Home   /   Our Competencies  /   Secure Communication

BİLGEM

Secure Communication

MILSEC-4 Secure IP Communication System

While the MİLSEC-4 terminal offers an up-to-date solution for new generation secure communication (voice, data and video) in IP networks, it also provides an uninterrupted communication service by maintaining the compatibility of secure voice communication in PSTN networks with PSTN secure phones in use.

Key/certificate distribution, surveillance and software update processes of MILSEC-4 terminals are carried out securely remotely using the Security Management Center (GYM). MİLSEC-4 terminal has the ability to update keys/certificates remotely by using IP network through secure communication with GYM.

MİLSEC-4 terminals are interoperable with the MİLSEC-1A phone and offer the opportunity to replace MİLSEC-1A phones without interruption in the communication network during the gradual transformation of PSTN networks to next generation IP networks.

  • Crypto initialization key
  • National and NATO crypto algorithms
  • NATO SCIP compliance
  • Hardware red-black separation
  • Remote secure software update
  • Remote secure certificate and key update
  • COMSEC, TEMPEST, EMI/EMC approvals
  • CONFIDENTIAL level communication by connecting directly to the Internet network
  • IP and/or PSTN connection
  • Commercial SIP products open voice communication
  • Interoperability with the MILSEC-1A safety phone
  • MİLSEC-4’ler arası güvenli ses ve görüntülü haberleşme
  • Secure data and instant communication
  • Secure voice call with secure PTSN phone
It is subject to the sales license to be given by the Ministry of National Defense.
milsec3

MİLSEC 3 - National Radio Sound Safety Device

RELIABLE SOLUTIONS FOR TACTICAL COMMUNICATION

MİLSEC-3 is a secure communication device that can transmit voice and data encrypted and half-duplex over HF/VHF/UHF radio lines. Thanks to its flexible interface, it can work in harmony with many voice, data and radio devices. It is equivalent to NATO KY58 and KY100 devices in terms of its physical properties and connections, and can be used in all kinds of military platforms such as aircraft, helicopters, ships, ground stations. While communicating with other MİLSEC-3 devices in national mode using the national crypto algorithm, it can also make encrypted calls with KY58 and KY100 devices thanks to the NATO crypto algorithm it contains.

  • National and NATO crypto modes
  • Ability to keep crypto keys without erasing for up to 60 days thanks to the built-in battery
  • Anahtarların silinmiş olduğu durumda “Hizmete Özel” gizlilik dereceli ses görüşmesi yapılabilmesi için “Acil Yedek” modu
  • TEMPEST and crypto approvals
  • St : MIL-STD-810E, Method 516.4
  • Temperature shock: MIL-STD-810E, Method 503.3
  • Vibration: MIL-STD-810F, Method 514.5
  • Gun shot vibration: MIL-STD-810F, Method 519.5
  • Height: MIL-STD-810F, Method 500.4
  • Humidity: MIL-STD-810E, Method 507.3
  • Salt fog : MIL-STD-810F, Method 509.4
  • Acceleration: MIL-STD-810F, Method 513.5
  • Solar radiation : MIL-STD-810F, Method 505.4
  • Sprinkling: MIL-STD-810F, Method 506.4
  • Powder : MIL-STD-810F, Method 510.4
  • Explosive atmosphere : MIL-STD-810F, Method 511.4
  • EMC approval
It is subject to the sales license to be given by the Ministry of National Defense.

IPKC-T - Tactical IP Crypto Device

SECURE COMMUNICATION ON TACTICAL IP NETWORKS

IPKC-T provides network layer security for traffic between IP local area networks communicating over insecure networks. Since the device is designed to be portable, easy to use, small in size, low power consumption and resistant to environmental conditions, it is capable of meeting the security needs of both single and medium-sized IP networks in tactical field land, sea and air vehicles. The device connects between the local area network and the router and creates a security gateway. The device is capable of processing data up to a total speed of 220 Mbit/s.

  • Data security with "CONFIDENTIAL" level of confidentiality
  • Authentication
  • Data integrity
  • Tamper-proof, emergency-erase switch
  • Hardware-based implementation
  • Hardware-based true random number generator
  • Hardware red-black separation
  • Encryption: Certified National Encryption Algorithm
  • Authentication: Certified National Authentication Algorithm
  • Key exchange: ECDH
  • Signing: ECDSA
  • Automatic key exchange with IKE Protocol
  • X.509 Certificate based operation
  • Two-stage, role-based device access control with smart-card and password
  • Smart-card-based Crypto Initialization Key and User Card
  • Recording of event, alarm, transaction information
  • Offline key upload in MILAY mode with key upload device
  • Online key upload via IP Key Management Center and EKADAS
  • Secure communication of IP/Ethernet networks over unsecured unprotected networks
  • High speed data transmission from one point to many points at the same time in the network structure
  • Performance: 110 Mbps full-duplex (220 Mbps combined)
  • 512 tunnels
  • IPv4, IPv6, TCP, UDP, ICMP, SNMP, FTP
  • 2 x 10/100/1,000 Mbit/s Gigabit Ethernet (IEEE 802.3), autosense, autocrossover
  • Command-based configuration with local management (console) port, user-friendly command set
  • Remote management by SNMP-based IP Management Center
  • Local and remote (Management Center) configuration backup / refresh
  • VRRP support for redundancy
  • Time synchronization with NTP
  • Software update locally and remotely via IP Management Center
  • Communication with IPKC-G2 and IPKC-GX belonging to the same family
  • COMSEC, EMI/EMC and TEMPEST
It is subject to the sales license to be given by the Ministry of National Defense.
ipkc-t
ipkc-gx

IPKC-GX - 10 Gigabit IP Crypto Device

10 SECURE COMMUNICATION OVER GIGABIT NETWORKS 

IPKC-GX secures the traffic between IP local area networks that communicate over insecure networks at the network layer. The device connects between the local area network and the router and creates a security gateway. It provides data privacy, authentication, data integrity security services. The device is capable of meeting the security needs of IP networks in cloud and data centers that require very high performance.

