access management, and secrets management technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied cryptography and cryptographic protocols, such as E2E protection, authenticated encryption, mTLS, Key Exchange/Agreement, Key Derivation, Key Wrapping and Remote Key Attestation. Experience in identifying More ❯
world-leading encryption solutions to secure data and communications for enterprises, governments, defence, and critical national infrastructure (CNI). Powered by advanced symmetric key cryptography, the Arqit SKA-Platform offers scalable dynamic encryption that meets modern industry standards and is resilient to future threats, such as those posed by quantum More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
leonardo company
detailed FPGA/Firmware requirements and architecture from system requirements. A structured approach to FPGA/firmware design (RTCA DO-254 or similar). Cryptography and anti-tamper techniques. Artificial Intelligence including machine learning and genetic algorithms. Electronics test methods and equipment. Good verbal and written communication skills. Working in More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Mindbank Consulting Group
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; JOB RESPONSIBILITIES FOR THE CYBER SECURITY More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
WOOD Consulting Services, Inc
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. • Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). • Experience developing on Windows, and/or Linux operating systems. • Must have documented professional experience with web services. More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Wood Consulting Services, Inc
XML, XSLT. Must have experience with software source control and configuration management tools. Must have experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). Must have experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with More ❯
PowerPoint, Excel). Strong stakeholder engagement and communication skills. Desirable: CISSP, CISM, CompTIA Security+, or a recognised Vendor Certification. If you are passionate about cryptography and PKI, and you're ready to take the next step in your career, we would love to hear from you. More ❯
PowerPoint, Excel). Strong stakeholder engagement and communication skills. Desirable: CISSP, CISM, CompTIA Security+, or a recognised Vendor Certification. If you are passionate about cryptography and PKI, and you're ready to take the next step in your career, we would love to hear from you. More ❯
Reston, Virginia, United States Hybrid / WFH Options
RedKey Solutions
repeatable tasks and provide consultative support. • Design, configure, implement, troubleshoot, and maintain security platforms (e.g., firewalls, intrusion detection/prevention, anti-virus/malware, cryptography systems, SIEM, MDM). • Formulate systems and methodologies, respond to security events, and assist in remediation efforts. • Participate in the change management process. • Coordinate and More ❯
Plymouth, Devon, United Kingdom Hybrid / WFH Options
Thales Group
You can independently define architectures, are proficient in Infrastructure Security, Security Supervision, and Information Systems Security. You are familiar with Risk Analysis, Network Security, Cryptography, IAM, cloud technologies, and compliance monitoring. You excel in working with customers and technical teams. NICE TO HAVE: Domain expertise in Defence, Nuclear, Government, Aerospace More ❯
SANS ) Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2) Working knowledge of cryptography including encryption, signing and digital certificates Principles of securing mobile applications and web services Docker or Kubernetes and infrastructure as code Event driven streaming technologies More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Base-2 Solutions, LLC
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; Education and experience Bachelors degree (technical More ❯
Karlsruhe, Baden-Württemberg, Germany Hybrid / WFH Options
Cinemo GmbH
environment - Keep yourself up to date about security threats and solutions known in the industry Technologies: Embedded Hardware Support JWT Linux Network Security C++ Cryptography More: Benefits: • Additional Healthcare benefit • Flexible working hours • 31 days holiday per year • Hybrid working • Relocation support (international) • Modern and powerful hardware • Bike Leasing • Fruit More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
patching, reverse engineering and instrumenting Android applications Experience with automated testing frameworks, in addition to any experience writing/conducting test plans Background in cryptography, privacy, virtual private networking, distributed computing protocols Experience in commonly used communications protocols such as TCP, UDP, HTTPS, TLS Experience with container technologies such as More ❯
San Antonio, Texas, United States Hybrid / WFH Options
Kudu Dynamics, LLC
stack applications Experience with automated testing frameworks Experience with Python Experience with setting up Man in the Middle proxies to instrument applications Background in cryptography, privacy, virtual private networking, distributed computing protocols Experience in commonly used communications protocols such as TCP, UDP, HTTPS, TLS Experience evaluating open-source code for More ❯
At Protegrity, we lead innovation by using AI and quantum-resistant cryptography to transform data protection across cloud-native, hybrid, on-premises, and open source environments. We leverage advanced cryptographic methods such as tokenization, format-preserving encryption, and quantum-resilient techniques to protect sensitive data. As a global leader in More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Base-2 Solutions, LLC
for Information Assurance Services (Confidentiality, Integrity, Nonrepudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.). Support and contribute to the development of systems engineering documentation (i.e., system engineering plans More ❯
Reston, Virginia, United States Hybrid / WFH Options
Base-2 Solutions, LLC
for Information Assurance Services (Confidentiality, Integrity, Nonrepudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.). Support and contribute to the development of systems engineering documentation (i.e., system engineering plans More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
Design, and Information Systems Security (ISS) You can advise and give support to the rest of the team Familiar with Risk Analysis, Network Security, Cryptography, Identity & Access Management (software/hardware development, the NIST Cybersecurity Framework, cloud technologies) Able to monitor and measure risk as well as compliance You have More ❯
stoke-on-trent, midlands, United Kingdom Hybrid / WFH Options
GivEnergy
Thread, Matter etc. Proven experience on developing firmware with RTOS, e.g. FreeRTOS, RT-Linux, Threadx, etc. Hands on development with IoT infrastructure, MQTT, Protobuf, cryptography, secure boot, etc. Bare metal driver, BSP, board bring up. Basic knowledge of electronics e.g. reading schematics, using test equipment such as DVM and oscilloscope More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Entrust Corporation
technical problems with demanding requirements, in innovative, practical ways. Nice-to-Have Qualifications: Open-source software - as licensee, or as contributor. An interest in cryptography and/or computer security techniques. Software development in Agile and/or SAFe. At Entrust, we don't just offer jobs - we offer career More ❯
glasgow, central scotland, United Kingdom Hybrid / WFH Options
FullProxy
and non-technical audiences Fortinet certification is a plus, such as Fortinet NSE4-77,/FCX, FCSS and FCP/FCX, FCSS and FCP Cryptography, Encryption, PKI knowledge would be fantastic Experience with cloud platforms such as AWS, Azure, or Google Cloud Platform is a plus You need to be More ❯
in Computer Science, Engineering, or a related field is desirable. Additionally, it is highly beneficial if you have experience with any of the following: Cryptography knowledge Black-box reverse engineering Familiarity with UEFI platform firmware, ARM/x86 architectures, and secure boot architectures Experience with SDR, wireless protocols (Bluetooth, Wi More ❯