Careers in Cryptology, codes, code-breaking and encryption (Developed from AGCAS link enquires, January 2011)



Similar documents
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

CESG Certification of Cyber Security Training Courses

INFORMATION TECHNOLOGY SECURITY: PORTFOLIO OVERVIEW

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

MI5. Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff.

WebSphere DataPower Release FIPS and NIST SP a support.

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

MScand Postgraduate Diploma in Information Security Royal Holloway, University of London

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION

Protecting Malaysia in the Connected world

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Innovations in Digital Signature. Rethinking Digital Signatures

Information Security Basic Concepts

M-Shield mobile security technology

Part-time MSc in Cyber Security from Northumbria University. masters.qa.com

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Applying Cryptography as a Service to Mobile Applications

Number of relevant issues

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Using etoken for SSL Web Authentication. SSL V3.0 Overview

How To Understand And Understand The Security Of A Key Infrastructure

ICT and Information Security Resources

2014 IBM Corporation

Hardware Security Modules for Protecting Embedded Systems

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Overview. SSL Cryptography Overview CHAPTER 1

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Digital Signatures and Interoperability

Certification of Master s Degrees in Digital Forensics

Network and Computer Systems Security

AEP Systems. Federal PKI Technical Working Group June 2003

Complying with PCI Data Security

DNSSEC Policy and Practice Statement.amsterdam

College of Agriculture, Engineering and Science INSPIRING GREATNESS

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Software Assignments for a Course in Secure E-Commerce

G Cloud III Framework Lot 4 (SCS) Project Management

Why Cryptosystems Fail. By Ahmed HajYasien

School of Computing and Technology

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

Digital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

University of Bradford. 1 year full time, 2 years part-time

PrivyLink Cryptographic Key Server *

Integration Guide. Microsoft Internet Information Services (IIS) 7.0 and ncipher Modules. Windows Server 2008 (32-bit and 64-bit)

Key & Data Storage on Mobile Devices

Briefing note: GCHQ Internships

The Education Fellowship Finance Centralisation IT Security Strategy

Managed Encryption Service

Certification of Master s Degrees in Digital Forensics

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

JOB DESCRIPTION REF:

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC)

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Service Definition Document

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Salary Range: Hours Per Week: 37 Flexi Monday to Friday Reference No: S Closing Date: 4.00pm on Friday 19 June 2015

INTEGRATION GUIDE MS OUTLOOK 2003 VERSION 2.0

Citrix MetaFrame XP Security Standards and Deployment Scenarios

College of Agriculture, Engineering and Science INSPIRING GREATNESS

Career Analysis into Cyber Security: New & Evolving Occupations

MSc Cyber Security. identity. hacker. virus. network. information

PrivateServer HSM Integration with Microsoft IIS

Postgraduate Study at Manchester Business School. Rachel Tufft Head of Postgraduate Marketing

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Europol Public Information VACANCY NOTICE. Reporting to: Senior Specialist on the Infrastructure Engineering Team

JOB DESCRIPTION REF:

Scheme to Recognise Academic Centres of Excellence in Cyber Security Research

Global Telehealth Conference 2012

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Programme Specification and Curriculum Map for MSc Network Security and Pen Testing

Key Features. The key features of the PINselect system are: Operating modes: Security. Customers no longer have to visit a branch to change their PIN

Implementing Cisco IOS Network Security v2.0 (IINS)

Entrust IdentityGuard

A Guide to the Cyber Essentials Scheme

Managed Services PKI 60-day Trial Quick Start Guide

N/A. Computer Science. Software Engineering. Electrical and/or Electronic Engineering. Mathematics with Computer Science

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor

Qualification details

Industry Security Notice

Networked Systems Security

Michelle Govan & Anand Philip Network & Security Engineering

Programme Specification. 1. Advanced Computer Science (ACS)

What do Birmingham postgraduates do?

IoT Security Platform

Table of Contents. Introduction. Audience. At Course Completion

Protecting Commercial Secure Web Servers From Key-Finding Threats

The Data Centre Section is one of four in the IS Infrastructure and Operations Division.

