solution to all your blockchain/cryptocurrency needs. Role Description: Backend pro efficient in Node.js or Golang Blockchain expert (Solidity, Rust) Good knowledge of cryptography Must have solid understanding of hashing and encryption algorithms Efficient knowledge of SNARKs, proofs generation and verification Must be able to perform under pressure and More ❯
TCP/IP, DNS, ICMP, routing) Network Security Controls (Firewalls, packet capture, TLS inspection, IDS/IPS) Common Application Protocols (SSH, RDP, SMB, etc.) Cryptography/PKI MFA Solutions (e.g., Okta, Vasco) Desired: One or more of the following: Prior experience in information security or systems administration/engineering Discipline More ❯
TCP/IP, DNS, ICMP, routing) Network Security Controls (Firewalls, packet capture, TLS inspection, IDS/IPS) Common Application Protocols (SSH, RDP, SMB, etc.) Cryptography/PKI MFA Solutions (e.g., Okta, Vasco) Desired: One or more of the following: Prior experience in information security or systems administration/engineering Discipline More ❯
world-leading encryption solutions to secure data and communications for enterprises, governments, defence, and critical national infrastructure (CNI). Powered by advanced symmetric key cryptography, the Arqit SKA-Platform offers scalable dynamic encryption that meets modern industry standards and is resilient to future threats, such as those posed by quantum More ❯
of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services particularly: VPC IAM Security Group Management EBS Outposts Amazon is an equal opportunities More ❯
the leaders in the secure financial transactions space. Qualifications What will make you successful Technical skills & knowledge: Broad knowledge of cyber security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience More ❯
cybersecurity threats and risks they face. Broad cybersecurity experience with a combination of technology involvement, business knowledge and risk awareness (incl. on topics like cryptography, network design, application security, data protection, identity and access management, cloud security). Ability to analyse complex problems and to deliver insightful, practical and sustainable More ❯
IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise More ❯
IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise More ❯
IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise More ❯
london (city of london), south east england, united kingdom
Natwest
IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise More ❯
Science, Cybersecurity, or a related field. 3+ years of experience in security engineering, information security, or a similar role. Strong understanding of security principles, cryptography, and network protocols. Hands-on experience with security tools (e.g., SIEM, IDS/IPS, vulnerability scanners). Familiarity with cloud platforms (e.g., AWS, Azure, GCP More ❯
Science, Cybersecurity, or a related field. 3+ years of experience in security engineering, information security, or a similar role. Strong understanding of security principles, cryptography, and network protocols. Hands-on experience with security tools (e.g., SIEM, IDS/IPS, vulnerability scanners). Familiarity with cloud platforms (e.g., AWS, Azure, GCP More ❯
or similar object oriented language PREFERRED QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ - Experience applying threat modeling or other risk identification techniques or equivalent More ❯
Additional qualities include a passion for security research, participation in security competitions or bug bounty programs, domain expertise in security architecture, communication security, IAM, cryptography, or software security, and a data-driven approach to supporting ideas with evidence. More ❯
of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols. PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services particularly: VPC IAM Security Group Management EBS Outposts Amazon is an equal opportunities More ❯
response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of More ❯
response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of More ❯
QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
delivering quantum-safe encryption to secure data and communications for enterprises, governments, and critical national infrastructure (CNI). Powered by its advanced symmetric key cryptography, the Arqit SKA-Platform offers scalable encryption that is resilient to quantum threats. The platform allows devices to seamlessly generate and share secure encryption keys More ❯
QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
QUALIFICATIONS - Experience with AWS products and services - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
QUALIFICATIONS - Experience with AWS products and services - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
SANS ) Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2) Working knowledge of cryptography including encryption, signing and digital certificates Principles of securing mobile applications and web services Docker or Kubernetes and infrastructure as code Event driven streaming technologies More ❯