Ashton-Under-Lyne, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
Java. Experience with scripting (e.g. python, PowerShell, bash). Experience of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email More ❯
performing threat modeling, configuring software and hardware test environments, guiding/monitoring internal and external test personnel, addressing technical questions around hardware implementations for cryptography, access, and threat mitigations. To succeed in this role, you will deliver on-time results based in your deep technical expertise that delight your customers. More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Leidos
the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; This is you: BS degree and More ❯
with DBA skills in PostgreSQL and MySQL, with expertise in securing, hardening, authentication, authorization, and auditing of databases. Proficiency in understanding authentication, authorization, and cryptography, with familiarity around modern security standards and best practices. Experience with Infrastructure-as-Code using Terraform. Experience deploying and operating infrastructure in at least one More ❯
networking (SDN) Must have and maintain a current/active Top Secret/SCI clearance. Desired Qualifications: Familiarity with emerging technologies like quantum-resistant cryptography, or advanced SD-WAN solutions. Scripting and automation skills (e.g., Python, PowerShell) to enhance network efficiency. Understanding of compliance standards (e.g., PCI-DSS, GDPR, HIPAA More ❯
SCI with Polygraph. PREFERRED QUALIFICATIONS - 2+ years of any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience - Experience with AWS products and services - Deep understanding of software development and deployment practices - feature branch management strategies, continuous More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
SKILLS AND EXPERIENCE CISSP, CISM, CCSP, CRISC or equivalent experience Good knowledge covering several of the following examples (this list is not exhaustive): AD, Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with More ❯
solution to all your blockchain/cryptocurrency needs. Role Description: Backend pro efficient in Node.js or Golang Blockchain expert (Solidity, Rust) Good knowledge of cryptography Must have solid understanding of hashing and encryption algorithms Efficient knowledge of SNARKs, proofs generation and verification Must be able to perform under pressure and More ❯
compliance efforts, ensuring alignment with industry standards and regulations. Requirements Proven experience in cybersecurity engineering or a related field. Strong understanding of network security, cryptography, and security frameworks. Experience with penetration testing, vulnerability management, and incident response. Familiarity with security tools such as SIEMs, IDS/IPS, firewalls, and endpoint More ❯
the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
Eligible for a Security Clearance MS degree in computer engineering, computer science or equivalent Experience with Remote Network Device Interface Specification (RNDIS) Experience with Cryptography tools such as OpenSSL Experience with Python scripting Global Comp $75,000 - $150,000 This represents the typical compensation range for this position based on More ❯
experience with IDS/IPS solutions, ACAS Scanning (Nessus), Trellix ePO, & Splunk are a plus. • A working knowledge or previous experience with encryption and cryptography is a plus. • Knowledge of previous hands-on experience supporting PKI and certificate-based authentication, Zero-Trust architectures, and multi-factor authentication is a plus. More ❯
world-leading encryption solutions to secure data and communications for enterprises, governments, defence, and critical national infrastructure (CNI). Powered by advanced symmetric key cryptography, the Arqit SKA-Platform offers scalable dynamic encryption that meets modern industry standards and is resilient to future threats, such as those posed by quantum More ❯
AWS, Azure, Google) These Qualifications Would be Nice to Have: Experience with relational, noSQL, and file-based storage products Experience with Java Security and Cryptology (PKI Certificates) Understanding of Amazon Web Services (AWS) Experience with software configuration management processes and tools Knowledge of Intelligence Community (IC) processes, policies and guidance More ❯
the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
and curriculum Delivery Course Instruction: Teach undergraduate or graduate-level cybersecurity courses, including topics such as network security, ethical hacking, digital forensics, risk management, cryptography, and incident response using blended learning techniques to include reverse learning objectives. Curriculum Development: Produce capstones, design and update course materials, including syllabi, lecture notes More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
WOOD Consulting Services, Inc
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. • Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). • Experience developing on Windows, and/or Linux operating systems. • Must have documented professional experience with web services. More ❯
XML, XSLT Must have experience with software source control and configuration management tools Must have experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Must have experience developing on Windows, and/or Linux operating systems Must have documented professional experience with web More ❯
or component definitions under development, serving as a common reference point for developers. Develop derived requirements for Information Assurance Services, including security mechanisms like cryptography and access control. Qualifications: A Bachelor's degree in System Engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related discipline from an accredited More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Wood Consulting Services, Inc
XML, XSLT. Must have experience with software source control and configuration management tools. Must have experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). Must have experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with More ❯