recurring issues in incidents and service requests to inform problem management processes and propose permanent solutions. Maintain accurate records of IT More ❯
London, England, United Kingdom Hybrid / WFH Options
Attio
and improve our backend infrastructure. We are particularly interested in hearing from: Engineers who have designed secure backend systems including common design criteria for systems such as authentication or dataencryption Excellent knowledge of modern cloud architectures including proprietary technologies offered by AWS and/or GCP Whose team will you join? You will join one of our More ❯
London, England, United Kingdom Hybrid / WFH Options
RSSB
or redeployment of IT assets. Support asset lifecycle management, including maintenance and compliance with device policies and regulations. Promote and implement best practices for device security, ensuring endpoint protection, dataencryption, and policy compliance. Identify trends and recurring issues in incidents and service requests to inform problem management processes and propose permanent solutions. Maintain accurate records of IT More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Oho Group Ltd
Fi, and CAN. Experience with real-time operating systems (RTOS) such as FreeRTOS, ThreadX, or others for firmware development. Knowledge of IoT technologies, including secure communication protocols, cryptography, and data encryption. Hands-on experience with board bring-up (BSP) and low-level driver development. Strong understanding of electronics, including the ability to read schematics and use test equipment like More ❯
Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Oho Group Ltd
Fi, and CAN. Experience with real-time operating systems (RTOS) such as FreeRTOS, ThreadX, or others for firmware development. Knowledge of IoT technologies, including secure communication protocols, cryptography, and data encryption. Hands-on experience with board bring-up (BSP) and low-level driver development. Strong understanding of electronics, including the ability to read schematics and use test equipment like More ❯
Fi, and CAN. Experience with real-time operating systems (RTOS) such as FreeRTOS, ThreadX, or others for firmware development. Knowledge of IoT technologies, including secure communication protocols, cryptography, and data encryption. Hands-on experience with board bring-up (BSP) and low-level driver development. Strong understanding of electronics, including the ability to read schematics and use test equipment like More ❯
Data Security Operations Engineer - DataEncryption Location: London/Hong Kong/Beijing Responsibilities and Goals: Lead the design of cross-border privacy protection solutions and cross-national dataencryption solutions for API data flow, supporting national encryption algorithms like SM4/AES and international algorithms. Build an international dynamic data desensitization … rules library, adapting to multilingual sensitive data identification and desensitization. Responsible for the implementation of data protection technologies such as dataencryption, TEE, de-identification, and desensitization in international business scenarios. Requirements: Bachelor's degree in Computer Science, Information Security, or related fields, with good English reading and communication skills. Product-oriented mindset, with at least … years of experience in building internet security products. Experience in driving large-scale projects and transformations, with successful cases in dataencryption, desensitization, and other data protection directions. At least one successful cross-system full-link data fortification implementation experience. Familiarity with at least one language, such as Java, Go, or Python, and knowledge of Hadoop More ❯
Data Security Operations Engineer - DataEncryption Location: London/Hong Kong/Beijing Responsibilities and Goals: Lead the design of cross-border privacy protection solutions and cross-national dataencryption solutions for API data flow, supporting national encryption algorithms like SM4/AES and international algorithms. Build an international dynamic data desensitization … rules library, adapting to multilingual sensitive data identification and desensitization. Responsible for the implementation of data protection technologies such as dataencryption, TEE, de-identification, and desensitization in international business scenarios. Requirements: Bachelor's degree in Computer Science, Information Security, or related fields, with good English reading and communication skills. Product-oriented mindset, with at least … years of experience in building internet security products. Experience in driving large-scale projects and transformations, with successful cases in dataencryption, desensitization, and other data protection directions. At least one successful cross-system full-link data fortification implementation experience. Familiarity with at least one language, such as Java, Go, or Python, and knowledge of Hadoop More ❯
the IT Security Manager to investigate security breaches and other cyber security incidents. Install effective security measures and operate software to protect systems and information infrastructure, including firewalls and data encryptions. Key Accountabilities: Effectively monitor the companies estate computer networks for security issues. Ability to learn and apply new security concepts. Investigate security breaches and other cyber security incidents … resolving them efficiently. Install security measures and operate software to protect systems and information infrastructure, including firewalls and dataencryption programs. Clearly document security breaches and assess the damage they cause, whilst also making well-considered recommendations to avoid similar security breaches. Collaborate well with the IT Security Manager to perform tests and uncover network vulnerabilities. Assist with More ❯
baselines for software development, deployment and release. Review development processes for security functionality and consistency and develop Security playbooks. Design and implement libraries and tooling for security sensitive operations (dataencryption, authentication, access, logging, input validation, etc.) Support Engineering teams with implementing security fixes, and develop strategies to proactively secure their code. WHAT YOU WILL NEED: Extensive knowledge More ❯
software development, deployment, and release. Conduct security reviews of development processes and documentation, ensuring consistency with security standards. Design and implement security libraries and tooling for critical operations (e.g., dataencryption, authentication, logging, access control, and input validation). Assist Engineering teams in implementing security fixes and develop proactive strategies to mitigate vulnerabilities in their code. WHAT YOU More ❯
knowledge of HTTP, RESTful APIs, and mobile app integration. Deep understanding of mobile UX and Apple & Google's Human Interface Guidelines. Knowledge of mobile app security best practices, including dataencryption, secure storage, and authentication/authorization. Deep understanding of integrating Flutter apps with platform-specific features (e.g., push notifications, in-app purchases, camera access) and native code. More ❯