Because You Deserve More Than Just a Job As a Digital Network Exploitation Analyst, you will: evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans. analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid … relevance, and areas of expertise. apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights distill, document, contextualize and share your findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. You'll Bring These … Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, datastructures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs More ❯
comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is … to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Level 3 Digital Network Exploitation Analyst shall possess the … Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, datastructures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs More ❯
comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is … to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Level 2 Digital Network Exploitation Analyst shall possess the … Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, datastructures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs More ❯
comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is … to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Level 4 Digital Network Exploitation Analyst shall possess the … Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, datastructures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs More ❯
Your Profile: Minimum of one year experience developing in Rust; will be tested. Familiarity with core trading strategies (e.g., market-making, arbitrage, execution). Strong understanding of algorithms and datastructures, as well as quant finance concepts: limit-order books, market microstructure, pricing. Experience with real-time data processing, IPC/shared-memory architectures, and low-allocation … the UK? Select By submitting your application, you confirm that you have read and understood GSR's Privacy Notice for Candidates and consent to the processing of your personal data in accordance with GDPR and applicable data protection laws. Select GSR is proudly an Equal Employment Opportunity employer. We do not discriminate based upon any applicable legally protected More ❯
Sheffield, Yorkshire, United Kingdom Hybrid / WFH Options
Pendo
at least one web application framework (eg React, Vue, Angular, Svelte) Experience with state management patterns and libraries (eg Pinia, Vuex, Redux) Strong foundation in software engineering principles, including datastructures, algorithms, and software design Solid understanding of web application architecture, including APIs, HTTP requests, databases, caching, and related concepts Used testing frameworks such as Jest to write … as Cypress or Playwright for test automation Preferred Qualifications Bachelor's or Master's degree in Computer Science or related technical field Experience manipulating and displaying large quantities of data, with an emphasis on frontend performance Experience working with components that consume live data Familiarity with build tools, CI/CD and development workflows Experience working with an More ❯
comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is … to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities … Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, datastructures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs More ❯
comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is … to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities … Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, datastructures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs More ❯
comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is … to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities … Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, datastructures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs More ❯
comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is … to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities … Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, datastructures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs More ❯
design of artificial hearts, reducing CO 2 emissions from aircraft and road vehicles, or increasing the performance of wind turbines. The Role PhysicsX is developing a platform used by Data Scientists and Simulation Engineers to build, train and deploy Deep Physics Models. The core of this platform is powered by several Machine Learning Python Libraries handling everything from data … maintaining widely-used internal or open-source libraries. Familiarity with the machine learning development lifecycle and core concepts (e.g., bias-variance tradeoff, common optimizers). Familiarity with 3D geometric datastructures and algorithms. What we offer Equity options - share in our success and growth. 10% employer pension contribution - invest in your future. Free office lunches - great food to More ❯
comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is … to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities … Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, datastructures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs More ❯
comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is … to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities … Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, datastructures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs More ❯
comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is … to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities … Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, datastructures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs More ❯
or equivalent practical experience. 1 year of experience with software development in one or more programming languages (e.g., Python, C, C++, Java, JavaScript). 1 year of experience with datastructures or algorithms. 1 year of experience with full stack development, across back-end such as Java, Python, GO, or C++ codebases, and front-end experience including JavaScript … and extend well beyond web search. We're looking for engineers who bring fresh ideas from all areas, including information retrieval, distributed computing, large-scale system design, networking and data storage, security, artificial intelligence, natural language processing, UI design and mobile; the list goes on and is growing every day. As a software engineer, you will work on a More ❯
