access management, and secrets management technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied cryptography and cryptographic protocols, such as E2E protection, authenticated encryption, mTLS, Key Exchange/Agreement, Key Derivation, Key Wrapping and Remote Key Attestation. Experience in identifying More ❯
access management, and secrets management technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied cryptography and cryptographic protocols, such as E2E protection, authenticated encryption, mTLS, Key Exchange/Agreement, Key Derivation, Key Wrapping and Remote Key Attestation. Experience in identifying More ❯
compliance efforts, ensuring alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint More ❯
TCP/IP, DNS, ICMP, routing) Network Security Controls (Firewalls, packet capture, TLS inspection, IDS/IPS) Common Application Protocols (SSH, RDP, SMB, etc.) Cryptography/PKI MFA Solutions (e.g., Okta, Vasco) Desired: One or more of the following: Prior experience in information security or systems administration/engineering Discipline More ❯
TCP/IP, DNS, ICMP, routing) Network Security Controls (Firewalls, packet capture, TLS inspection, IDS/IPS) Common Application Protocols (SSH, RDP, SMB, etc.) Cryptography/PKI MFA Solutions (e.g., Okta, Vasco) Desired: One or more of the following: Prior experience in information security or systems administration/engineering Discipline More ❯
world-leading encryption solutions to secure data and communications for enterprises, governments, defence, and critical national infrastructure (CNI). Powered by advanced symmetric key cryptography, the Arqit SKA-Platform offers scalable dynamic encryption that meets modern industry standards and is resilient to future threats, such as those posed by quantum More ❯
with DBA skills in PostgreSQL and MySQL, with expertise in securing, hardening, authentication, authorization, and auditing of databases. Proficiency in understanding authentication, authorization, and cryptography, with familiarity around modern security standards and best practices. Experience with Infrastructure-as-Code using Terraform. Experience deploying and operating infrastructure in at least one More ❯
SKILLS AND EXPERIENCE CISSP, CISM, CCSP, CRISC or equivalent experience Good knowledge covering several of the following examples (this list is not exhaustive): AD, Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with More ❯
cybersecurity threats and risks they face. Broad cybersecurity experience with a combination of technology involvement, business knowledge and risk awareness (incl. on topics like cryptography, network design, application security, data protection, identity and access management, cloud security). Ability to analyse complex problems and to deliver insightful, practical and sustainable More ❯
solution to all your blockchain/cryptocurrency needs. Role Description: Backend pro efficient in Node.js or Golang Blockchain expert (Solidity, Rust) Good knowledge of cryptography Must have solid understanding of hashing and encryption algorithms Efficient knowledge of SNARKs, proofs generation and verification Must be able to perform under pressure and More ❯
IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise More ❯
IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise More ❯
IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise More ❯
IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise More ❯
IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise More ❯
london (city of london), south east england, united kingdom
Natwest
IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privileged access management, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise More ❯
Competencies You should be capable of defining architectures independently or collaboratively, proficient in Infrastructure Security Design and Information Systems Security, familiar with Risk Analysis, Cryptography, IAM, cloud technologies, and able to monitor risk and compliance. Strong communication skills with customers and technical teams are essential. Nice to Have Domain knowledge More ❯
Technology is seeking a Network Software Engineer with expertise in software development to play a crucial role in leading the development and implementation of cryptology network solutions for our company's products. You will provide technical guidance and ensure the successful delivery of high-quality software solutions. Key Responsibilities: Design More ❯
of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services particularly: VPC IAM Security Group Management EBS Outposts Amazon is an equal opportunities More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
leonardo company
detailed FPGA/Firmware requirements and architecture from system requirements. A structured approach to FPGA/firmware design (RTCA DO-254 or similar). Cryptography and anti-tamper techniques. Artificial Intelligence including machine learning and genetic algorithms. Electronics test methods and equipment. Good verbal and written communication skills. Working in More ❯
the leaders in the secure financial transactions space. Qualifications What will make you successful Technical skills & knowledge: Broad knowledge of cyber security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience More ❯
knowledge in Simulation and Modelling using Matlab and SysML/CAMEO. Knowledge of system architecture development. Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities. Strong interpersonal skills with the ability to steer technical interchange discussions. Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯
PowerPoint, Excel). Strong stakeholder engagement and communication skills. Desirable: CISSP, CISM, CompTIA Security+, or a recognised Vendor Certification. If you are passionate about cryptography and PKI, and you're ready to take the next step in your career, we would love to hear from you. More ❯
Science, Cybersecurity, or a related field. 3+ years of experience in security engineering, information security, or a similar role. Strong understanding of security principles, cryptography, and network protocols. Hands-on experience with security tools (e.g., SIEM, IDS/IPS, vulnerability scanners). Familiarity with cloud platforms (e.g., AWS, Azure, GCP More ❯
Science, Cybersecurity, or a related field. 3+ years of experience in security engineering, information security, or a similar role. Strong understanding of security principles, cryptography, and network protocols. Hands-on experience with security tools (e.g., SIEM, IDS/IPS, vulnerability scanners). Familiarity with cloud platforms (e.g., AWS, Azure, GCP More ❯