world-leading encryption solutions to secure data and communications for enterprises, governments, defence, and critical national infrastructure (CNI). Powered by advanced symmetric key cryptography, the Arqit SKA-Platform offers scalable dynamic encryption that meets modern industry standards and is resilient to future threats, such as those posed by quantum More ❯
cybersecurity threats and risks they face. Broad cybersecurity experience with a combination of technology involvement, business knowledge and risk awareness (incl. on topics like cryptography, network design, application security, data protection, identity and access management, cloud security). Ability to analyse complex problems and to deliver insightful, practical and sustainable More ❯
knowledge in Simulation and Modelling using Matlab and SysML/CAMEO. Knowledge of system architecture development. Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities. Strong interpersonal skills with the ability to steer technical interchange discussions. Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯
knowledge in Simulation and Modelling using Matlab and SysML/CAMEO. Knowledge of system architecture development. Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities. Strong interpersonal skills with the ability to steer technical interchange discussions. Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯
of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services particularly: VPC IAM Security Group Management EBS Outposts Amazon is an equal opportunities More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
leonardo company
detailed FPGA/Firmware requirements and architecture from system requirements. A structured approach to FPGA/firmware design (RTCA DO-254 or similar). Cryptography and anti-tamper techniques. Artificial Intelligence including machine learning and genetic algorithms. Electronics test methods and equipment. Good verbal and written communication skills. Working in More ❯
the leaders in the secure financial transactions space. Qualifications What will make you successful Technical skills & knowledge: Broad knowledge of cyber security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience More ❯
PowerPoint, Excel). Strong stakeholder engagement and communication skills. Desirable: CISSP, CISM, CompTIA Security+, or a recognised Vendor Certification. If you are passionate about cryptography and PKI, and you're ready to take the next step in your career, we would love to hear from you. More ❯
knowledge in Simulation and Modelling using Matlab and SysML/CAMEO Knowledge of system architecture development Understanding of security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Experience in Product Data Management using Teamcenter/SharePoint/Confluence More ❯
or similar object oriented language PREFERRED QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ - Experience applying threat modeling or other risk identification techniques or equivalent More ❯
SANS ) Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2) Working knowledge of cryptography including encryption, signing and digital certificates Principles of securing mobile applications and web services Docker or Kubernetes and infrastructure as code Event driven streaming technologies More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Newcastle University
join our consortium dedicated to the mission of restoring natural environments by engineering microbial machines. Working at the forefront of information & coding theory and cryptography together with molecular biologists and engineering biologists we will engineer microorganisms as devices to deliver environmental solutions that are cryptographically biosecured by design. Our goal More ❯
and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science More ❯
and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science More ❯
and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science More ❯
and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science More ❯
of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols. PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services particularly: VPC IAM Security Group Management EBS Outposts Amazon is an equal opportunities More ❯
response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of More ❯
response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of More ❯
QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
QUALIFICATIONS - Experience with AWS products and services - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
SC Clearance for UK-caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯
SC Clearance for UK-caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