.Net, C++ or similar object oriented language experience. - Extensive experience and expertise in any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience. - Experience using Large Language Models (LLM) in security engineering. PREFERRED QUALIFICATIONS - Master's or PhD in cyber security or artificial intelligence. - Strong interest in More ❯
business benefits and learn from the leaders in the secure financial transactions space. Qualifications What will make you successful Technical skills & knowledge: Broad knowledge of cyber security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience in regulatory reporting. More ❯
candidate will have a good mix of deep technical knowledge and a demonstrated background in information security. We value broad and deep technical knowledge, specifically in the fields of cryptography, network security, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. Key Responsibilities Confidently and intelligently respond to security incidents, and proactively consider how to prevent … our organization. Ability to communicate effectively at multiple levels of sensitivity, and multiple audiences. Recognize, adopt and instill the best practices in security engineering fields throughout the organization: development, cryptography, network security, security operations, incident response, security intelligence. Provide subject matter expertise on architecture, authentication and system security. Fulfill regular on-call responsibilities. BASIC QUALIFICATIONS Bachelor's degree in computer … division level or equivalent PREFERRED QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Experience in cyber security incident response within corporate and cloud environments. Amazon is an equal opportunities More ❯
such as HTTP, DNS and TCP/IP PREFERRED QUALIFICATIONS - 3+ years of any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience - 3+ years of programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language experience - Experience with AWS products and services More ❯
with security responsibilities). Familiarity with cloud/virtualization technologies (AWS, GCP and K8s) and automation (ansible, puppet, terraform etc.) Understanding of fundamental security concepts and terminologies (CIA, basic cryptography knowledge etc.) Advanced scripting skills in Python, Bash, PowerShell etc. Advanced Network knowledge, including Firewall management. Familiarity with SIEM tools (Splunk, Elastic Stack etc.) Good knowledge of identified operating system More ❯
be conducting security monitoring and response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of the domains mentioned above, but More ❯
deliver complex projects. - Experience in reviewing complex systems design/code for security best practices and compliance with industry standards. - Strong creative problem-solving abilities. - Knowledge and experience with cryptography and computer security. - Distributed systems experience. - Knowledge of Linux systems and operating system internals. - Experience with large scale systems. Amazon is an equal opportunities employer. We believe passionately that employing More ❯
Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface Management. Cloud Security & Risk applied to all service and More ❯
Hands-on experience with vulnerability tools, threat modelling, and compliance (GDPR, HIPAA, PCI) Strong communication and stakeholder engagement skills Technical knowledge across .NET, Java, scripting (Python, PowerShell), APIs, and cryptography Nice to have: Certifications (CISSP, CEH, CCSP), experience with SIEM/SOAR tools, business analysis, and working with agile delivery teams. More ❯
Hands-on experience with vulnerability tools, threat modelling, and compliance (GDPR, HIPAA, PCI) Strong communication and stakeholder engagement skills Technical knowledge across .NET, Java, scripting (Python, PowerShell), APIs, and cryptography Nice to have: Certifications (CISSP, CEH, CCSP), experience with SIEM/SOAR tools, business analysis, and working with agile delivery teams. More ❯
Hands-on experience with vulnerability tools, threat modelling, and compliance (GDPR, HIPAA, PCI) Strong communication and stakeholder engagement skills Technical knowledge across .NET, Java, scripting (Python, PowerShell), APIs, and cryptography Nice to have: Certifications (CISSP, CEH, CCSP), experience with SIEM/SOAR tools, business analysis, and working with agile delivery teams. More ❯
London, England, United Kingdom Hybrid / WFH Options
Mason Alexander
DevOps, cloud platforms (AWS/Azure), and scripting (.NET, Java, Python). Ideally, .NET Relevant certifications (CISSP, CCSP, CEH, etc.). Excellent stakeholder management and communication skills. Knowledge of cryptography when it comes to applications would be important to have. For more information, please contact Ian Donnelly on i.donnelly@masonalexander.ie or appy below More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cyber Talent Limited
Experience in software development, preferably in Java and Python desirable . In depth experience with key ceremonies Experience in system development lifecycle and system integration is desirable. Proficiency in cryptography programming, nShield HSM (Hardware Security Module) Proficient in application development and databases. Desirable background/skills:- Degree holder in Computer Science, Computer Engineering, or related disciplines is desirable. If you More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The MDU
