HEAD OF SYSTEMS INTEGRATION- AEROSPACE AND DEFENSE: Bullisher is a data centric fintech Solution provider in the aerospace and defense industry for institutional level investors, looking to disrupt and revolutionise a $3 trillion dollar industry. We spearhead an industrial-leading Blackbox to facilitate and administer trade agreements pioneered by a vehicle, driven by our new generation benchmark delivering solutions through innovation with uncompromising agility. Predicts trends in the aerospace and government defense entities, predicts trends in political shifts and the ability to influence actual effect changes in government policies through innovation. JOB DESCRIPTION: The oversight requires you to tune into in-depth quality of data aggregation techniques from Time aggregation, spatial aggregation, to integrate mathematical operations on datasets by utilising real-time information systems, to process bench's of workloads in a centralized way-With the explosion of end point devices the volume of data analytics, machine learning and automation- A designed architecture to transport massive datasets into intelligent data insights to central location for processing to control real world infrastructures using complex networks in the internet of military things IOMT.(Areas to cover will include): edge computing, infrastructure and data intelligence that effects provision of dialogical correctness, operability in the required type of data generation and processing by utilization of local network infrastructure to support timely solutions Centralized servers. Areas to cover will include: (scenario's dependent upon protocol's status). Splitting data algorithms and sharing between network data centers and computing power to provide strong authentication techniques, ensure confidentiality, integrity and consistency of shared data in ML METHODS. MANDATE TO IMPROVE: Graph partitioning algorithms, Data intelligence at the edge, edge data privacy, edge computing architecture and infrastructure on the edge. Where matters require attention will include: (Impose deadlines on real-time information systems producing control responses, a specialised intelligent devices, which are not designed to perform any task-This specialised computing device is intelligent and response to a particular needs in a specific task). Task using bandwidth for each device this device can communicate internally and documize on the computing power available in the indoor network by executing task on the edge layer: Ensure our processes adheres to standards for secure systems design in conformity to the NIST SP 800-160. We are a startup enhancing the formation of early stages of a product development project. Areas to cover will include: Data validation, code validation, data consistency, structured data. As a newly created role you'll implement the processof the Elven category transmitting it easily and trackable according to its type and sensitivity. Areas to cover will include: content-based classification, context-based classification, user-based classification. (recommend a best practices the risk associated with the type of data and sensitivity and how data is stored and the way it's sent) will undergo a formal approval, review and voted by representatives for Security impact analysis, THE C.A.B.(CHANGEAPPROVAL BOARD).E.g CEO, CTO, CIO, V.P SOFTWARE ENGINEERING AND ADVANCED ANALYTICS, V.P DATA PROCESSING AND GOVERNANCE, GENERAL COUNSEL, EXECUTIVE DIRECTOR COMPLIANCE, PRIVACY AND DATA PROTECTION OFFICER, OPEN SOURCE LICENSING EXPERT, AND SENIOR NETWORK AND CYBERSECURITY INFRASTRUCTURE ENGINEERS. MANDATE TO IMPROVE: ABOUT US- Our common practice is to separate data in systems in three different levels of risk. E.g low risk, Moderate risk, high risk. Anything remotely or sensitive or crucial to operational security will be incorporated to the high risk category- Pieces of data that extremely have to recover if lost, all confidential sensitive and necessary data falls in the high risk category. Areas to cover will include : Create and label data classification metrics as functional mirror for risk management, compliance teams, and Security teams. AREAS TO IMPROVE-(ESTABLISH A ADMINISTRATIVE LIFE CYCLE HIERARCHIC CRYPTOGRAPHIC KEY PROTOCOL BASED SCHEME): Embed HSM and secure zone for key generation, This will ensure sensitive operational support and other related operations after using protocols and technologies for proven security. Areas where matters requires attention will include: key encryption, verifiable secret splitting and sharing key distribution, key storage and backup, Identitymanagement, access control, key management at the edge-Generating, using, storing, archiving, deleting, and protection of the encryption keys at the edge. INCIDENTS RESPONSE- (Establish a incident reporting lines and Disaster recovery plans in conformity defined by DFARS 7012 requirements) Defense Federal Acquisition Regulation E.g Conduct annual incident response exercises, (Strongly recommended to report the amount of information protected by a given key, amount of exposure if a single key is compromised, time available for a one to penetrate physical procedural and logical access, period with indent information maybe compromised by In advice time's disclosure, time available for computational intensive penalitics texts). ENVIRONMENT: This position will operate in the following areas of the organization regulatory engineering division MULTIDOMAIN DEFENCE DOCK: MULTIDOMAIN DEFENCE DOCK" Standard engineering lab environment " Employees must be legally authorised to work in the UK. Verification of employment eligibility will be required at the time of hire. Visa sponsorship is not available for this position. QUALIFICATION, KEY REQUIREMENTS AND SKILLS SET: PHD in Mathematical cryptography is essential. 10yrs+ In-depth working knowledge in Cognitive systems modelings and AI A strong programming skills in C++ and Rust INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST: STAGE3: PRE-SCREENING (verification-checks & security clearance) STAGE4: INTERVIEW WITH THE: CEO, CTO & GC
