...semester 2020 and is led by Prof. Dr. Katerina Mitrokotsa. Our research interests are centered around information security and applied cryptography, with the larger goal of safeguarding communications and providing strong privacy guarantees. We are currently active in...
Empfohlen
Teilzeitarbeit
Im Frühling
Postdoc Stelle
Soforteinstellung
Flexible Arbeitszeit
...Your tasks
We are looking for an excellent, motivated, post-doctoral researcher to work in the area of information security and cryptography. The post-doctoral researcher will join Katerina Mitrokotsa's research group (Chair of Cyber Security), working in the area of...
Empfohlen
Teilzeitarbeit
Postdoc Stelle
Flexible Arbeitszeit
...Your tasks
We are looking for a bright and motivated PhD student to work in the topics of information security and cryptography. The student is expected to work on topics that include security and privacy issues in authentication. More precisely, the student will be...
Empfohlen
Teilzeitarbeit
Soforteinstellung
Flexible Arbeitszeit
...various technical Information Security topics such as system- and network security, risk management, identity and access management, cryptography, physical security
• Familiar with security standards, frameworks and best practices such as: ISO 27001, Cobit, NIST, etc …...
Empfohlen
Remote job
...concepts and hands on experience with databases (Oracle, PostgreSQL)
IT Security (authentication, authorization, CA SiteMinder, cryptography, certificate management)
a solid understanding of all phases of the Software Development Lifecycle (Agile, Kanban or Waterfall...
Empfohlen
Im Frühling
...Pre-doctoral position Quantum-safe Cryptography Based on Isogenies of Elliptic Curves and Abelian Varieties
Ref. 2024_008
The IBM Zürich Research Lab invites applications for a PhD position in the area of Quantum-Safe Cryptography. The position is fully funded...
Empfohlen
Flexible Arbeitszeit
...C#, Azure, SQL, Web, REST APIs and Microservices
ReactJS, TypeScript, HTML/CSS/JavaScript
Understanding of Blockchain and cryptography will be a plus
Good understanding of Design Patterns, SOLID code, and principles
You like to work in a team and as well independently...
Empfohlen
Vollzeit
Flexible Arbeitszeit
...workplace security EDR, XDR, hardening.
You have a mastery of cybersecurity solutions, methods and standards (firewall, antivirus, cryptography, ISO 27001, GDPR, NIST, OWASP, IEC62443).
You have an in-depth knowledge of security architectures and concepts (Cloud,...
Empfohlen
Weihnachten
Remote job
...signal processing, demodulation, protocol stacks
emitter localization, software defined radio, system security and cryptography
graphics and visualization
databases, web-technologies and distributed systems...
Empfohlen
...Rust including Tokio framework,
~ Demonstrated knowledge and experience with distributed systems,
~ Solid understanding of cryptography
~ Solid understanding of bytes manipulation
~ Nice to have knowledge of:
~ Docker,
~ Kubernetes,
~ gRPC and Protobuf,...
Empfohlen
Vollzeit
Remote job
...looking for an experienced Front End Engineer to support our growing community.
New to decentralized? Don’t know blockchain or cryptography? That’s okay! We have some of the world’s foremost experts and they’re excited to share their knowledge. You bring your awesome...
Empfohlen
Unternehmer
...another subject that is related to the nature of this role
Solid knowledge about crypto currencies, blockchain technologies, cryptography, cybersecurity, risk management, and adversarial thinking and willing to go further down the rabbit hole
Some experience with...
Empfohlen
Vollzeit
...Maintain the 24/7 operation of applications, ensuring they can handle ongoing blockchain operations effectively.
~Utilize your cryptography knowledge to ensure the security and integrity of blockchain interactions.
~Demonstrate flexibility and adaptability in handling...
Empfohlen
Vollzeit
Remote job
DFINITY is looking for a researcher specialized in applied cryptography for identity and credential management systems, with applications in the blockchain area. The role is to design and analyze practical protocols with provable guarantees, and to contribute to the design...
Empfohlen
Unternehmer
Postdoc Stelle
Flexible Arbeitszeit
...Threat Intelligence Analysis, Cloud Security Architecture, Network Security Protocols and Technologies, Secure DevOps Practices, Cryptography and Key Management, Secure Software Development Lifecycle (SDLC), Identity and Access Management (IAM) Solutions, Data Loss...
Empfohlen
Remote job
Flexible Arbeitszeit
Spätschicht
...techniques and incident management coordination - Intimate knowledge of web and security protocols (eg. TCP/IP, TLS), encryption and cryptography. - Familiar with data classification and protection concepts - Ability to multi-task, manage different projects in parallel...
Festanstellung
Nachtschicht