sheffield, south yorkshire, yorkshire and the humber, united kingdom Hybrid/Remote Options
Adroit People Limited (UK)
Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Experience working with PAM solutions More ❯
Large (enterprise) scale experience in highly complex and/or heavily regulated industry sectors. Start-up experience is advantageous. Ability to dive deep into automation, security, and operational excellence. Cryptography, cross-domain, and deep security experience are desirable but not essential. Amazon is an equal opportunity employer. We value diversity and do not discriminate based on protected veteran status, disability More ❯
storage in cloud environments, preferably Microsoft Azure Exposure to Azure DevOps and SQL release pipelines, including an understanding of software development lifecycle An understanding of encryption and handling of cryptography artefacts Overall 3+ years' experience working in an application support/data engineering role Foundational experience writing automation in PowerShell Experience with Azure Synapse or Microsoft Fabric would be advantageous More ❯
experience in network security or a related field. Strong understanding of network infrastructure, including LAN/WAN, routers, switches, and related network devices. Youll have expertise in security protocols, cryptography, authentication, authorisation, and security. Excellent analytic and problem-solving skills, with the ability to make well-informed security decisions. Strong communication and interpersonal skills, with the ability to effectively communicate More ❯
Rust, making full use of Generics and producing professional, reusable code. Software engineering: Able to design and manage the delivery of a ZKP-enabled blockchain application of production grade. Cryptography: hashes, including modular field hashes, PKCS standards, X509, signatures, elliptic curve cryptography. STEM background, likely to be PhD qualified, although relevant experience is equally acceptable. Understand the volatile nature of More ❯
DevOps Engineer Web3/Applied Cryptography/Key Management Remote £120k-150k Plexus are partnering with a VC-backed Web3 company building private key management and cryptographic infrastructure. Our client enables apps to deploy secure, user-friendly key systems that power next-generation decentralized use cases. . click apply for full job details More ❯
lifecycle. You will architect secure hardware (e.g., HSMs, Secure Boot, Key Management), guide threat assessments, interface with OEMs/Tier-1s, and mentor junior engineers. Experience with embedded hardware, cryptography, and secure product development is essential. Key Requirements 5+ years in automotive or semiconductor cybersecurity Expertise in CSMS, TARA, and ISO/SAE 21434 Strong background in secure hardware architecture More ❯
and continuous delivery Understand how to performance optimise and fine tune backend applications to meet demanding NFRs Desirable Skills/Knowledge/Experience Experience of JAVA development Experience with cryptography frameworks in Go and JAVA Experience with SQL databases Experience and/or interest in application security and/or mobile app security Experience with cloud environments including DevOps functions More ❯
being the "go to" for InfoSec Extensive and broad cyber and information security (InfoSec) experience Knowledge of concepts such as ethical hacking, network security, application securty, penetration testing and cryptography etc Strong IAM and Risk understanding Good Cloud and DevSecOps knowledge Excellent communication skills More ❯
being the "go to" for InfoSec Extensive and broad cyber and information security (InfoSec) experience Knowledge of concepts such as ethical hacking, network security, application securty, penetration testing and cryptography etc Strong IAM and Risk understanding Good Cloud and DevSecOps knowledge Excellent communication skills More ❯
integration across systems and deployments. Produce detailed architectural artefacts and documentation (e.g. in Sparx Enterprise Architect using ArchiMate/NAFv4 ). Develop and maintain security management plans covering configuration, cryptography, and assurance controls. Collaborate with senior stakeholders to align with governance and programme requirements. Essential Experience: Strong UK Defence background , ideally within the British Army or related MoD programmes. Expertise More ❯
Andover, Hampshire, South East, United Kingdom Hybrid/Remote Options
Data Careers
integration across systems and deployments. Produce detailed architectural artefacts and documentation (e.g. in Sparx Enterprise Architect using ArchiMate/NAFv4 ). Develop and maintain security management plans covering configuration, cryptography, and assurance controls. Collaborate with senior stakeholders to align with governance and programme requirements. Essential Experience: Strong UK Defence background , ideally within the British Army or related MoD programmes. Expertise More ❯
of security focused technical specifications for Windows environments • Secure Configuration Baseline creation • Knowledge of Active Directory Certificate Services • Knowledge of IIS • Knowledge of Active Directory Domain Services • Knowledge of Cryptography • Windows Server 2019/2022/2025 • Windows 11 • PowerShell • VMware including ESXi/vCentre • Strong understanding of designing to meet security principles and compliance • Application \ Infrastructure migration skills Desirable More ❯
Qualifications Experience with Smart Contract development and blockchain technologies, particularly Ethereum or other major platforms. Proficiency in Solidity, Vyper, or other smart contract programming languages. Understanding of blockchain architecture, cryptography, and decentralized systems. Ability to conduct comprehensive code testing, audits, and reviews to ensure security and performance. Strong problem-solving skills and the ability to work in a remote, collaborative More ❯