Mar 25, 2024
Full time
HEAD OF SYSTEMS INTEGRATION- AEROSPACE AND DEFENSE: Bullisher is a data centric fintech Solution provider in the aerospace and defense industry for institutional level investors, looking to disrupt and revolutionise a $3 trillion dollar industry. We spearhead an industrial-leading Blackbox to facilitate and administer trade agreements pioneered by a vehicle, driven by our new generation benchmark delivering solutions through innovation with uncompromising agility. Predicts trends in the aerospace and government defense entities, predicts trends in political shifts and the ability to influence actual effect changes in government policies through innovation. JOB DESCRIPTION: The oversight requires you to tune into in-depth quality of data aggregation techniques from Time aggregation, spatial aggregation, to integrate mathematical operations on datasets by utilising real-time information systems, to process bench's of workloads in a centralized way-With the explosion of end point devices the volume of data analytics, machine learning and automation- A designed architecture to transport massive datasets into intelligent data insights to central location for processing to control real world infrastructures using complex networks in the internet of military things IOMT.(Areas to cover will include): edge computing, infrastructure and data intelligence that effects provision of dialogical correctness, operability in the required type of data generation and processing by utilization of local network infrastructure to support timely solutions Centralized servers. Areas to cover will include: (scenario's dependent upon protocol's status). Splitting data algorithms and sharing between network data centers and computing power to provide strong authentication techniques, ensure confidentiality, integrity and consistency of shared data in ML METHODS. MANDATE TO IMPROVE: Graph partitioning algorithms, Data intelligence at the edge, edge data privacy, edge computing architecture and infrastructure on the edge. Where matters require attention will include: (Impose deadlines on real-time information systems producing control responses, a specialised intelligent devices, which are not designed to perform any task-This specialised computing device is intelligent and response to a particular needs in a specific task). Task using bandwidth for each device this device can communicate internally and documize on the computing power available in the indoor network by executing task on the edge layer: Ensure our processes adheres to standards for secure systems design in conformity to the NIST SP 800-160. We are a startup enhancing the formation of early stages of a product development project. Areas to cover will include: Data validation, code validation, data consistency, structured data. As a newly created role you'll implement the processof the Elven category transmitting it easily and trackable according to its type and sensitivity. Areas to cover will include: content-based classification, context-based classification, user-based classification. (recommend a best practices the risk associated with the type of data and sensitivity and how data is stored and the way it's sent) will undergo a formal approval, review and voted by representatives for Security impact analysis, THE C.A.B.(CHANGEAPPROVAL BOARD).E.g CEO, CTO, CIO, V.P SOFTWARE ENGINEERING AND ADVANCED ANALYTICS, V.P DATA PROCESSING AND GOVERNANCE, GENERAL COUNSEL, EXECUTIVE DIRECTOR COMPLIANCE, PRIVACY AND DATA PROTECTION OFFICER, OPEN SOURCE LICENSING EXPERT, AND SENIOR NETWORK AND CYBERSECURITY INFRASTRUCTURE ENGINEERS. MANDATE TO IMPROVE: ABOUT US- Our common practice is to separate data in systems in three different levels of risk. E.g low risk, Moderate risk, high risk. Anything remotely or sensitive or crucial to operational security will be incorporated to the high risk category- Pieces of data that extremely have to recover if lost, all confidential sensitive and necessary data falls in the high risk category. Areas to cover will include : Create and label data classification metrics as functional mirror for risk management, compliance teams, and Security teams. AREAS TO IMPROVE-(ESTABLISH A ADMINISTRATIVE LIFE CYCLE HIERARCHIC CRYPTOGRAPHIC KEY PROTOCOL BASED SCHEME): Embed HSM and secure zone for key generation, This will ensure sensitive operational support and other related operations after using protocols and technologies for proven security. Areas where matters requires attention will include: key encryption, verifiable secret splitting and sharing key distribution, key storage