Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Cryptography Specialist I am working with a global organisation that is expanding its cybersecurity capabilities and looking for a Cryptography Specialist to join their team. This is a fantastic opportunity to work at the forefront of digital security, managing encryption systems and key management processes that protect some of the organisation's most sensitive data. As part of this role … with application, infrastructure, and support teams to ensure seamless integration Contribute to project delivery and continuous improvement initiatives To be successful in the role you will have: Experience in cryptography and information security Hands-on experience with HSM configuration and support Familiarity with SSH key and certificate management Understanding of Unix and Windows environments This is a hybrid role with More ❯
we operate from); UK, France, Netherlands, Spain, or Belgium. Some travel to our offices will be required from time-to-time About the role We are looking for a Cryptography Software Engineer to join our team to help design and implement the next generation of secure Embedded Software implementations of Classic & Post Quantum Cryptography. We have been established since … clear path to market. This is a great opportunity for career progression and to get a head start in a rapidly expanding segment of the semiconductor industry (Post-Quantum Cryptography and RISC-V). Our platform IP components come together as a RISC-V MCU based Sub-system with advanced (post-quantum) cryptography algorithm support and security features. As a … and developing secure solutions, helping to develop software solutions working seamlessly through the entire software development life cycle. You will assist with the development of PQShield's core software cryptography libraries. Responsibilities include developing internal tools to support the build, test and security analysis of PQShield's software products. ️ What you'll be doing Design, implement, and test classical and More ❯
Job Title: Software Engineer Language: English (UK) Location: West Midlands, United Kingdom Contract Type: Permanent, Full-Time Working Hours: 37.0 hours per week Schedule Type: Full Time Sector: Defence Role Overview We are seeking a Software Engineer to contribute to More ❯
Role Title: Cryptography Analyst Location: South of Manchester Start Date: ASAP End Date: 31st December Rate: £450 per day - PAYE via Umbrella Only Overall purpose of role: Undertake all team activities in line with client wider strategy, Crypto strategy and departmental goals. Ensure the integrity and availability of cryptographic and key management services to business functions and applications. Maintain accurate … improving operations and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/Information Security. ITIL Foundation. Batchelor Degree in Computer Science. Strong stakeholder management, able to influence and negotiate at all levels. Attention to detail and accuracy of work. Experienced at More ❯
Telford, Shropshire, West Midlands, United Kingdom
Morson Talent
SOFTWARE ENGINEERS – CONTRACTS 6 MONTHS – TELFORD Shropshire Software Engineer Full Lifecycle design, development & integration of equipment at the system and sub-system levels. Within this role you will be exposed to several different vehicles and systems. There will be a More ❯
SOFTWARE ENGINEERS CONTRACTS 6 MONTHS TELFORD Shropshire Software Engineer Full Lifecycle design, development & integration of equipment at the system and sub-system levels. Within this role you will be exposed to several different vehicles and systems. There will be a More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Networker Global Limited
keys discovery, management and remediation across on-prem and the Cloud. We are looking for high quality candidates with significant experience and proven technical depth within SSH key management, cryptography, and the Identity and Access Management space, including: Design and implement secure SSH key management solutions for large scale hybrid (on-prem, Cloud) environments. Expertise in cryptographic risk management, including … Knowledge/understanding of hardware security modules (HSMs) for storing cryptographic keys securely, including integration with enterprise applications for key generation and usage.? Familiarity with NIST's Post-Quantum Cryptography (PQC) standardization efforts and practical approaches for transitioning to quantum-resistant encryption schemes.? Knowledge of FIPS 140-2 and FIPS 140-3 validated cryptographic modules and their integration with enterprise … may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Experience working in large More ❯
About Moneybox Moneybox is the award-winning app that helps you turn your money into something greater. We've brought saving, investing, home-buying, and retirement services all together into one simple app, so it's easier than ever to More ❯
About Moneybox Moneybox is the award-winning app that helps you turn your money into something greater. We've brought saving, investing, home-buying, and retirement services all together into one simple app, so it's easier than ever to More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Moneybox
About Moneybox Moneybox is the award-winning app that helps you turn your money into something greater. We’ve brought saving, investing, home-buying, and retirement services all together into one simple app, so it’s easier than ever to More ❯
Contract – Cyber Security Manager A client of ours is seeking a DV Cleared Cyber Security Manager to lead and deliver cyber security services across large-scale, complex programmes within Defence. You will have the opportunity to influence strategy, manage delivery More ❯
Contract Cyber Security Manager A client of ours is seeking a DV Cleared Cyber Security Manager to lead and deliver cyber security services across large-scale, complex programmes within Defence. You will have the opportunity to influence strategy, manage delivery More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Control Testing Lead , you will play a key role within the Information Security team, supporting the Control Test and Assurance Manager in the delivery of the Control Test and Assurance Programme. This role requires solid experience in control More ❯
Operational Cyber Researcher Location: Gloucester, Manchester, London - Onsite work required, with consideration for both full and part-time applicants - please speak to your recruiter about the options Requisition ID: 121883 Grade: GG10 - GG12 Operational Cyber Group is a team of More ❯
Design and implement secure embedded software systems for innovative AI-enabled and connected products. Security Technology Integration: Collaborate with teams to embed modern security technologies such as post-quantum cryptography, blockchain-based services (Web 3.0), and privacy-enhancing technologies (e.g., Zero Knowledge Proofs) into real-world applications. Client-Focused Solutions: Work directly with clients, understanding their needs, and developing tailored … into our clients' projects. Must-Have Skills: Embedded Software Development: Experience in building secure systems with embedded software. Security Engineering: Strong background in security engineering, including working with modern cryptography and security protocols. DV Clearance Eligibility: Must be DV clearable or already hold DV clearance. Nice-to-Have Skills: Project Leadership: Experience leading technical projects or teams in a security More ❯
The Product Security Team's mission is to Left-shift SDLC (Security Development Lifecycle) processes for ALL code written in Databricks (for Customer Use or Supporting Customer internally) to reduce the likelihood of introducing new vulnerabilities in production and minimize More ❯