- UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cryptography, Kubernetes Security, Web Security, Governance, Privacy, Trust, Safety, Authentication, Identity Management, Access Control, Key Management, Inter-Service Authentication, Secure Application Frameworks, Detection & Response.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
FalconX is hiring a Senior Software Engineer in Applied Cryptography to help introduce a new, in-demand product line for the company that integrates seamlessly with our proprietary, best-in-class Prime Brokerage platform.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for an experienced Software Engineer with a strong understanding of the latest in cryptography and blockchain technologies to build upon our vision of an open financial system.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Act asprogram, product and projectmanager for high impact security related projects to assurecross-functional engagement, timelines are aligned, and deadlines are managed appropriately. Experience working with security governance, risk & compliance programs and projects.
$185,800 - $255,475 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with secure software development, data protection, cryptography, key management, network security (VPNs, FWs, WAF) within cloud environments. Ensure security solutions comply with relevant regulatory requirements (e.g., GDPR, HIPAA, PCI DSS) and industry standards (e.g., NIST, ISO/IEC.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Master’s degree in advanced computer science or relevant field, Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), Offensive Security Certified Professional (OSCP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Senior ServiceNow Security Engineer will play a critical role in leading Hybrid Agile development projects within a Software Development and Support program using ServiceNow’s Enterprise Service Management (ESM) platform for a federal agency.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
RS21 is actively seeking a Senior Cyber Engineer to strengthen our embedded support team within the Cyber Security Engineering division of our Federal partners. Proficient in managing Encryption and Key management servers, implementing tokenization methods, and overseeing Hardware Security Module (HSM) installation and management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of Identity and Access Management (IAM), Cryptography / Key Management, Access Controls and Security Protocols, secrets modernization, secrets management e.g., Multi-factor, SAML, OAuth, OIDC etc.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Infrastructure security, including windows, Unix/Linux, desktop/laptop, and mobile security, hands-on experience in packet capturing and analyzing log, as well as knowledge on cryptography and PKI. Compliance frameworks and requirements such as PCI, HIPAA, HITECH, SOX etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in at least one security domain such as Incident Response, Application Security, Infrastructure Security, Endpoint Security and Response, Detection Engineering, Network Security, Cloud Security, Cryptography, IAM, or Red/Blue or Purple Teams.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Seeking qualified candidates for the role of Cyber Security Subject Matter Expert to support of the United States Air Force Command and Control (C2) Security Control Assessor (SCA). Provide ATO recommendations to Security Control Assessor (SCA) and Authorizing Official (AO.
ExpandApply NowActive JobUpdated Today
cryptography job Title: product security engineer Company: Crowdstrike
FEATURED BLOG POSTS
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.
How to Answer the Interview Question: What is Your Communication Style?
As a job searcher, you probably have so many questions about job searching. However, once you've landed an interview, your excitement takes your questions to a whole new level. What will you wear? Will you know how to answer all the questions? Have you practiced giving nice firm handshakes?