the supply chain - and we're looking for talented people who want to help. You'll join a diverse team of software, hardware, and network engineers, supply chain specialists, security experts, operations managers, and other vital roles. You'll collaborate with people across AWS to help us deliver the highest standards for safety and security while providing seemingly … upgrades and management within AWS. We own the technology roadmap and standards for submarine fibre optic cable, installation methods, procurement of the SLTE, RSPC and associated operational models and security postures. The team works closely with the Regional Business Development teams to deliver submarine capacity to a global standard, enabling economic and scalable consistency for all our customers. About … central to our success. We make recruiting decisions based on your experience and skills. We value your passion to discover, invent, simplify and build. Protecting your privacy and the security of your data is a longstanding top priority for Amazon. Please consult our Privacy Notice (https://www.amazon.jobs/en/privacy_page) to know more about how More ❯
Response based in Reading. This role is on an initial 12-month contract basis and is hybrid. The Company Were working with a global technology leader delivering advanced network, security, and digital solutions that help businesses stay connected, resilient, and secure. The Role This role is for a hands-on Senior Digital Forensic & Incident Response Consultantsomeone ambitious, client-facing … Designing and facilitating breach simulation and tabletop exercises for senior leadership. Serving as an incident commander during major cyber crises. Producing forensic reports and actionable recommendations to strengthen client security posture. The Individual Were looking for people who can show: Strong experience in digital forensics and incident response in a consulting or client-facing capacity. Proven ability to lead More ❯
demanding role focused on low-level system analysis and secure data handling.You’ll be working on a short-term project with potential for extension, contributing to a high-impact security initiative involving trusted execution environments and cryptographic processes. Key Responsibilities Investigate and analyse data at rest post-reset across secure systems. Conduct low-level Linux and hardware analysis. Collaborate … with internal teams to assess and improve data security posture. Document findings and provide actionable recommendations. Role Requirements: Active SC Clearance. Strong experience with Linux (low-level) and C/C++. Solid understanding of data security, particularly data at rest. Familiarity with Trusted Execution Environments (TEEs) such as TrustZone or Intel SGX. Desirable: Experience in digital forensics and More ❯