National Security Agency Perspective on Key Management

Voltage's Encrypted

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Risk Reduction for Electronic Signing of Large Value Business Obligations. Michał Tabor

SSL BEST PRACTICES OVERVIEW

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Programme Specification: MSc Computing (Information Security)

Egypt s E-Signature & PKInfrastructure

Public-Key Infrastructure

Transcription:

Careers in Cryptology, codes, code-breaking and encryption (Developed from AGCAS link enquires, January 2011) A summary of information received from numerous Careers Services regarding codes, code-breaking and encryption. Cryptography is used very widely in: mobile phones (protecting calls and texts); banking (chip and PIN cards); Internet (protecting transaction details using SSL, SSH); corporate computer security; home computing (Windows and other OSs come with a set of crypto algorithms); satellite TV (e.g. Sky); Data security is a big issue for a number of companies, and banks probably have the biggest stake. Internationally, the USA and Australia have massive interest. University of Chicago in the USA and Macquarie University in Australia are leading universities in the field. postgraduate study can be important Royal Holloway, University of London runs a MSc in Mathematics of Cryptography and Communications (as yet no destination data) the International Association for cryptology has a section on jobs & PHD s in cryptology www.iacr.org/jobs/ many positions may require Computer Science and/or IT qualifications and experience e.g. programming languages there may be issues linked to security clearance for some employers (e.g. government security services) international students may need to focus their job search on corporate employers Websites to get started www.mathscareers.org.uk/viewitem.cfm?cit_id=382816 an introduction to cryptology www.studydiscussions.com/cryptography-as-a-career-option/ - information (from the US) about cryptography as a career www.kent.ac.uk/careers/workin/forensiccomputing.htm - an overview of forensic computing and cryptology careers with lots of useful links.

www.bcs-issg.org.uk/index.html - BCS's Information Specialists Security Group Potential Employers Government intelligence services (very limited information available for some services) The Ministry of Defence jobs available for civilians in the Government Communication Network and positions in the armed forces (although information about specific roles is limited) - www.mod.uk/defenceinternet/defencefor/jobseekers/ GCHQ (Government Communications Headquarters) recruits maths graduates (and related disciplines with significant math content, e.g. statistics, physics or engineering) for mathematical research to help counter threats to British people and interests. Researchers work on some of the world's most challenging cryptographic problems and developing some of the world's most secure systems. - www.gchqcareers.co.uk/ The Communication Electronics Security Group (CESG) is the Information Assurance arm of the Government Communications Headquarters (GCHQ) and it provides advice on Information Assurance to government departments and, in certain circumstances, private companies. Further details (including recruitment information) are available at www.cesg.gov.uk/about_us/careers.shtml Security Service (MI5) - www.mi5.gov.uk/careers/graduates.aspx Secret Intelligence Service (MI6)- www.sis.gov.uk/output/careers- 1.html Law enforcement agencies The Information Assurance Advisory Council is a broad-based group concerned with minimising threats to the UK s IT infrastructure. Its website lists its member organisations which include private companies, government agencies and academic research centres. - www.iaac.org.uk The Centre for the Protection of National Infrastructure (CPNI) is a government organisation, targeting primarily the critical national infrastructure (CNI) - those key elements of the national infrastructure which are crucial to the continued delivery of essential services to the UK. - www.cpni.gov.uk. The Communications Electronics Security Group (CESG) is the Information Assurance arm of the Government Communications Headquarters (GCHQ) and it provides advice on Information Assurance to government departments and, in certain circumstances, private companies. Further details (including recruitment information) - www.cesg.gov.uk