and backup, Identitymanagement, access control, key management at the edge-Generating, using, storing, archiving, deleting, and protection of the encryption keys at the edge. INCIDENTS RESPONSE- (Establish a incident reporting lines and Disaster recovery plans in conformity defined by DFARS 7012 requirements) Defense Federal Acquisition Regulation E.g Conduct annual incident response exercises, (Strongly recommended to report the amount of information protected by a given key, amount of exposure if a single key is compromised, time available for a one to penetrate physical procedural and logical access, period with indent information maybe compromised by In advice time's disclosure, time available for computational intensive penalitics texts). ENVIRONMENT: This position will operate in the following areas of the organization regulatory engineering division MULTIDOMAIN DEFENCE DOCK: MULTIDOMAIN DEFENCE DOCK" Standard engineering lab environment " Employees must be legally authorised to work in the UK. Verification of employment eligibility will be required at the time of hire. Visa sponsorship is not available for this position. QUALIFICATION, KEY REQUIREMENTS AND SKILLS SET: PHD in Mathematical cryptography is essential. 10yrs+ In-depth working knowledge in Cognitive systems modelings and AI A strong programming skills in C++ and Rust INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST: STAGE3: PRE-SCREENING (verification-checks & security clearance) STAGE4: INTERVIEW WITH THE: CEO, CTO & GC
HEAD OF SYSTEMS INTEGRATION- AEROSPACE AND DEFENSE: Bullisher is a data centric fintech Solution provider in the aerospace and defense industry for institutional level investors, looking to disrupt and revolutionise a $3 trillion dollar industry. We spearhead an industrial-leading Blackbox to facilitate and administer trade agreements pioneered by a vehicle, driven by our new generation benchmark delivering solutions through innovation with uncompromising agility. Predicts trends in the aerospace and government defense entities, predicts trends in political shifts and the ability to influence actual effect changes in government policies through innovation. JOB DESCRIPTION: The oversight requires you to tune into in-depth quality of data aggregation techniques from Time aggregation, spatial aggregation, to integrate mathematical operations on datasets by utilising real-time information systems, to process bench's of workloads in a centralized way-With the explosion of end point devices the volume of data analytics, machine learning and automation- A designed architecture to transport massive datasets into intelligent data insights to central location for processing to control real world infrastructures using complex networks in the internet of military things IOMT.(Areas to cover will include): edge computing, infrastructure and data intelligence that effects provision of dialogical correctness, operability in the required type of data generation and processing by utilization of local network infrastructure to support timely solutions Centralized servers. Areas to cover will include: (scenario's dependent upon protocol's status). Splitting data algorithms and sharing between network data centers and computing power to provide strong authentication techniques, ensure confidentiality, integrity and consistency of shared data in ML METHODS. MANDATE TO IMPROVE: Graph partitioning algorithms, Data intelligence at the edge, edge data privacy, edge computing architecture and infrastructure on the edge. Where matters require attention will include: (Impose deadlines on real-time information systems producing control responses, a specialised intelligent devices, which are not designed to perform any task-This specialised computing device is intelligent and response to a particular needs in a specific task). Task using bandwidth for each device this device can communicate internally and documize on the computing power available in the indoor network by executing task on the edge layer: Ensure our processes adheres to standards for secure systems design in conformity to the NIST SP 800-160. We are a startup enhancing the formation of early stages of a product development project. Areas to cover will include: Data validation, code validation, data consistency, structured data. As a newly created role you'll implement the processof the Elven category transmitting it easily and trackable according to its type and sensitivity. Areas to cover will include: content-based classification, context-based classification, user-based classification. (recommend a best practices the risk associated with the type of data and sensitivity and how data is stored and the way it's sent) will undergo a formal approval, review and voted by representatives for Security impact analysis, THE C.A.B.