London, England, United Kingdom Hybrid / WFH Options
Chainlink Labs Inc
re a global team of developers, academics, and financial industry experts with deep experience in cryptography, decentralized systems, game theory, and capital markets. Together we’re leveraging cutting-edge computer science research to build an industry-defining platform. We believe in the power of blockchain technologies to create a more economically fair world. Where do I fit? Global expertise … also the Weill Family Foundation and Joan and Sanford I. Weill Professor at the Jacobs Technion-Cornell Institute at Cornell Tech, as well as a faculty member in the Computer Science department at Cornell University. He is a Co-Director of the Initiative for CryptoCurrencies and Contracts (IC3). Previously, he served as the Chief Scientist of RSA. Eric … served on the boards of Alphabet, Apple, Princeton University, Carnegie Mellon University, and the Mayo Clinic. Technical Advisor Farinaz Koushanfar is the Henry Booker scholar professor of Electrical and Computer Engineering at the University of California San Diego, where she is the founding co-director of UCSD MICS (Center for Machine Intelligence, Computing, and Security). Her research More ❯
Job Description Responsible for the planning, design and build of security architectures; oversees the implementation of network and computersecurity and ensures compliance with corporate security policies and procedures. Job Description Responsible for the planning, design and build of security architectures; oversees the implementation of network and computersecurity and ensures compliance with … corporate security policies and procedures. Career Level - IC5 Responsibilities Responsible for expert planning, design and build of security systems, applications, environments and architectures; oversees the implementation of security systems, applications, environments and architectures and ensures compliance with information security standards and corporate security policies and procedures. Evaluates existing and proposed technical architectures for security risk, provides expert technical advice to support the design and development of secure architectures and recommends security controls to mitigate those risks. Evaluations of internal security architecture may include design assessment, risk assessment, and threat modeling. Provides expert technical advice and direction to support the design and development of secure architectures. Maintain expert proficiency in emerging trends More ❯
London, England, United Kingdom Hybrid / WFH Options
Coinbase Global
to bring 1B+ people onchain in the most secure way possible. We want to provide them secure platforms and tools to build and interact with exciting applications. The Protocol Security team ensures the security of all onchain development at Coinbase. We partner closely with product teams to make sure that our users can safely and confidently engage with … the onchain world. What you'll be doing (ie. job duties): Perform threat modeling and security assessments of blockchain products and services. Propose, plan, and execute Red Team operations based on realistic threats. Write detailed reports covering the goals and outcomes of Red Team operations, including significant observations and recommendations. Collaborate with partner teams to improve detection and response … capabilities. Provide expert technical guidance to the team in building new security frameworks and analysis tools. Stay informed on current security trends, advisories, publications, and academic research. What we look for in you (ie. job requirements): Bachelor's or Master's degree in Computer Science, Cyber security, Software Engineering, or a related field. 3+ years of More ❯
are solving challenging problems to make our product more suited to customer needs. About the team As a team we build Ring Doorbell Wired - BASIC QUALIFICATIONS - Bachelors degree in Computer Science, Computer Engineering, Electrical Engineering, related field, or equivalent practical experience. - Proven experience in software and embedded development with C/C++ and familiarity with SoC and embedded … CPU. - Field experience with writing low-level drivers, interrupting service routines, and general troubleshooting/debugging with hardware. PREFERRED QUALIFICATIONS - Master's in Computer Science, Information Security, or related field, or equivalent work experience. - Extensive experience in computer architecture and embedded systems. - Extensive experience in two or more of the following technical categories: - Hardware security (PCB … JTAG, UART, SPI, ROM, microcode, custom ASIC/FPGA). - x86 and/or ARM chipset and firmware security (TPM, UEFI, TrustZone, Secure Boot, JTAG, PCIe). - Security assessment (e.g. penetration testing, incident response, forensics, network traffic analysis). - Performing security reviews and implementing defensive technical security controls. - Virtualization security, side-channel attack vectors, and More ❯
more competitive. Job Description In your role you will work within the team that investigates and analyses high priority cybersecurity incidents with precision. You will respond to and contain security threats effectively, following a robust Cyber Security Incident Response Plan (CIRP). Collaborating with both internal and external stakeholders, you will ensure seamless communication and effective outcomes. You … will document incident responses meticulously and create comprehensive reports. Additionally, you will be responsible for introducing and utilising security automation and scripting to enhance efficiency and security measures. Accountabilities: Monitor security alerts and logs to detect potential security incidents. Conduct initial triage and assessment of incidents to determine severity and impact. Conduct in-depth analysis of … security incidents to determine root cause, scope, and extent of compromise. Analyze malware samples, network traffic, and system logs to identify indicators of compromise (IOCs) and attack patterns. Lead and coordinate incident response efforts, including containment, eradication, and recovery activities. Collaborate with cross-functional teams to mitigate security incidents and minimize business impact. Assist partners in/and More ❯
London, England, United Kingdom Hybrid / WFH Options
Vantage Data Centers
