Salaire moyen: $40 045 /annuel
Plus de statistiquesLes résultats de la recherche: 21 offres d'emploi
...inclusive and high-performing culture.
The Senior Manager will manage product, business controls and service delivery for the Cryptographic Operations Department, responsible for running a growing team whose focus will be on product, operations and project oversight of...
Suggéré
Emploi contractuel
Stage en entreprise
Horaires flexibles
...purpose driven winning team, committed to results, in an inclusive and high-performing culture.
Reporting to the Senior Manager of Cryptographic Platforms, the Senior Associate Security Engineer
will:
Provide support during the implementation from a technical...
Suggéré
Temps plein
Stage en entreprise
...testing Desirable:
• Experience with PKI infrastructure and X.509 certificates • General or specific knowledge of cryptography, cryptographic algorithms and protocols • Hands on experience with firewall policy configuration, IKE/IPSec VPN, SSL VPN, WiFi • Experience...
Suggéré
Temps plein
...support, troubleshooting and diagnostics in the area of network and data security products.
~ A basic understanding of encryption and cryptographic key management with experience using them to protect sensitive data in database, applications, storage systems, virtualized...
Suggéré
...Blockchain infrastructure that include:
Integrate new networks with our wallet custody by using their API to perform the required cryptographic operations.
Build custom monitoring to observe information from our infrastructure and report it to our observability stack....
Suggéré
Temps plein
Travail à distance
...be offered the opportunity to develop specialized skills through formal courses and on-the-job training in the following areas:
Cryptographic Equipment
Advanced Satellite Communications Systems
Line-of-Sight Microwave Communications Systems
Instructional...
Suggéré
Emploi permanent
Temps plein
Travail temporaire
Temps partiel
Stage en entreprise
Stage
Relocation
Extérieur
Équipe de nuit
Travail le week-end
...Computer Science, or another relevant field of study; and / or
equivalent experience.
• A basic understanding of encryption and cryptographic key management with experience using
them to protect sensitive data in database, applications, storage systems, virtualized...
Suggéré
Emploi permanent
Emploi contractuel
Zone locale
Recrutement immédiat
...exploitation de l'informatique en nuage.
Expérience des contrôles IAM (OAuth 2.0, OIDC, JWT).
Connaissance des contrôles de cryptographie (données au repos, en mouvement).
Lieu : Montréal ou Ville de Québec
"Victrix s'engage en faveur de l'inclusion et de la diversité...
Suggéré
Apprentissage
...and concurrency patterns.
- Demonstrated experience with Substrate framework and blockchain technology.
- Experience with basic cryptographic primitives (hashing, signing)
- Knowledge of blockchain architecture, consensus algorithms, and decentralized technologies....
Suggéré
Temps plein
Emploi contractuel
Travail à distance
...digital signatures, encryption, and key establishment), data loss prevention technologies, Key management systems
~ Experience with cryptographic libraries (e.g. OpenSSL, GMP)
~ Industry experience with distributed systems, massively parallel processing, optimization and...
Suggéré
Emploi contractuel
Recrutement immédiat
...classifiés et non classifiés
Réseau informatisé de traitement des messages
Systèmes de contrôle des radiocommunications
Matériel cryptographique et équipement de télécommunications par satellite servant aux échanges de données et d’images à haute vitesse
ENVIRONNEMENT DE...
Suggéré
Temps plein
Temps partiel
...telecommunication networks and protocols.
~Experience developing any of the following is a plus: Firewall, VPN, IDS/IPS, SDN.
~Knowledge of cryptographic protocols & standards.
~Experience in developing security, encryption and tunneling protocols.
~Experience with embedded Linux,...
Suggéré
Emploi permanent
Temps plein
...on experience in at least one of the following topics: cryptography, security protocols, data privacy methods, key management systems, data loss prevention technology, distributed IoT security, and AI Security
Experience with cryptographic libraries (e.g. OpenSSL, GMP)...
Suggéré
Emploi permanent
Temps plein
...tested code delivered in an agile manner.
Key technologies are Go, libp2p, protobuf, leveldb, and go-ethereum, as well as various cryptographic libraries.
Your role:
Development of the reference Swarm implementation in Go aka Bee
Developing domain-specific...
Suggéré
Travail à distance
Emploi contractuel
Horaires flexibles
...architecture planning design and related functions in the areas of public key infrastructure (PKI) security domain encryption solutions cryptographic services key management and related security technologies within the enterprise.
Working with business teams to understand and...
Suggéré
Emploi contractuel
Travail à distance
Pour les contractants
Stage en entreprise
...systèmes en matière de sécurité et des techniques de correction
Expérience en sécurité des applications, en sécurité logicielle, en cryptographie, en sécurité des réseaux ou en sécurité des systèmes
Connaissance du volet de la sécurité des technologies Web (ex. :...
Temps plein
Recrutement immédiat
Horaires flexibles
$65k par année
...in cryptography under the supervision of Prof. Michele Mosca. Expertise in cryptography is desired, particularly in the areas of cryptographic protocols, post-quantum cryptography, or implementation of cryptographic primitives.
The Institute for Quantum Computing (IQC) is...
Relocation
...et diffusion vidéo ( RTSP, MJPEG, H.264/H.265)
Expérience en sécurité et confidentialité des données (OWASP, authentification, cryptographie)
Expérience en programmation native (C/C++)
Voilà ce que nous offrons !
Régime de rémunération attrayant...
Temps plein
Apprentissage
Horaires flexibles
...public key cryptography (digital signatures, encryption, and key establishment).
Experience with kernel development is an asset.
Experience with cryptographic libraries (e.g. OpenSSL, GMP) is an asset.
Experience with machine learning and deep learning is an asset....
Emploi permanent
Temps plein
Recrutement immédiat
Le monde entier
...and add value to these conversations.
~ Excellent understanding and knowledge of Operating Systems (sys-internals), Networking, Cryptographic Concepts, Programming and Software Compilation, Software Vulnerabilities and Exploitation, Malware basic mechanics and processes,...
Temps plein
Recrutement immédiat