that were submitted to Requests # 14962, & 17082. REQUIRED EXPERIENCE AREAS: Please ensure that candidate has strength in the following areas: Object Oriented-principles, C++, complex problem solving using datastructures and algorithms, and deep understanding of Real-Time Operating System concepts in embedded system. Please do not submit candidates that have marginal exposure to C++ and have More ❯
Sheffield, Yorkshire, United Kingdom Hybrid / WFH Options
Pendo
at least one web application framework (eg React, Vue, Angular, Svelte) Experience with state management patterns and libraries (eg Pinia, Vuex, Redux) Strong foundation in software engineering principles, including datastructures, algorithms, and software design Solid understanding of web application architecture, including APIs, HTTP requests, databases, caching, and related concepts Preferred Qualifications Bachelor's or Master's degree … in Computer Science or related technical field Experience manipulating and displaying large quantities of data, with an emphasis on frontend performance Experience working with components that consume live data Familiarity with build tools, CI/CD and development workflows Experience working with an internally developed component library EEOC We are an equal opportunity employer and believe having diverse More ❯
development. Experience with test automation, test coverage, Swift and Objective-C. Preferred qualifications: Master's degree in Computer Science or a related technical field. 1 year of experience with datastructures or algorithms. Experience designing, testing, delivering, and monitoring scalable high-availability software in a cloud computing environment. Experience working on highly scalable, database-backed, distributed systems and … and extend well beyond web search. We're looking for engineers who bring fresh ideas from all areas, including information retrieval, distributed computing, large-scale system design, networking and data storage, security, artificial intelligence, natural language processing, UI design and mobile; the list goes on and is growing every day. As a software engineer, you will work on a More ❯
end experience including JavaScript or TypeScript, HTML, CSS or equivalent. Preferred qualifications: Master's degree or PhD in Computer Science or related technical fields. 2 years of experience with datastructures or algorithms. Experience developing accessible technologies. About the job Google's software engineers develop the next-generation technologies that change how billions of users connect, explore, and … and extend well beyond web search. We're looking for engineers who bring fresh ideas from all areas, including information retrieval, distributed computing, large-scale system design, networking and data storage, security, artificial intelligence, natural language processing, UI design and mobile; the list goes on and is growing every day. As a software engineer, you will work on a More ❯
Your Profile: Minimum of one year experience developing in Rust; will be tested. Familiarity with core trading strategies (e.g., market-making, arbitrage, execution). Strong understanding of algorithms and datastructures, as well as quant finance concepts: limit-order books, market microstructure, pricing. Experience with real-time data processing, IPC/shared-memory architectures, and low-allocation More ❯
highly reliable, performant, and observable, establishing and monitoring SLOs to guarantee platform stability for all customers, internal and external. Own the end-to-end lifecycle of our core Account data products, both synchronous and asynchronous, ensuring they are well-designed, documented, and meet the needs of our internal product, engineering, Sales and Customer Success teams. Collaborate closely with Security … Legal, and Product stakeholders to ensure we are responsibly managing customer account data and PII in line with our privacy and compliance (eg: GDPR) requirements. Act as a technical leader and mentor within the team, guiding design decisions and elevating the engineering practices of those around you. You have: Strong commercial experience building backend services and APIs in (preferably … major cloud platforms (eg: AWS). Experience with CI/CD pipelines and infrastructure-as-code (e.g., Buildkite, Terraform, CloudFormation). A deep understanding of software engineering fundamentals, including datastructures, algorithms, and system design. Also desirable: Familiarity with API Gateways (e.g., KrakenD) and Identity/Authentication protocols (e.g., OAuth2). Hands on Experience with distributed architecture/ More ❯
Partner success, and act as the voice of the partner internally to advocate for partner needs and product feedback. This role is ideal for you if you're entrepreneurial, data-driven, and relationship-first. You understand that great partnerships don't just drive revenue - they unlock new capabilities and customer value. You thrive at the intersection of strategy and … working with cloud hyperscalers (AWS, Azure, GCP) or consulting/SI ecosystems. Prior exposure to RevOps tools like Hubspot, Salesforce or PRM systems Good understanding of software development principles, datastructures, and algorithms. Excellent problem-solving skills, attention to detail, and a strong capacity for logical thinking. The ability to work collaboratively in an extremely fast-paced, startup More ❯
Python, Go, Java, or TypeScript • Experience building backend systems, APIs, or full-stack applications • Familiarity with cloud services (e.g., AWS) and containerization tools (e.g., Docker, Kubernetes) • Strong understanding of datastructures, algorithms, and system design • A passion for learning and a willingness to dive deep into technical challenges What We Offer • Compensation: We offer flexible packages that focus More ❯
Stevenage, Hertfordshire, South East, United Kingdom
Guidant Global
TypeScript, HTML, CSS, C# Experience with Svelte, Angular, Vue.js, React, .NET 7/8 Hands-on with Docker, Kubernetes, GitLab, Node.js, CI/CD pipelines Solid understanding of OOP, datastructures, and design patterns Agile mindset, problem-solving skills, and a passion for clean, user-friendly design Great communicator and team player Desirable Skills: C++ experience Linux sysadmin More ❯
Employment Type: Contract
Rate: Up to £67 per hour PAYE and Umbrella pay option available
Sheffield, Yorkshire, United Kingdom Hybrid / WFH Options
The Curve
Experience in software testing, including unit and integration tests. Experience in web development with modern frontend frameworks like React, Vue, or Angular. Strong debugging and troubleshooting skills. Understanding of datastructures and design patterns. Comfortable working in a command line environment. Familiarity with continuous integration and deployment. Experience with cloud providers such as AWS, Azure, or Google Cloud. More ❯