(CHANGEAPPROVAL BOARD).E.g CEO, CTO, CIO, V.P SOFTWARE ENGINEERING AND ADVANCED ANALYTICS, V.P DATA PROCESSING AND GOVERNANCE, GENERAL COUNSEL, EXECUTIVE DIRECTOR COMPLIANCE, PRIVACY AND DATA PROTECTION OFFICER, OPEN SOURCE LICENSING EXPERT, AND SENIOR NETWORK AND CYBERSECURITY INFRASTRUCTURE ENGINEERS. MANDATE TO IMPROVE: ABOUT US- Our common practice is to separate data in systems in three different levels of risk. E.g low risk, Moderate risk, high risk. Anything remotely or sensitive or crucial to operational security will be incorporated to the high risk category- Pieces of data that extremely have to recover if lost, all confidential sensitive and necessary data falls in the high risk category. Areas to cover will include : Create and label data classification metrics as functional mirror for risk management, compliance, and Security teams. AREAS TO IMPROVE-(ESTABLISH A ADMINISTRATIVE LIFE CYCLE HIERARCHIC CRYPTOGRAPHIC KEY PROTOCOL BASED SCHEME): Embed HSM and secure zone for key generation, This will ensure sensitive operational support and other related operations after using protocols and technologies for proven security. Areas where matters requires attention will include: key encryption, verifiable secret splitting and sharing key distribution, key storage and backup, Identitymanagement, access control, key management at the edge-Generating, using, storing, archiving, deleting, and protection of the encryption keys at the edge. INCIDENTS RESPONSE- (Establish a incident reporting lines and Disaster recovery plans in conformity defined by DFARS 7012 requirements) Defense Federal Acquisition Regulation E.g Conduct annual incident response exercises, (Strongly recommended to report the amount of information protected by a given key, amount of exposure if a single key is compromised, time available for a one to penetrate physical procedural and logical access, period with indent information maybe compromised by In advice time's disclosure). ENVIRONMENT: This position will operate in the following areas of the organization regulatory engineering division MULTIDOMAIN DEFENCE DOCK: MULTIDOMAIN DEFENCE DOCK" Standard engineering lab environment " Employees must be legally authorised to work in the UK. Verification of employment eligibility will be required at the time of hire. Visa sponsorship is not available for this position. QUALIFICATION, KEY REQUIREMENTS AND SKILLS SET: PHD in Mathematical cryptography is essential. 10yrs+ In-depth working knowledge in Cognitive systems modelings and AI A strong programming skills in C++ and Rust INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST: STAGE3: PRE-SCREENING (verification-checks & security clearance) STAGE4: INTERVIEW WITH THE: CEO, CTO & GC
Mar 25, 2024
Full time
HEAD OF SYSTEMS INTEGRATION- AEROSPACE AND DEFENSE: Bullisher is a data centric fintech Solution provider in the aerospace and defense industry for institutional level investors, looking to disrupt and revolutionise a $3 trillion dollar industry. We spearhead an industrial-leading Blackbox to facilitate and administer trade agreements pioneered by a vehicle, driven by our new generation benchmark delivering solutions through innovation with uncompromising agility. Predicts trends in the aerospace and government defense entities, predicts trends in political shifts and the ability to influence actual effect changes in government policies through innovation. JOB DESCRIPTION: The oversight requires you to tune into in-depth quality of data aggregation techniques from Time aggregation, spatial aggregation, to integrate mathematical operations on datasets by utilising real-time information systems, to process bench's of workloads in a centralized way-With the explosion of end point devices the volume of data analytics, machine learning and automation- A designed architecture to transport massive datasets into intelligent data insights to central location for processing to control real world infrastructures using complex networks in the internet of military things IOMT.(Areas to cover will include): edge computing, infrastructure and data intelligence that effects provision of dialogical correctness, operability in the required type of data generation and processing by utilization of local network infrastructure to support timely solutions Centralized servers. Areas to cover will include: (scenario's dependent upon protocol's status). Splitting data algorithms and sharing between network data centers and computing power to provide strong authentication techniques, ensure confidentiality, integrity and consistency of shared data in ML METHODS. MANDATE TO IMPROVE: Graph partitioning algorithms, Data intelligence at the edge, edge data privacy, edge computing architecture and infrastructure on the edge. Where matters require attention will include: (Impose deadlines on real-time information systems producing control responses, a specialised intelligent devices, which are not designed to perform any task-This specialised computing device is intelligent and response to a particular needs in a specific task). Task using bandwidth for each device this device can communicate internally and documize on the computing power available in the indoor network by executing task on the edge layer: Ensure our processes adheres to standards for secure systems design in conformity to the NIST SP 800-160. We are a startup enhancing the formation of early stages of a product development project. Areas to cover will include: Data validation, code validation, data consistency, structured data. As a newly created role you'll implement the processof the Elven category transmitting it easily and trackable according to its type and sensitivity. Areas to cover will include: content-based classification, context-based classification, user-based classification. (recommend a best practices the risk associated with the type of data and sensitivity and how data is stored and the way it's sent) will undergo a formal approval, review and voted by representatives for Security impact analysis, THE C.A.B.