85k DoE plus 15% clearance bonus Full time on site in Cheltenham Skills required in problem solving, IDA Pro, Wireshark, Kali, C/C++, Cryptography Who are we? We are seeking a dynamic and resourceful individual to join our team as a Security Researcher. The ideal candidate will possess a more »
The future starts here! Ready to join the Crypto & Security group at NXP? We are currently looking for an experienced Project Manager. You will be an integral member of the Security Assessment Team that is responsible for the Security by more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
This is a fantastic opportunity to join a well-funded start-up that is pioneering high performance computing for the cryptography industry. The next stage of their evolution is to build their IaaS products/services, so they are looking to hire a Senior/Principal Cloud Software Engineer to … communicate clearly with both expert and non-expert audience Highly desirable: Knowledge of using HW accelerators in AWS Python JIRA Implementing dashboards Knowledge of cryptography and/or FHE This is a hybrid role, to be based out of their Bristol office. This is a great opportunity for you to more »
in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Matchtech
SIEM, firewalls, intrusion detection/prevention systems, antivirus software, authentication systems, and log management. Strong knowledge of security approaches, including risk analysis, attack vectors, cryptography, and cyber security incident response best practices. If the above role sounds like the right step in your career then please get in touch for more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
mathematics, computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background Investigation more »
Calling Cryptography/Security experts in Bristol!! Experienced C/C++ Software Engineer with cryptography expertise required to join rapidly expanding company heading for stardom. I am seeking a talented and proven C/C++ Software Engineer with a mix of software expertise - mainly using C, Python and Matlab with …/L3 mainly) and a knowledge of hardware. It is essential that the successful C/C++ Software Engineer has in-depth skills in cryptography algorithms and implementation, designing cryptographic protocols. Due to the nature of our client business applicants need to have UK working rights. If you are a more »
and wireless communication technologies and interfacing with (or ideally implementing) various communication protocols. Understanding OSes and concurrency issues Experience with on-device security and cryptography Build systems (Make, CMake) and tools (shell scripting, Docker) FPGA experience If you are available and interested in this new role please send an application more »
protocols Experience in mobile security, including OS, RF, and App security. Ability in software development or programming/scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threat modelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life more »
Leading defence firm seeks a Cryptography Specialist to work with customers on complex challenges. You will lead technical cryptography work, identifying security requirements and developing solutions in the crypto-security domain. Examples of projects may include integrating high grade cryptography into existing systems and key management, or proposing new designs … to meet security requirements for a crypto system. The successful candidate will have cryptography and key management/PKI experience and will hold active SC clearance. The role is based in Malvern but flexible working is available. more »
Cheltenham, Gloucestershire, South West, United Kingdom
Searchability NS&D Ltd
85k DoE plus 15% clearance bonus Full time on site in Cheltenham Skills required in problem solving, IDA Pro, Wireshark, Kali, C/C++, Cryptography Who are we? We are seeking a dynamic and resourceful individual to join our team as a Security Researcher. The ideal candidate will possess a more »
Dartford, England, United Kingdom Hybrid / WFH Options
Europa Worldwide Group
administer, and maintain Network & Security platforms and any other related software, such as routers, switches, wireless, firewalls, intrusion detection/prevention, network access control, cryptography systems, monitoring, and cloud technologies/applications. Perform diagnostics, appraisal, and analysis on predominantly Cisco based Network & Security technologies, such as, firewalls, VPN’s, intrusion more »
This is a fantastic opportunity to join a well-funded Tech company that is pioneering high performance computing for the cryptography and Data security industry. The next stage of their evolution is to build their IaaS products/services, so they are looking to hire a Principal Full Stack Web … customers Developed interfaces monitoring and reporting systems Ability to communicate clearly with both expert and non-expert audiences Highly desirable: Linux JIRA Implementing dashboards Cryptography and/or FHE This is a hybrid role, to be based out of their Bristol office. This is a great opportunity for you to more »