Enable job alerts via email!

Cybersecurity Software Engineer

TN United Kingdom

London

On-site

GBP 50,000 - 80,000

Full time

Yesterday
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An innovative firm is on the lookout for a talented Software Engineer to join their dynamic team in London. This role focuses on utilizing cutting-edge technologies to combat cybersecurity threats through advanced data analytics and high-performance computing. You will play a crucial role in developing robust network security solutions and analyzing complex network traffic to safeguard against potential threats. If you are passionate about cybersecurity and eager to make a significant impact in the tech industry, this opportunity is perfect for you.

Qualifications

  • Experience in Cryptography and Cybersecurity is essential.
  • Strong programming skills in C/C++, Java, or Python.

Responsibilities

  • Developing and implementing network security solutions.
  • Analyzing network traffic for security threats.

Skills

Cryptography
Cybersecurity
Network Threat Detection
Data Analytics
C/C++
Java
Python
TCP/IP protocols
Intrusion Detection and Prevention Systems
Malware analysis

Tools

Snort
Firewalls
Packet Filtering

Job description

Social network you want to login/join with:

Job Description: Software Engineer

My client is seeking a Software Engineer with experience in Cryptography, Cybersecurity, Network Threat Detection, and Data Analytics using High Performance Computing. The role involves analyzing complex network traffic with Artificial Intelligence to identify and assess cybersecurity threats.

Responsibilities include:
  • Developing and implementing network security solutions
  • Analyzing network traffic for security threats
Required Skills and Experience:
  • Programming knowledge of C/C++, Java, and/or Python
  • Experience with TCP/IP protocols
  • Exposure to:
  • Intrusion Detection and Prevention Systems (IDS/IPS)
  • Snort rules
  • Firewalls and Packet Filtering (DPI/SPI)
  • Anomaly Detection
  • Malware analysis
  • System exploitation techniques

For more information and a confidential chat, please apply with your CV.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.