(CHANGEAPPROVAL BOARD).E.g CEO, CTO, CIO, V.P SOFTWARE ENGINEERING AND ADVANCED ANALYTICS, V.P DATA PROCESSING AND GOVERNANCE, GENERAL COUNSEL, EXECUTIVE DIRECTOR COMPLIANCE, PRIVACY AND DATA PROTECTION OFFICER, OPEN SOURCE LICENSING EXPERT, AND SENIOR NETWORK AND CYBERSECURITY INFRASTRUCTURE ENGINEERS. MANDATE TO IMPROVE: ABOUT US- Our common practice is to separate data in systems in three different levels of risk. E.g low risk, Moderate risk, high risk. Anything remotely or sensitive or crucial to operational security will be incorporated to the high risk category- Pieces of data that extremely have to recover if lost, all confidential sensitive and necessary data falls in the high risk category. Areas to cover will include : Create and label data classification metrics as functional mirror for risk management, compliance, and Security teams. AREAS TO IMPROVE-(ESTABLISH A ADMINISTRATIVE LIFE CYCLE HIERARCHIC CRYPTOGRAPHIC KEY PROTOCOL BASED SCHEME): Embed HSM and secure zone for key generation, This will ensure sensitive operational support and other related operations after using protocols and technologies for proven security. Areas where matters requires attention will include: key encryption, verifiable secret splitting and sharing key distribution, key storage and backup, Identitymanagement, access control, key management at the edge-Generating, using, storing, archiving, deleting, and protection of the encryption keys at the edge. INCIDENTS RESPONSE- (Establish a incident reporting lines and Disaster recovery plans in conformity defined by DFARS 7012 requirements) Defense Federal Acquisition Regulation E.g Conduct annual incident response exercises, (Strongly recommended to report the amount of information protected by a given key, amount of exposure if a single key is compromised, time available for a one to penetrate physical procedural and logical access, period with indent information maybe compromised by In advice time's disclosure). ENVIRONMENT: This position will operate in the following areas of the organization regulatory engineering division MULTIDOMAIN DEFENCE DOCK: MULTIDOMAIN DEFENCE DOCK" Standard engineering lab environment " Employees must be legally authorised to work in the UK. Verification of employment eligibility will be required at the time of hire. Visa sponsorship is not available for this position. QUALIFICATION, KEY REQUIREMENTS AND SKILLS SET: PHD in Mathematical cryptography is essential. 10yrs+ In-depth working knowledge in Cognitive systems modelings and AI A strong programming skills in C++ and Rust INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST: STAGE3: PRE-SCREENING (verification-checks & security clearance) STAGE4: INTERVIEW WITH THE: CEO, CTO & GC
About the role PQShield is looking for a Senior Software Engineer to expand our Engineering team. Candidates should hold a degree in Electronic Engineering/Computer Science or equivalent. We hope that you have at least 7 years of experience, but also an open, research-oriented mindset. We have been established since 2018, so you would be directly working with the founders and inventors of this deep tech startup. The technology is already a couple of years in the making, its feasibility having been established, funding secured, and it has a clear path to market. This is a great opportunity for career progression and to get a head start in a rapidly expanding segment of the semiconductor industry (Post-Quantum Cryptography and RISC-V). Our platform IP components come together as a RISC-V MCU based Sub-system with advanced (post-quantum) cryptography algorithm support and security features. As a Senior Software Engineer at PQShield, you will be designing and developing secure solutions, helping to develop software solutions working seamlessly through the entire software development life cycle. You will assist with the development of PQShield's core software cryptography libraries. Responsibilities include developing internal tools to support the build, test and security analysis of PQShield's software products. ️ What you'll be doing Developing implementations of cryptography for PQShield's cryptographic libraries and toolkits. Performing security code reviews along with static and dynamic code analysis Collaborating with PQShield's internal product teams on security requirements and functional features of our software solutions Improving the entire software development life cycle, from inception and design, through to development and deployment Contributing to project delivery timelines and ensuring all software solutions are developed and delivered in a timely manner Generating software development documentation according to certifiable standards Solving complex software engineering problems to drive business value in PQShield's solutions and technologies Required Skills And Qualifications Degree level education preferred 7+ Years of experience in systems programming - The primary languages used in this role are C and Python, but other languages may be used when applicable Previous experience of implementing cryptographic algorithms Previous experience of following SDLC processes such as DO178 or ASPICE standards Experience developing