following to: systems security design process/engineering life cycle; information domain; cross domain solutions; commercial off the shelf and government off the shelf cryptography; identification; authentications; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing certification and accreditation process; principles of More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Base-2 Solutions, LLC
for Information Assurance Services (Confidentiality, Integrity, Nonrepudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.). Support and contribute to the development of systems engineering documentation (i.e., system engineering plans More ❯
Reston, Virginia, United States Hybrid / WFH Options
Base-2 Solutions, LLC
for Information Assurance Services (Confidentiality, Integrity, Nonrepudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.). Support and contribute to the development of systems engineering documentation (i.e., system engineering plans More ❯
a lab setting. Work efficiently both individually and as a team. Desired: An active DoD TS/SCI clearance. OSCP or equivalent certification. Basic cryptography knowledge. Basic programming/scripting experience (Python, Java, C/C++, bash). Code analysis and reverse engineering experience. Familiarity with COTS/GOTS radios More ❯
QUALIFICATIONS - Experience with AWS products and services - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. SnT is active in several international research projects funded by the Fonds National de la Recherche (FNR More ❯
reviewing complex systems design/code for security best practices and compliance with industry standards. - Strong creative problem-solving abilities. - Knowledge and experience with cryptography and computer security. - Distributed systems experience. - Knowledge of Linux systems and operating system internals. - Experience with large scale systems. Amazon is an equal opportunities employer. More ❯
experience in the acquisition life cycle for information systems Experience in security control evaluation, testing, and assessment in complex system environments Experience with NSA cryptography solutions and key management processes Required Certifications: N/A U.S. Citizenship Required: Yes Security Clearance Required: TS/SCI Employment Type: Regular Full Time More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role The successful candidate will join the CritiX research group ( ) headed by Prof. Marcus Völp. The More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role The successful candidate will join the CritiX research group ( ) headed by Prof. Marcus Völp. The More ❯
XML, XSLT. Must have experience with software source control and configuration management tools. Must have experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). Must have experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with More ❯
XML, XSLT. Must have experience with software source control and configuration management tools. Must have experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). Must have experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
Design, and Information Systems Security (ISS) You can advise and give support to the rest of the team Familiar with Risk Analysis, Network Security, Cryptography, Identity & Access Management (software/hardware development, the NIST Cybersecurity Framework, cloud technologies) Able to monitor and measure risk as well as compliance You have More ❯
Experience with secure coding practices and code review methodologies. • Familiarity with static and dynamic application security testing tools. • Strong understanding of encryption algorithms and cryptography standards. • Familiarity with version control systems (e.g., Git, SVN) and CI/CD pipeline integration. • Experience with security frameworks and industry best practices (e.g., NIST More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role The SigCom research group of SnT, headed by Prof. Symeon Chatzinotas, focuses on wireless/ More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. The successful candidate will join the young, vibrant, and interdisciplinary FINATRAX Research Group, which builds bridges between More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Successful candidates will join the young, vibrant, and interdisciplinary FINATRAX Research Group, which builds bridges between business More ❯
Information Assurance Services (Confidentiality, Integrity, Non-repudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.) • Review and provide input to program and contract work breakdown structure (WBS), work packages and More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. The Centre is rapidly expanding its research activities and is seeking highly motivated doctoral candidates who wish More ❯
Information Assurance Services (Confidentiality, Integrity, Non repudiation, and Availability); Basic information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords cryptography, discretionary access control, mandatory access control , hashing, key management, etc.) - Implement comprehensive SOA solutions - Implement operational. view, technical standards view, and system and service view More ❯
programs, advancing capabilities that outpace threats to the country's national security. The Cyber Architectures & Integration (CAI) team is passionate about cyberspace, including cybersecurity, cryptography, key management, data governance & architecting, information technology, program protection, software, and resilient design for space systems. CAI is looking for highly innovative and self-motivated More ❯