looking for ways to strike the best balance between technology, performance and cost. The Vantage Cybersecurity Department also participates in designing each of our new data center building’s security infrastructure. If you like getting your hands dirty and helping to design, build and maintain Cybersecurity infrastructure in a modern data center, then come work at Vantage. We’re … Position Overview The OT Manager, Cybersecurity, Global at Vantage Data Centers is responsible for developing, managing, and strengthening the organization's cybersecurity posture. This role focuses on coordinating enterprise security programs, ensuring compliance with industry regulations, mitigating risks, and implementing standard processes. The ideal candidate will have a deep understanding of cybersecurity, risk management, and regulatory compliance, with the … ability to collaborate across departments and lead strategic security initiatives. This position requires a proactive approach to identifying and addressing security vulnerabilities while encouraging a culture of security awareness across the organization. The OT (Operational Technology) Manager, Cybersecurity, Global will be part of the leadership team responsible for protecting a rapidly expanding global enterprise. The OT Manager More ❯
Security Engineer, Incident Response, SIRT Job ID: Amazon Support Services Pty Ltd Amazon is looking for a qualified Security Engineer to join our innovative, high energy Security Incident Response Team (SIRT) in Sydney. SIRT Security Engineers respond to security events, conduct analysis of threats and intrusion attempts, and provide security services to safeguard highly … sensitive data. They work hands-on with detection systems and vulnerability analysis tools to respond to potential threats to Amazon systems. Security Engineers are unique individuals prepared to relentlessly resolve security issues by gathering and analyzing event data and conducting root-cause analysis. With your technical expertise, you will be solving security challenges at scale, working to … protect the applications powering the most sophisticated e-commerce platform ever built. We value broad and deep technical knowledge, specifically in the fields of forensics, malware analysis, network security, application security, cryptography, and security intelligence. Key job responsibilities - Responding to security incidents, and coordinating a cohesive response involving multiple teams across Amazon. - Providing security engineering More ❯
current frontier AI systems and considering what measures could and should be used to secure such systems in the future. The Safeguard Analysis Team takes a broad view of security threats and interventions. It's keen to hire researchers with expertise developing and analysing attacks and protections for systems based on large language models, but is also keen to … hire security researchers who have historically worked outside of AI, such as in - non-exhaustively - computersecurity, information security, web technology policy, and hardware security. Diverse perspectives and research interests are welcomed. The Team seeks people with skillsets leaning in the direction of either or both of Research Scientist and Research Engineer, recognising that some technical … seniority and experience. Person Specification You may be a good fit if you have some of the following skills, experience and attitudes: Experience working on machine learning, AI, AI security, computersecurity, information security, or some other security discipline in industry, in academia, or independently. Experience working with a world-class research team comprised of More ❯
About the AI Security Institute The AI Security Institute is the largest team in a government dedicated to understanding AI capabilities and risks in the world. Our mission is to equip governments with an empirical understanding of the safety of advanced AI systems. We conduct research to understand the capabilities and impacts of advanced AI and develop and … test risk mitigations. We focus on risks with security implications, including the potential of AI to assist with the development of chemical and biological weapons, how it can be used to carry out cyber-attacks, enable crimes such as fraud, and the possibility of loss of control. The risks from AI are not sci-fi, they are urgent. By … current frontier AI systems and considering what measures could and should be used to secure such systems in the future. The Safeguard Analysis Team takes a broad view of security threats and interventions. It's keen to hire researchers with expertise developing and analysing attacks and protections for systems based on large language models, but is also keen to More ❯
the robustness of communication technologies to attack. Furthermore, the project will examine the suitability of emerging network management approaches, which aim to minimise operational overheads, to realise important communication security and resilience requirements for new nuclear designs. The outcomes from this project are essential to the success of enabling new operating concepts and fleet management approaches. This project is … Doctoral Training) and sponsored by UKNNL . It is expected that this PhD project will contribute to a new International Atomic Energy Agency (IAEA) project that is investigating the computersecurity of SMRs . For informal enquiries, please contact Professor Paul Smith ( paul.smith@lancaster.ac.uk ) Candidates interested in applying should first send an email expressing interest to saturn@manchester.ac.uk More ❯
Join to apply for the Head of Security Operations role at Votre Sommelier We are seeking a dynamic and experienced Head of Security Operations to lead and mature our security operations function. This pivotal role will be responsible for defining and driving the overall security operations strategy and lifecycle, ensuring the protection of our critical assets … and data. The ideal candidate will possess deep expertise in vulnerability management, threat intelligence, security operations centre (SOC) management, and incident response. This leader will build and mentor high-performing teams, optimise processes, and proactively mitigate security risks in ASOS's evolving environment. Day To Day Responsibilities: Develop and implement a comprehensive security operations strategy aligned with … the company's risk appetite and business objectives. Define and maintain the security operations roadmap, prioritising initiatives and resource allocation. Stay abreast of emerging threats, technologies, and industry best practices, and translate them into actionable strategies. Provide leadership and direction to the leads of the functional areas. Lead the Cyber Defence function that includes Security Operations, IAM, Vulnerability More ❯