Offres d'emploi — Secure
Software Engineer Secure Inter-domain Networking
You will work for the Network Security research group led by Professor Adrian Perrig. The Network Security group conducts research on a secure inter domain routing architecture called SCION..
Software Engineer Secure Inter-domain Networking
Job description Your main duties of this position will be the implementation of software for the control and data plane of network infrastructure devices as well as applications an..
Inside Sales Manager Secure Power 50-100% (w/m/d)
Darum werde Teil des dynamisch wachsenden Secure Power Teams bei Schneider Electric. In dieser Rolle.. what about you? Als unser zukünftiger Inside Sales für unsere Secure Power und Cooling Applikationen..
EMBEDDED SOFTWARE / FIRMWARE ENGINEER
Main responsibilities Develop low level software, protocol stacks, and embedded, secure, low power.. Nice to have Experience in designing and implementing secure embedded systems, Identity & Access..
Senior Security Software Engineer (m/w) 80-100%
Als Senior Security Software Engineer setzt du zusammen mit deinen Teamkolleg innen anspruchsvolle Integrationsprojekte mit dem Airlock Secure Access Hub um. Du arbeitest bei der Lsungsfindung..
Systemadministrator/in
IT Infrastruktur, Backup, Storage, IT, Systemadministration, Monitoring, Virtualisierung, Rechenzentrum Our IT business unit provides secure and scalable IT services. Whether infrastructure..
Security Developer
You will work closely with the development team to ensure the code is secure and will not compromise the.. Design and develop secure software solutions and implement secure coding practices. Conduct code reviews..
Technical Supporter / Client Manager (80 - 100%)
PrivaSphere Secure Messaging ist die innovative Schweizer Plattform für sichere E Mail. und Online Anwendungen. Um unsere Dienstleistungen und Technologie weiter auszubauen, suchen wir einen..
Wirtschaftsinformatiker/in, Product Owner, IT-Infrastruktur-Spezialist/in, Informatiker/in
Contract as well as any associated tenders) and in requirements management Secure German language skills.. we secure people financially as a strong solidarity community and fulfill our promise "We are on your..
POSTDOC FELLOW in Cryptography & Information Security (m/f/d)
Working in the area of information and communication security with a focus on authentication protocols, verifiable delegation of computation, and secure multi party computation. The position is..
Systemadministrator/in, Fachinformatiker/in Systemintegration
Maintain and expand the IT landscape Support colleagues in the planning and implementation of new projects Maintain local and cloud based infrastructure Monitor and secure critical..
Application IT Security Engineer
Maintain and further develop the bug bounty program. Provide guidance and advice to product development teams on application security. Apply our secure software engineering lifecycle Design and..
iOS Developer
And continuous focus on improvement of that Secure apps that adhere to best practices for information security Bachelors Degree in computer science, Engineering or Information Systems or any..
Commercial Contract Manager - 80%
As Commercial Contract Manager, your responsibility is to secure that Academic Work signs strategically important and profitable frame agreements in terms of gross profit and overall terms..
Tech Lead Engineering - Custody Platform
Take technical leadership to facilitate development of a highly secure and scalable platform. Produce.. Deep understanding of creating highly secure applications. Familiarity with digital assets custody..
Medical Device Systems Engineer (Cybersecurity)
Define requirements (on stakeholder & technical levels) related to security for Medical Devices & Connected Systems. Define architecture & design of secure Medical Devices & Connected Systems..
Funded PhD student in Applied Cryptography & Privacy-preserving authentication
We are currently active in multiple areas including the design of provably secure cryptographic protocols and cryptographic primitives that can be employed for reliable authentication..