software for a range of platforms, such as Linux, Windows and preferably embedded systems. Broad understanding of information security and its intersection with cryptography. For example, experience one or more of the following areas: Communications protocols (e.g. TLS and VPNs); Public key infrastructure; key management; platform security (e.g. HSMs, Trusted Execution Environments); Software update; User/service authentication Strong ability to interpret results and resolve problems Ability to quickly adapt to new technologies, languages and systems Experience with techniques for developing secure software applications Previous experience applying a range of programming techniques Some of the perks of working with us: Unparalleled opportunities to learn and accelerated career development. A collaborative, team environment with people who truly love what they do. Competitive salary and share option scheme. Flexible and hybrid working, and a working from home budget. Private health insurance for yourself and your family. 25 days annual leave (plus bank holidays and two wellness weeks). 50% gym membership discount. The chance to work with a spirited, smart, and friendly team! PQShield is an Equal Employment Opportunity employer. We're passionate about talent and proud to foster an inclusive environment; all applicants will be considered regardless of their gender identity, ethnicity, sexual orientation, disability, and age.
Mar 25, 2024
Full time
About the role PQShield is looking for a Senior Software Engineer to expand our Engineering team. Candidates should hold a degree in Electronic Engineering/Computer Science or equivalent. We hope that you have at least 7 years of experience, but also an open, research-oriented mindset. We have been established since 2018, so you would be directly working with the founders and inventors of this deep tech startup. The technology is already a couple of years in the making, its feasibility having been established, funding secured, and it has a clear path to market. This is a great opportunity for career progression and to get a head start in a rapidly expanding segment of the semiconductor industry (Post-Quantum Cryptography and RISC-V). Our platform IP components come together as a RISC-V MCU based Sub-system with advanced (post-quantum) cryptography algorithm support and security features. As a Senior Software Engineer at PQShield, you will be designing and developing secure solutions, helping to develop software solutions working seamlessly through the entire software development life cycle. You will assist with the development of PQShield's core software cryptography libraries. Responsibilities include developing internal tools to support the build, test and security analysis of PQShield's software products. ️ What you'll be doing Developing implementations of cryptography for PQShield's cryptographic libraries and toolkits. Performing security code reviews along with static and dynamic code analysis Collaborating with PQShield's internal product teams on security requirements and functional features of our software solutions Improving the entire software development life cycle, from inception and design, through to development and deployment Contributing to project delivery timelines and ensuring all software solutions are developed and delivered in a timely manner Generating software development documentation according to certifiable standards Solving complex software engineering problems to drive business value in PQShield's solutions and technologies Required Skills And Qualifications Degree level education preferred 7+ Years of experience in systems programming - The primary languages used in this role are C and Python, but other languages may be used when applicable Previous experience of implementing cryptographic algorithms Previous experience of following SDLC processes such as DO178 or ASPICE standards Experience developing software for a range of platforms, such as Linux, Windows and preferably embedded systems. Broad understanding of information security and its intersection with cryptography. For example, experience one or more of the following areas: Communications protocols (e.g. TLS and VPNs); Public key infrastructure; key management; platform security (e.g. HSMs, Trusted Execution Environments); Software update; User/service authentication Strong ability to interpret results and resolve problems Ability to quickly adapt to new technologies, languages and systems Experience with techniques for developing secure software applications Previous experience applying a range of programming techniques Some of the perks of working with us: Unparalleled opportunities to learn and accelerated career development. A collaborative, team environment with people who truly love what they do. Competitive salary and share option scheme. Flexible and hybrid working, and a working from home budget. Private health insurance for yourself and your family. 25 days annual leave (plus bank holidays and two wellness weeks). 50% gym membership discount. The chance to work with a spirited, smart, and friendly team! PQShield is an Equal Employment Opportunity employer. We're passionate about talent and proud to foster an inclusive environment; all applicants will be considered regardless of their gender identity, ethnicity, sexual orientation, disability, and age.