the globe. The goal is to deliver a seamless, high-quality, and interactive experience for both internal teams and external clients. You'll be working on challenges such as data synchronization , network performance optimization , and video stream security . xSTUDIO is already in daily use by over 7,000 artists, producers, and supervisors across DNEG. Now, we're pushing … or equivalent experience Strong programming skills in modern C/C++ (2011, 2017) A good understanding of networking technologies, protocols and physical network infrastructure Knowledge of network security and dataencryption Ability and enthusiasm for learning new technologies and APIs rapidly Interpersonal: Excellent written, verbal, and graphical communication Experience drafting, reviewing and maintaining technical documentation Working experience in More ❯
City of London, London, United Kingdom Hybrid / WFH Options
RSSB
or redeployment of IT assets. Support asset lifecycle management, including maintenance and compliance with device policies and regulations. Promote and implement best practices for device security, ensuring endpoint protection, dataencryption, and policy compliance. Identify trends and recurring issues in incidents and service requests to inform problem management processes and propose permanent solutions. Maintain accurate records of IT More ❯
or redeployment of IT assets. Support asset lifecycle management, including maintenance and compliance with device policies and regulations. Promote and implement best practices for device security, ensuring endpoint protection, dataencryption, and policy compliance. Identify trends and recurring issues in incidents and service requests to inform problem management processes and propose permanent solutions. Maintain accurate records of IT More ❯
London, England, United Kingdom Hybrid / WFH Options
Attio
and improve our backend infrastructure. We are particularly interested in hearing from: Engineers who have designed secure backend systems including common design criteria for systems such as authentication or dataencryption Excellent knowledge of modern cloud architectures including proprietary technologies offered by AWS and/or GCP Whose team will you join? You will join one of our More ❯
London, England, United Kingdom Hybrid / WFH Options
RSSB
or redeployment of IT assets. Support asset lifecycle management, including maintenance and compliance with device policies and regulations. Promote and implement best practices for device security, ensuring endpoint protection, dataencryption, and policy compliance. Identify trends and recurring issues in incidents and service requests to inform problem management processes and propose permanent solutions. Maintain accurate records of IT More ❯
Fi, and CAN. Experience with real-time operating systems (RTOS) such as FreeRTOS, ThreadX, or others for firmware development. Knowledge of IoT technologies, including secure communication protocols, cryptography, and data encryption. Hands-on experience with board bring-up (BSP) and low-level driver development. Strong understanding of electronics, including the ability to read schematics and use test equipment like More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Oho Group Ltd
Fi, and CAN. Experience with real-time operating systems (RTOS) such as FreeRTOS, ThreadX, or others for firmware development. Knowledge of IoT technologies, including secure communication protocols, cryptography, and data encryption. Hands-on experience with board bring-up (BSP) and low-level driver development. Strong understanding of electronics, including the ability to read schematics and use test equipment like More ❯
Data Security Operations Engineer - DataEncryption Location: London/Hong Kong/Beijing Responsibilities and Goals: Lead the design of cross-border privacy protection solutions and cross-national dataencryption solutions for API data flow, supporting national encryption algorithms like SM4/AES and international algorithms. Build an international dynamic data desensitization … rules library, adapting to multilingual sensitive data identification and desensitization. Responsible for the implementation of data protection technologies such as dataencryption, TEE, de-identification, and desensitization in international business scenarios. Requirements: Bachelor's degree in Computer Science, Information Security, or related fields, with good English reading and communication skills. Product-oriented mindset, with at least … years of experience in building internet security products. Experience in driving large-scale projects and transformations, with successful cases in dataencryption, desensitization, and other data protection directions. At least one successful cross-system full-link data fortification implementation experience. Familiarity with at least one language, such as Java, Go, or Python, and knowledge of Hadoop More ❯
