or similar object oriented language PREFERRED QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ - Experience applying threat modeling or other risk identification techniques or equivalent More ❯
expand new business. Familiarity with building or securing embedded devices, other digital systems, and embedded binary reverse engineering (ARM, RTOS, etc.) Familiarity with basic cryptography design and implementation concepts Previous experience in a client-facing technical role Security Clearance: Active US Security clearance of Top Secret level and ability to More ❯
computer, network, and processing systems. Oversee the administration of all computer security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software. Develop, track, and oversee the information security services annual operating and capital budgets for purchasing, staffing, and operations. Recommend and More ❯
XML, XSLT. Must have experience with software source control and configuration management tools. Must have experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). Must have experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with More ❯
XML, XSLT. Must have experience with software source control and configuration management tools. Must have experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). Must have experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with More ❯
limited to the following: Designs and implements information assurance and security engineering systems with requirements for program protection, supply chain risk management, operations security, cryptography, counterfeit protection, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis and security management), and industrial base compliance. More ❯
Information Assurance Services (Confidentiality, Integrity, Non-repudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.) • Review and provide input to program and contract work breakdown structure (WBS), work packages and More ❯
SANS ) Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2) Working knowledge of cryptography including encryption, signing and digital certificates Principles of securing mobile applications and web services Docker or Kubernetes and infrastructure as code Event driven streaming technologies More ❯
for Information Assurance Services (Confidentiality, Integrity, Nonrepudiation, and Availability); Basic information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords cryptography, discretionary access control, mandatory access control, hashing, key management, etc.) • Implement comprehensive SOA solutions • Implement operational. view, technical standards view, and system and service view More ❯
Information Assurance Services (Confidentiality, Integrity, Non repudiation, and Availability); Basic lnforrnation Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords cryptography, discretionary acces control, mandatory access control , hashing, key management, etc.) Implement comprehensive SOA solutions Implement operational view, technical standards view, and system and service view More ❯
desktop applications integrating various hardware (biometric devices) to high-performance server applications, including issuance of official documents in a very secure environment (PKI, encryption, cryptography) and an evolution into AWS. The Senior Service Delivery Manager ensures the quality of service provided respects the contractual, financial, and other committed customer and More ❯
the C&L Team include: Weapon system command & control (e.g., missile crew launch console and command data processing equipment, etc.) ICBM nuclear codes/cryptography (i.e., securing the nuclear launch codes and assuring confidentiality, integrity, and authenticity of the critical commands) ICBM targeting (i.e., weapon system processing of the strategic More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Newcastle University
join our consortium dedicated to the mission of restoring natural environments by engineering microbial machines. Working at the forefront of information & coding theory and cryptography together with molecular biologists and engineering biologists we will engineer microorganisms as devices to deliver environmental solutions that are cryptographically biosecured by design. Our goal More ❯
Anduril Industries is a defense technology company with a mission to transform U.S. and allied military capabilities with advanced technology. By bringing the expertise, technology, and business model of the 21st century's most innovative companies to the defense industry More ❯
and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science More ❯
and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science More ❯
and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science More ❯
and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science More ❯