Security Team led initiatives. Provide subject matter expertise in all areas of Cyber Security, including but not limited to: o Security Architecture o Application Security o Cloud Security o Cryptography Provide security engineering support to wider teams ensuring controls and assurance are delivered as part of projects and initiatives. Work with suppliers and vendors to coordinate contract security engineers, ensuring More ❯
a focus on adversarial tactics and threat intelligence. Understanding of OT and IT assets, technologies, and security best practices within the current threat landscape. Deep knowledge of network protocols, cryptography, vulnerabilities, and attack vectors used by sophisticated threat actors. Proficiency with a range of penetration testing tools and methodologies, especially those related to threat analysis. Experience in planning and executing More ❯
At Protegrity, we lead innovation by using AI and quantum-resistant cryptography to transform data protection across cloud-native, hybrid, on-premises, and open source environments. We leverage advanced cryptographic methods such as tokenization, format-preserving encryption, and quantum-resilient techniques to protect sensitive data. As a global leader in data security, our mission is to ensure that data isn More ❯
Go, Swift, Java, .Net, C++ or similar object oriented language PREFERRED QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ - Experience applying threat modeling or other risk identification techniques or equivalent Amazon is an equal opportunities More ❯
ABOUT TEMENOS Temenos powers a world of banking thatcreates opportunities for billions of people and businesses everywhere. We havebeen doing this for over 30 years through the pioneering spirit of our Temenosianswho are passionate about making banking better, together. We More ❯
EC1V, Bunhill, Greater London, United Kingdom Hybrid / WFH Options
Technical Futures Ltd
a world-class team securing some of the most advanced blockchain protocols? This is a unique opportunity to work with a pioneering start-up at the intersection of blockchain, cryptography, and advanced software security. About the Role We’re seeking a Web3/Smart Contracts Auditor or Security Software Engineer—ideally with a PhD in Mathematics, Computer Science, or Cryptography … other blockchain systems. Exploring emerging technologies, particularly zero-knowledge proofs. Continuing to grow through personal development and collaborative research opportunities. What We’re Looking For: A relevant PhD (Mathematics, Cryptography, or Computer Science). Proven experience in Web3/Smart Contract Auditing. Programming expertise in Go, Rust, Solidity, and/or C/C++. Strong understanding of code security and More ❯
Public Key Infrastructure (PKI) solutions. Manage Hardware Security Modules (HSMs), ensuring secure cryptographic key management. Oversee the migration of legacy PKI to a modern replacement solution. Implement Public-Key Cryptography Standards (PKCS), chains of trust, and Certificate Signing Requests (CSRs). Collaborate with cybersecurity teams to integrate PKI into broader security architecture. Provide hands-on expertise with HSMs, ensuring compliance More ❯
Public Key Infrastructure (PKI) solutions. Manage Hardware Security Modules (HSMs), ensuring secure cryptographic key management. Oversee the migration of legacy PKI to a modern replacement solution. Implement Public-Key Cryptography Standards (PKCS#11), chains of trust, and Certificate Signing Requests (CSRs). Collaborate with cybersecurity teams to integrate PKI into broader security architecture. Provide hands-on expertise with HSMs, ensuring compliance More ❯
similar object oriented language PREFERRED QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing a diverse workforce is central More ❯
Generative AI Enthusiasm : Passion for innovation, particularly in applying Generative AI technologies to enhance business solutions. Programming Languages: Proficiency in Java 17 and above, including concurrency and functional patterns. Cryptography, Spring Framework, Containerization, Cloud Services, and Database Management. Microservice Architecture, Messaging Systems, Generative AI, SSDLC, CI/CD, Version Control, and Code Quality. Visa is an EEO Employer. Qualified applicants More ❯
validator infrastructure and tooling for one of the world's top proprietary trading firms. Working with software that is bleeding-edge and doing interesting things (consensus algorithms, distributed systems, cryptography) which often presents challenging technical problems. Take responsibility for a wide range of on-chain infrastructure, including validators, light clients, and RPC nodes. Improve monitoring and alerting systems for crypto More ❯
to deployment. You'll help integrate automated security tooling and checks into our CI/CD pipelines, facilitate threat modelling sessions, and review security-sensitive design decisions around authentication, cryptography, and logging. You'll also ensure that tools such as SAST, DAST, and SCA are effective and efficient, and that testing programmes - including pen testing, vulnerability scanning, and bug bounty More ❯