components. Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field. Proven experience as a Security Engineer or in a similar role. Strong understanding of security protocols, cryptography, authentication, and authorisation. Familiarity with securing systems that involve digital transactions, cryptographic operations, or high-privilege user actions. Knowledge of operating systems, network protocols, and software development security. Experience with More ❯
a focus on adversarial tactics and threat intelligence. Understanding of OT and IT assets, technologies, and security best practices within the current threat landscape. Deep knowledge of network protocols, cryptography, vulnerabilities, and attack vectors used by sophisticated threat actors. Proficiency with a range of penetration testing tools and methodologies, especially those related to threat analysis. Experience in planning and executing More ❯
Open source tools and an understanding of cryptocurrencies. Understanding of various distributed consensus methodologies (Mining, PoS, etc) and knowledge of layer 2 solutions (e.g. ZKP rollups) Strong knowledge of cryptography, including asymmetric (pub/priv key), symmetric, hash functions, encryption/signatures. Knowledge of versioning systems Git etc. Hands-on experience in using a number of the following languages: Java More ❯
skills. Endpoint security concepts, controls, and best practices for Servers (e.g. Windows and Linux). General IT networking concepts, protocols, standards and network security concepts, controls, and best practices. Cryptography fundamentals and data security controls and best practices. Forensic investigation techniques. Prior experience deploying, configuring, managing, and/or operating security technologies is preferred, such as endpoint security (e.g. AV More ❯
standards, and quantum computing developments. Continuously refine and optimise automation workflows to meet emerging challenges and opportunities. Qualifications/Skills: Bachelor’s or Master’s degree in Computer Science, Cryptography, Software Engineering, or a related field. Strong knowledge of cryptographic principles, algorithms, and protocols (e.g., RSA, ECC, AES). Familiarity with post-quantum cryptographic algorithms and standards (e.g., lattice-based More ❯
to security events. To develop and implement security policies, managing SIEM systems, and investigating incidents. General IT networking concepts, protocols, standards and network security concepts, controls, and best practices Cryptography fundamentals and data security controls and best practices Forensic investigation techniques Security standards/best practices and frameworks About us We're a diverse group of visionary innovators who provide More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cyber Talent Limited
Experience in software development, preferably in Java and Python desirable . In depth experience with key ceremonies Experience in system development lifecycle and system integration is desirable. Proficiency in cryptography programming, nShield HSM (Hardware Security Module) Proficient in application development and databases. Desirable background/skills:- Degree holder in Computer Science, Computer Engineering, or related disciplines is desirable. If you More ❯
may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Experience working in large More ❯
in new directions, and push yourself to reach your own career goals with our support. You will also have the rare opportunity in NI to work on projects with cryptography, quantum computing, and a vast range of technology, from autonomous vehicles to drones. With the help and support of our software and firmware teams, the opportunities for you are endless More ❯
5+ years of professional experience in penetration testing, with a strong emphasis on threat intel and adversary emulation. Deep understanding of OT/IT systems, common vulnerabilities, network protocols, cryptography, and attack vectors. Proficiency in tools and frameworks used in both offensive security and threat intelligence. Proven ability to scope, manage, and deliver complex engagements with excellent communication across technical More ❯
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
CBSbutler Ltd
VDI solutions. Several years' experience in providing security architecture expertise to the design and delivery of: Public and Private cloud architectures utilising Software Defined Datacentre (SDDC) techniques. Government Grade Cryptography Provisioning and Management Security implementations such as PKI and proxy services e.g. ADFS in line with MOD Security assurance processes. Past experience of working with accredited secure solutions within the More ❯
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
VDI solutions. Several years' experience in providing security architecture expertise to the design and delivery of: Public and Private cloud architectures utilising Software Defined Datacentre (SDDC) techniques. Government Grade Cryptography Provisioning and Management Security implementations such as PKI and proxy services e.g. ADFS in line with MOD Security assurance processes. Past experience of working with accredited secure solutions within the More ❯
Normanton, Old Snydale, West Yorkshire, United Kingdom Hybrid / WFH Options
Hague Group
AWS or GCP) Front-end frameworks such as Blazor, Angular, React or Vue Experience with Entity Framework Familiarity with scripting languages Knowledge of SOAP/REST services Understanding of cryptography and digital signatures Experience with C++ and the Win32 API Knowledge of Windows OS and Active Directory Architectures Personal Attributes: Inquisitive, detail-oriented and proactive Motivated to produce high-quality More ❯
and at home, there's nothing we can't achieve. BASIC QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience applying threat modeling or other risk identification techniques or equivalent - Experience with programming languages such as Python, Java, C++ - Bachelor's degree in computer More ❯
to deployment. You'll help integrate automated security tooling and checks into our CI/CD pipelines, facilitate threat modelling sessions, and review security-sensitive design decisions around authentication, cryptography, and logging. You'll also ensure that tools such as SAST, DAST, and SCA are effective and efficient, and that testing programmes - including pen testing, vulnerability scanning, and bug bounty More ❯
principles (OWASP and OWASP mobile, SANS ), Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2), Working knowledge of cryptography including encryption, signing and digital certificates, Principles of securing mobile applications and web services, Docker or kubernetes and infrastructure as code, Event driven streaming technologies, Logging and monitoring, networks, firewalls More ❯
5+ years of experience in software development with 3+ years in blockchain Expertise in Ethereum, Solidity, and Web3.js Experience with other blockchain platforms (Hyperledger, Polkadot, etc.) Strong understanding of cryptography and blockchain security Knowledge of financial systems and regulations Bachelor's or Master's degree in Computer Science or related field More ❯
drive strategy in a fast-paced, forward-thinking environment. What youll need: 3+ years in complex IT or consultancy environments Knowledge of HMG SPF, ISO27001, identity management, SIEM, PKI, cryptography, and secure frameworks Experience in public sector programmes Bonus: PCiIAA, SABSA, TOGAF, or a masters/STEM degree If youre security-cleared (or eligible), ready to lead, and want to More ❯
strategy in a fast-paced, forward-thinking environment. What you’ll need: 3+ years in complex IT or consultancy environments Knowledge of HMG SPF, ISO27001, identity management, SIEM, PKI, cryptography, and secure frameworks Experience in public sector programmes Bonus: PCiIAA, SABSA, TOGAF, or a master’s/STEM degree If you’re security-cleared (or eligible), ready to lead, and More ❯
open source development "Nice To Have" Skills and Experience: Armv8-A Architecture Arm64 assembly language Experience of open source working practices Knowledge of Android, Linux kernel, driver development, security, cryptography In Return: Our UK offices are amazing places to collaborate. We also have some scope to adapt the job role and title for the right person - if you are interested More ❯
Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Oho Group Ltd
Bluetooth, Wi-Fi, and CAN. Experience with real-time operating systems (RTOS) such as FreeRTOS, ThreadX, or others for firmware development. Knowledge of IoT technologies, including secure communication protocols, cryptography, and data encryption. Hands-on experience with board bring-up (BSP) and low-level driver development. Strong understanding of electronics, including the ability to read schematics and use test equipment More ❯
Raspberry Pi). Familiarity with low-level hardware interfacing. Linux development environment experience. Strong problem-solving skills and adaptability. Desirable: Experience in secure or defence-related projects. Knowledge of cryptography, Bluetooth, UWB, USB drivers. Exposure to RTOS or bare-metal development. Professional membership of BCS or IET is a plus. What's on Offer Competitive salary & financial rewards (pension, share More ❯
Employment Type: Full-Time
Salary: £65,000 - £80,000 per annum, Negotiable, Inc benefits