Wiltshire, England, United Kingdom Hybrid/Remote Options
Focus on SAP
regulated environments (Financial Services ideal). Strong hands-on experience with IBM DataPower for API security, policy enforcement and integration. Strong understanding of OAuth 2.0, JWT, TLS, WS-Security, cryptography and secure communication protocols. Experience designing secure architectures for hybrid/multi-cloud environments. Strong background in Zero-Trust , microservices security, and containerised platforms. Experienced in building bespoke threat models More ❯
ability to implement advanced security solutions, such as Secure Web Gateway, CASB, Netskope administration, and EntraID integration. Skilled in PKI design and lifecycle management, with knowledge of quantum-resistant cryptography and cloud HSM integration. Experience in Zero Trust Network Access (ZTNA) implementation, network segmentation, and VPN migration planning. Collaborative and detail-oriented, with a track record of working across security More ❯
the bank’s digital infrastructure. Experience Android development, advanced experience/knowledge of Java, Kotlin and C++. Android Native Development Kit (NDK) for native development. Working knowledge of common cryptography functions and their application in mobile security. A deep understanding of mobile security principles and threat mitigation. Experience with CI/CD tools such as Jenkins or GitLab. Please note More ❯
Greater Bristol Area, United Kingdom Hybrid/Remote Options
Queen Square Recruitment
tools for mobile environments. Desirable Skills Experience with mobile app development and DevSecOps tooling. Familiarity with mobile automation or security testing frameworks. Strong understanding of authentication, authorisation, encryption, and cryptography patterns. Up-to-date awareness of emerging mobile security technologies and trends. Working Model Hybrid: 2 days per week onsite in Bristol Inside IR35 contract If you are a Mobile More ❯
Dundee, City of Dundee, United Kingdom Hybrid/Remote Options
Reed Technology
Qualifications: Minimum 5 years of experience developing software or firmware using C/C++ . Hands-on experience working with ARM processors . Solid understanding of symmetric and asymmetric cryptography frameworks . Exposure to Windows-based development environments . Nice to Have: Experience with C# , Rust , and/or Python . Familiarity with firmware development environments , including RTOS and embedded More ❯
Dundee, Angus, Scotland, United Kingdom Hybrid/Remote Options
Reed
Required Skills & Qualifications: Minimum 5 years of experience developing software or firmware using C/C++. Hands-on experience working with ARM processors. Solid understanding of symmetric and asymmetric cryptography frameworks. Exposure to Windows-based development environments. Nice to Have: Experience with C#, Rust, and/or Python. Familiarity with firmware development environments, including RTOS and embedded systems. Benefits: Permanent More ❯
Bracknell, Berkshire, England, United Kingdom Hybrid/Remote Options
Reed
build strong relationships. Knowledge of Software Development and Testing Lifecycles. Exposure to both Infrastructure hardware and Application design. Desirable Skills Experience implementing test environments, tools, and resources. Knowledge of cryptography in relation to coding. ISTQB Foundation Level or above. More ❯
Bracknell, Berkshire, United Kingdom Hybrid/Remote Options
Experis
large team environments. Excellent verbal and written communication skills. Exposure to both Infrastructure hardware and Application design. Desirable Skills Experience in implementing test environments, tools, and resources. Knowledge of cryptography in relation to coding. ISTQB Foundation Level or above. Familiarity with defect management processes and tools. Personal Attributes Strong problem-solving skills and attention to detail. Ability to work under More ❯
and life sciences companies through to fast-growth ventures and individuals with transformative ideas. Its expertise spans diverse sectors, including pharmaceuticals, biotech, medical devices, chemicals, engineering, automotive, software, AI, cryptography and telecoms. This is an exciting opportunity to join a thriving practice that is frequently instructed on high-profile, high-value patent disputes before the UK Patents Court, the Unified More ❯
architectures Ability to script in appropriate languages to facilitate testing Awareness of typical Industrial Control Systems (ICS)/Operational Technology (OT) architectures, components and protocols Desirable: An understanding of cryptography and common mistakes made Experience in analysing RF protocols such as BLE, Zigbee, LoRa, Wi-Fi, and proprietary ISM band protocols. Threat modelling knowledge, being able to determine which attacks More ❯
Cryptography Engineer Manchester Area | 2-3x a week Role Description Join a global Cyber Security team as a Cryptography Specialist , ensuring the integrity and availability of cryptographic and key management services across global systems. In this role you will help to develop the function further as one of the key technical components of this dedicated team. Standard UK hours … governance across multiple platforms. Maintain risk controls, compliance records, and security documentation to audit standards. Support incident, change, and problem management, driving service improvements. Essential Experience Proven expertise in cryptography, HSMs, and key/certificate management. ITIL Foundation certification and experience in operational security environments. Strong stakeholder management and communication skills. Bachelor’s degree in Computer Science or related discipline. More ❯