Anduril Industries is a defense technology company with a mission to transform U.S. and allied military capabilities with advanced technology. By bringing the expertise, technology, and business model of the 21st century's most innovative companies to the defense industry More ❯
Additional qualities include a passion for security research, participation in security competitions or bug bounty programs, domain expertise in security architecture, communication security, IAM, cryptography, or software security, and a data-driven approach to supporting ideas with evidence. More ❯
the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of More ❯
Karlsruhe, Baden-Württemberg, Germany Hybrid / WFH Options
Cinemo GmbH
environment - Keep yourself up to date about security threats and solutions known in the industry Technologies: Embedded Hardware Support JWT Linux Network Security C++ Cryptography More: Benefits: • Additional Healthcare benefit • Flexible working hours • 31 days holiday per year • Hybrid working • Relocation support (international) • Modern and powerful hardware • Bike Leasing • Fruit More ❯
the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
National Telecommunications and Information Administration (NTIA and commercial (Federal Communications Commission (FCC frequency registration and approval process International Telecommunications Union (ITU) frequency allocation rules Cryptography implementation and Information Assurance accreditation Desired Skills/Qualifications M.S. Physics, Electrical Engineering, Mathematics or related discipline FTS International, LLC is an Equal Opportunity Employer More ❯
response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of More ❯
yourself to reach your own career goals with our support. You will also have the rare opportunity in NI to work on projects with cryptography, quantum computing, and a vast range of technology, from autonomous vehicles to drones. With the help and support of our software and firmware teams, the More ❯
for Information Assurance Services (Confidentiality, Integrity, Nonrepudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary). Required Skills/Abilities: Excellent verbal and written communication skills. Excellent interpersonal, negotiation, and conflict resolution skills. Excellent organizational skills and attention to More ❯
Android, and iOS. Familiarity with network principles, IP protocols, and virtualization/emulation tools. Experience developing proof-of-concept exploits, firmware dumping, and basic cryptography knowledge. Proficiency with communication and network protocols, hardware bus protocols, and security tools and techniques. If you are enthusiastic about pushing the boundaries of cybersecurity More ❯
Government (Azure-Gov) and Amazon Web Services Government (AWS-G). Responsible for assessing and facilitating network requests: including firewall policies, VPN, load balancing, cryptography, and network architecture. Design and implement security-first network policies and procedures to adhere with NIST 800.171 and CMMC compliance regulations. Communicates effectively with end More ❯
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; Requirements: Bachelors degree (technical discipline preferred More ❯
the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification, authentication, and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
tools and architecture. - Familiarity with Windows and Linux logging systems. - Understanding of network protocols (TCP, UDP, DNS, HTTPS, TLS, etc) - Understanding of high-level cryptography principles (PKI, encryption algorithms, etc) Amazon is an equal opportunity employer and does not discriminate on the basis of protected veteran status, disability, or other More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
patching, reverse engineering and instrumenting Android applications Experience with automated testing frameworks, in addition to any experience writing/conducting test plans Background in cryptography, privacy, virtual private networking, distributed computing protocols Experience in commonly used communications protocols such as TCP, UDP, HTTPS, TLS Experience with container technologies such as More ❯
San Antonio, Texas, United States Hybrid / WFH Options
Kudu Dynamics, LLC
stack applications Experience with automated testing frameworks Experience with Python Experience with setting up Man in the Middle proxies to instrument applications Background in cryptography, privacy, virtual private networking, distributed computing protocols Experience in commonly used communications protocols such as TCP, UDP, HTTPS, TLS Experience evaluating open-source code for More ❯
problems. We are looking for you, if you have: Experience in information security, risk management or compliance, Experience with networks : TCP/IP protocols, cryptography algorithms, routing, firewalling, proxies, WAF, network segmentations, etc. Strong analytical skills, Familiarity with IT risk assessment methods and control frameworks such as ISO27001, NIST, COBIT More ❯
developing device drivers and Board Support Packages for real time embedded systems Experience with Modern C++ techniques Experience with Information Assurance and/or cryptography Experience with NSA Type 1 certification or other SW certification such as DO-178 Pay Rate: Pay range offered to a successful candidate will be More ❯
Information Assurance Services (Confidentiality, integrity, Non repudiation and Availability); Basic information Assurance Mechanisms (e.g., Identification Authentication, Access Control Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control bashing, key management ) Review and provide input to program and contract work breakdown structure (WBS), work packages and the More ❯
network protocols, equipment, emerging technology, and configurations will come in handy as you optimize client operations and modernization. Using your experience in Crytographic equipment, cryptography, key management, software and hardware firewalls, Cisco hardware, Palo Alto firewalls, cloud migration, optical infrastructure networking, virtual routing and forwarding, SolarWinds, you'll serve as More ❯
engineering expertise in one or more of the following: system security design process engineering life cycle information domain cross-domain solutions COTS and GOTS cryptography identification, authentication, and authorization system integration risk management intrusion detection contingency planning incident handling configuration control and change management auditing certification and accreditation processes Minimum More ❯
At Protegrity, we lead innovation by using AI and quantum-resistant cryptography to transform data protection across cloud-native, hybrid, on-premises, and open source environments. We leverage advanced cryptographic methods such as tokenization, format-preserving encryption, and quantum-resilient techniques to protect sensitive data. As a global leader in More ❯
Professional communication skills (written and verbal) Experience writing advanced technical reports Ability to articulate technical concepts and findings to stakeholders. Advanced technical understanding of Cryptography Advanced technical understanding of software/firmware architecture Advanced technical understanding of computer networking Familiarity with different file system structure and functions Understanding of cybersecurity More ❯