The Serious Organised Crime Agency (SOCA) is an intelligence- led agency with a remit and law enforcement powers to reduce the harm done to individuals and communities by serious organised crime. - www.soca.gov.uk/careers/opportunities Intellect is the main trade association for the UK IT industry and it provides the secretariat for SAINT; the Security Alliance for Internet and New Technologies. - www.intellectuk.org The Serious Fraud Office investigates major fraud of all kinds and it employs its own specialist IT staff. - www.sfo.gov.uk IT software developers producing encryption software The Computing MI IT Software directory (available to the left of the green IT folders) lists software developers by software category, including encryption under security. Specialist consultancies in Information security The Computing MI IT Services directory (available to the left of the green IT folders) lists IT consultancies by specialisations, including security. Professional services firms providing technology security services IT end-users where encrypted data is needed e.g. finance companies Deloitte do have a graduate scheme for Information & Technology Risk - http://careers.deloitte.com/unitedkingdom/students/csc_general.aspx?countrycontentid=12438 Barclays technology graduate programme - www.barclaysgraduates.co.uk/our-graduate-programmes/technology/abouttechnology Logica technology graduate scheme - www.logicagraduates.co.uk/our-programmes/pts-programme-and-technicalservices KPMG Risk and Compliance - Technology Graduate programme - www.kpmgcareers.co.uk/graduates/advisory-- RiskandCompliance-Technology--InDepth_(7872).aspx?pg=7872 Vacancies with banks concerning security aspects of plastic cards, are few and far between and are often direct entry rather than featuring on any graduate training scheme. IT management consultancies Telecommunications organisations Siemens security division - www.siemensenterprise.com/uk/services/security.aspx RIM (the company that operates BlackBerry) all their e-mail messages are encrypted. - www.rim.com/careers/students/

Broadcasting companies The following is a job advertisement for a senior position in cryptology to indicate the kind of skills and knowledge that may be required for cryptology positions: Security - Cryptography - Senior Consultant Location: London, London, United Kingdom Firm Service: Enterprise risk services Type of Position: Full-time Job Description Our market leading Security, Privacy and Resilience practice has a proven track record of working on complex and high profile issues, with some of the UK's leadings organisations. We are uniquely positioned in being able to help our clients improve the security, privacy and resilience of a single component or to develop comprehensive security, privacy and resilience programmes. Our fast growing practice is on the lookout for exceptional consultants in the field of cryptography. Main purpose of job To assist our clients in the design, delivery and ongoing operation of various cryptography capabilities such as Public Key Infrastructures (PKI), secure transmission of data (e.g., SSL/TLS, secure email), Hardware Security Modules (HSM) and centralised key management. Specific cryptography responsibilities include: Defining project drivers and the underlying business case for cryptography related solutions Analysis and definition of functional and technical requirements working with security and technology senior users Performing vendor assessments and technical proof of concepts to help our clients to select fit for purpose solution(s) Designing and deploying cryptography related solutions Defining and embedding operations and support procedures to ensure effective handover of the cryptography related solutions to client operational support teams Managing relationships with cryptography product vendors Other responsibilities will include: Managing or co managing delivery to provide exceptional service to the client, including defining a project's scope, approach, budget, plan and milestones, as well as managing project risks and issues Managing day to day client relationships and strengthening and broadening key client relationships

Identifying key client business issues and/or industry/market developments that help to define client needs Determining client needs by supplementing the standard assessment techniques and tools with innovative approaches Producing high quality documentation in line with project deliverables (e.g., management reports, project briefs, business cases, operational procedures, etc.) Reviewing deliverables of the team and verifying that they meet client and contract expectations Participate in selling activities by applying learned techniques and approaches. Taking an active role in supporting the achievement of business goals through practice initiatives Generating innovative ideas that are strategically sound and progressive; challenging the status quo and fostering creativity on engagements To be considered, you must possess: An excellent understanding of cryptography and related concepts and principles (e.g., encryption algorithms, hash functions, PKI, key exchange, certification authorities, digital signatures) An excellent understanding of cryptographic standards and protocols (e.g., PKCS, FIPS 140 2, IPSec, SSL/TLS) In depth knowledge of at least two cryptography solutions from vendors such as PGP, Entrust, Cryptomathic, Ingrian, RSA, Voltage, Thales/nCipher and Blue Coat Experience of defining and establishing crypto key hierarchies and generation of master/root keys Strong academics, including a minimum of 2.1 degree or equivalent Understanding of information security principles and best practice (e.g., ISO27001, ISF Standards of Good Practice for Information Security) Man management experience Excellent interpersonal skills Ability to think creatively to solve client needs A willingness to work across multiple clients in the private and public sector Preferred: Hands on experience in configuring and deploying HSMs Experience in coding to cryptographic APIs Qualifications such as CISSP, CCNA, CCNP, ITIL and PRINCE2 University of Edinburgh Careers Service January 2011