Data Security Operations Engineer - DataEncryption Location: London/Hong Kong/Beijing Responsibilities and Goals: Lead the design of cross-border privacy protection solutions and cross-national dataencryption solutions for API data flow, supporting national encryption algorithms like SM4/AES and international algorithms. Build an international dynamic data desensitization … rules library, adapting to multilingual sensitive data identification and desensitization. Responsible for the implementation of data protection technologies such as dataencryption, TEE, de-identification, and desensitization in international business scenarios. Requirements: Bachelor's degree in Computer Science, Information Security, or related fields, with good English reading and communication skills. Product-oriented mindset, with at least … years of experience in building internet security products. Experience in driving large-scale projects and transformations, with successful cases in dataencryption, desensitization, and other data protection directions. At least one successful cross-system full-link data fortification implementation experience. Familiarity with at least one language, such as Java, Go, or Python, and knowledge of Hadoop More ❯
Main Purpose: This role as Backup and Storage Engineer is responsible for designing, implementing and maintaining the backup and storage infrastructure for Trafigura. This role ensures that companies data is always stored securely, efficiently, and is backed up properly to prevent data loss and ensure business continuity. The Backup and Storage Engineer will work closely with Engineering and … Operations teams to create scalable, cost-effective, and reliable data storage solutions that align with business needs and regulatory requirements. Knowledge Skills and Abilities, Key Responsibilities: Design and architect scalable, secure, and highly available storage solutions (on-premises, cloud, or hybrid). Develop and implement data backup and disaster recovery strategies, ensuring minimal downtime and data loss. … Optimize storage performance, capacity planning, and cost management across the organization’s infrastructure. Oversee the integration of backup solutions with other enterprise systems and applications. Ensure compliance with data retention policies, regulatory requirements, and security standards. Monitor storage and backup systems for performance, availability, and health, implementing necessary improvements or troubleshooting issues. Evaluate and recommend new storage technologies, backup More ❯
the IT Security Manager to investigate security breaches and other cyber security incidents. Install effective security measures and operate software to protect systems and information infrastructure, including firewalls and data encryptions. Key Accountabilities: Effectively monitor the companies estate computer networks for security issues. Ability to learn and apply new security concepts. Investigate security breaches and other cyber security incidents … resolving them efficiently. Install security measures and operate software to protect systems and information infrastructure, including firewalls and dataencryption programs. Clearly document security breaches and assess the damage they cause, whilst also making well-considered recommendations to avoid similar security breaches. Collaborate well with the IT Security Manager to perform tests and uncover network vulnerabilities. Assist with More ❯
third-party supplier locations where Amazon product is stored, tested, serviced and disposed. Security management system audits are carried out according to Amazon's internal standards, encompassing cybersecurity protocols, data protection measures, and physical security controls. This position will monitor compliance with contractual requirements, assess the effectiveness of implementation, and provide general support to the site security personnel at … vendor service providers. The role involves auditing digital security measures, including network security, access controls, and dataencryption practices. Additionally, the auditor will evaluate physical security measures such as perimeter security, access control systems, surveillance equipment, and emergency response procedures. They will assess the integration of physical and digital security systems to ensure a robust, comprehensive security posture. … job responsibilities Security Auditing & Compliance: • Execute comprehensive security audits according to Amazon's standards, encompassing both physical and cyber security controls • Perform Supply Chain Security audits with focus on data protection, access controls, and secure handling of intellectual property • Prepare audit documentation, including pre-audit questionnaires, security checklists, and audit plans Operational Security: • Conduct remote/on-site audits More ❯
baselines for software development, deployment and release. Review development processes for security functionality and consistency and develop Security playbooks. Design and implement libraries and tooling for security sensitive operations (dataencryption, authentication, access, logging, input validation, etc.) Support Engineering teams with implementing security fixes, and develop strategies to proactively secure their code. WHAT YOU WILL NEED: Extensive knowledge More ❯
software development, deployment, and release. Conduct security reviews of development processes and documentation, ensuring consistency with security standards. Design and implement security libraries and tooling for critical operations (e.g., dataencryption, authentication, logging, access control, and input validation). Assist Engineering teams in implementing security fixes and develop proactive strategies to mitigate vulnerabilities in their code. WHAT YOU More ❯