. Responsibilities: Conducting risk analyses and contributing to security architectures Ensuring compliance with standards such as ISO 27001, IEC 62443, and EN 50701 Applying cryptography and vulnerability assessments Advising and communicating with both technical and non-technical stakeholders We encourage you to apply if: You hold a Master's degree More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Oho Group Ltd
Experience with real-time operating systems (RTOS) such as FreeRTOS, ThreadX, or others for firmware development. Knowledge of IoT technologies, including secure communication protocols, cryptography, and data encryption. Hands-on experience with board bring-up (BSP) and low-level driver development. Strong understanding of electronics, including the ability to read More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Oho Group Ltd
Experience with real-time operating systems (RTOS) such as FreeRTOS, ThreadX, or others for firmware development. Knowledge of IoT technologies, including secure communication protocols, cryptography, and data encryption. Hands-on experience with board bring-up (BSP) and low-level driver development. Strong understanding of electronics, including the ability to read More ❯
Embedded Software Team Leads - Bare Metal Networking Cryptography Reston, VA or McLean, VA Onsite U.S. Citizenship Required Top Secret Clearance Required District Partners is supporting a rapidly scaling defense tech firm is hiring multiple Embedded Software Team Leads (six roles available) to drive the development of mission-critical embedded platforms More ❯
delivering quantum-safe encryption to secure data and communications for enterprises, governments, and critical national infrastructure (CNI). Powered by its advanced symmetric key cryptography, the Arqit SKA-Platform offers scalable encryption that is resilient to quantum threats. The platform allows devices to seamlessly generate and share secure encryption keys More ❯
foundational understanding of how data is represented and flows through mobile systems Is familiar with, or has some experience with: Connectivity, Security, C, NDK, cryptography, KMP. Candidates should also: be able to demonstrate a high level of professionalism. demonstrable ability to build strong and trusted relationships with external parties and More ❯
foundational understanding of how data is represented and flows through mobile systems Is familiar with, or has some experience with: Connectivity, Security, C, NDK, cryptography, KMP They will also: be able to demonstrate a high level of professionalism; demonstrable ability to build strong and trusted relationships with external parties and More ❯
london, south east england, United Kingdom Hybrid / WFH Options
DeFinitive
solving, communication, and teamwork abilities. Bonus points for: Experience with identity providers (Okta, Auth0, Cognito, Keycloak) and authentication protocols. Any knowledge of public key cryptography and SSL management. Some familiarity with MDM (Jamf, Kandji) and network security tools (WAFs, CASB, SASE, ZTNA). Some exposure to digital assets or blockchain More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
DeFinitive
solving, communication, and teamwork abilities. Bonus points for: Experience with identity providers (Okta, Auth0, Cognito, Keycloak) and authentication protocols. Any knowledge of public key cryptography and SSL management. Some familiarity with MDM (Jamf, Kandji) and network security tools (WAFs, CASB, SASE, ZTNA). Some exposure to digital assets or blockchain More ❯
setup, and operations Experience with certificate lifecycle management and automation Knowledge of certificate policies and certificate contents Knowledge of Linux systems Knowledge of asymmetric cryptography concepts and applications TS/SCI clearance HS diploma or GED Nice If You Have: Experience with Active Directory Certificate Services Experience with Keyfactor and More ❯
logs to determine information, including converting raw logs into ECS formatted documents Experience with Logstash plugins, filters, regular expressions, and grok patterns Knowledge of cryptography protocols and standards, including TLS, mTLS, hashing algorithms, and Public Key Infrastructure ( PKI ) Knowledge of federal compliance standards, including NIST 800-53, FIPS, STIG, and More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
defence, security, and civil operators, based on innovative radiocommunications, networks, and cybersecurity technologies. Our work includes groundbreaking digital technologies such as 4G mobile communications, cryptography, cloud computing, and big data, applied in physical protection systems and critical information systems. We offer exciting opportunities for dedicated employees to learn and grow More ❯
infrastructure/tooling, and other low-level software for various blockchain networks including for the Moonbeam Network ( ), zkSync, Starkware, and Polkadot. Problem domains include cryptography, security, networking, game theory, zero knowledge, finance, political science, and programming language design. The Role The Principal Engineer is responsible for scoping, designing, and implementing More ❯
response and playbook development Detection creation within SIEM tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability to understand client-specific challenges and tailor solutions accordingly More ❯
or PCI-DSS. Experience and/or certification in AWS products and services. Experience in threat modeling, secure coding, identity management and authentication, cryptography, Responsible AI and hands-on technical expertise in building security capabilities in code and deploying infrastructure as code. Understanding of automation and DevOps concepts and how More ❯
response and playbook development Detection creation within SIEM tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability to understand client-specific challenges and tailor solutions accordingly More ❯
response and playbook development Detection creation within SIEM tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability to understand client-specific challenges and tailor solutions accordingly More ❯
response and playbook development Detection creation within SIEM tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability to understand client-specific challenges and tailor solutions accordingly More ❯
response and playbook development Detection creation within SIEM tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability to understand client-specific challenges and tailor solutions accordingly More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. The successful candidate will join the Entrepreneurship, Innovation, and New Technology (EINT) research group, which conducts cutting More ❯
and kind communication with technical and non-technical stakeholders. Nice to haves: Knowledge of security architecture of non-EVM based blockchains. Deep understanding of cryptography such as zk-SNARKs, FHE and MPC. ID: G2686 Pay Transparency Notice: The target annual salary for this position can range as detailed below. Full More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
and civil operators, are based upon innovative use of radiocommunications, networks, and cybersecurity. We are groundbreaking new digital technologies such as 4G mobile communications, cryptography, cloud computing, and big data for use in physical protection systems and critical information systems. Together we offer fantastic opportunities for committed employees to learn More ❯
Ideal for veterans with operational support experience. Requirements: - Qualifying SIGINT tradecraft: Army 35N, 35P, 35Q, 35S, USMC 2621, USAF 1N2, US Navy IS with cryptology training - 4 years of SIGINT experience - TS/SCI with CI polygraph. We can initiate SF86 and Polygraph renewal requests - National level tasking and reporting More ❯
and project milestones. What You'll Bring Strong knowledge of electronic hardware Verification and Validation processes. Understanding of Security principles in Information Warfare, Networking, Cryptography, and System Vulnerability. Effective communicator with the confidence to lead technical interchange discussions. Proficient in product data management tools (e.g., Teamcenter, SharePoint, Confluence). Highly More ❯