  • Data security with "CONFIDENTIAL" level of confidentiality
  • Authentication
  • Data integrity
  • Tamper-proof, emergency-erase switch
  • Hardware-based implementation
  • Hardware-based true random number generator
  • Hardware red-black separation  
  • Encryption: Certified National Encryption Algorithm
  • Authentication: Certified National Authentication Algorithm
  • Key exchange: ECDH
  • Signing: ECDSA
  • Automatic key exchange with IKE protocol
  • X.509 Certificate based operation
  • Two-stage, role-based device access control with smart-card and password
  • Smart-card-based Crypto Initialization Key and User Card
  • Recording of event, alarm, transaction information
  • Offline key upload in MILAY mode with key upload device
  • Online key upload via IP Key Management Center and EKADAS
  • Secure communication of IP/Ethernet networks over unsecured unprotected networks
  • High speed data transmission from one point to many points at the same time in the network structure
  • Performance: 9 Gbps full-duplex (18 Gbps combined)
  • 8,000 tunnels
  • IPv4, IPv6, TCP, UDP, ICMP, SNMP, FTP
  • 2x 10 GbE (10 Gigabit Ethernet) Copper or Fiber
  • Command-based configuration with local management (console) port, user-friendly command set
  • Remote management by SNMP-based IP Management Center
  • Local and remote (Management Center) configuration backup / refresh
  • VRRP support for redundancy
  • Time synchronization with NTP
  • Software update locally and remotely via IP Management Center
  • Communication with IPKC-G2 and IPKC-T belonging to the same family
  • COMSEC, EMI/EMC and TEMPEST
It is subject to the sales license to be given by the Ministry of National Defense.

IPKC-G2 - Gigabit IP Crypto Device

SECURE COMMUNICATION VIA GIGABIT NETWORKS

IPKC-G2 secures traffic between IP local area networks communicating over insecure networks at the network layer. The device connects between the local area network and the router and creates a security gateway. It provides data privacy, authentication, data integrity security services. The device is capable of processing data up to a total speed of 1.8 Gbit/s.

  • Data security with "CONFIDENTIAL" level of confidentiality
  • Authentication
  • Data integrity
  • Tamper-proof, emergency-erase switch
  • Hardware-based implementation
  • Hardware-based true random number generator
  • Hardware red-black separation  
  • Encryption: Certified National Encryption Algorithm
  • Authentication: Certified National Authentication Algorithm
  • Key exchange: ECDH
  • Signing: ECDSA
  • Automatic key exchange with IKE protocol
  • X.509 Certificate based operation
  • Two-stage, role-based device access control with smart-card and password
  • Smart-card-based Crypto Initialization Key and User Card
  • Recording of event, alarm, transaction information
  • Offline key upload in MILAY mode with key upload device
  • Online key upload via IP Key Management Center and EKADAS
  • Secure communication of IP/Ethernet networks over unsecured unprotected networks
  • High speed data transmission from one point to many points at the same time in the network structure
  • Performance: 900 Mbps full-duplex (1.8 Gbps combined)
  • 2,000 tunnels
  • IPv4, IPv6, TCP, UDP, ICMP, SNMP, FTP
  • 2 x 10/100/1,000 Mbit/s Gigabit Ethernet (IEEE 802.3), auto sense, auto crossover
  • Command-based configuration with local management (console) port, user-friendly command set
  • Remote management by SNMP-based IP Management Center
  • Local and remote (Management Center) configuration backup / refresh
  • VRRP support for redundancy
  • Time synchronization with NTP
  • Software update locally and remotely via IP Management Center
  • Communication with IPKC-T and IPKC-GX belonging to the same family
  • COMSEC, EMI/EMC and TEMPEST
It is subject to the sales license to be given by the Ministry of National Defense.
ipkc-gs
agc-t

AGC-T - Tactical Network Security Device

SECURE COMMUNICATION OVER IP NETWORKS

AGC-T; taktik saha IP ağlarının güvenli biçimde haberleşebilmesini sağlayan, son teknoloji ürünü, düşük güç tüketimine sahip bir cihazdır. Cihaz; taşınabilir, kullanımı kolay, küçük ebatlı ve saha çevresel şartlarına dayanıklı olarak tasarlanmıştır. AGC-T, farklı konumlardaki taktik saha IP ağlarının, güvensiz ağlar üzerinden güvenli biçimde haberleşebilmesini sağlar. Cihaz korunmak istenen yerel ağ ile yönlendirici arasına bağlanır ve bu ağı güvensiz ağdan yalıtan bir geçit işlevi görür. AGC-T 220 Mbps’e kadar trafik işleme yeteneğine sahiptir.

  • Data privacy at the "CONFIDENTIAL" level of confidentiality
  • Authentication
  • Data integrity
  • Tamper-proof, emergency-erase switch
  • Hardware-based implementation
  • Hardware-based random number generator
  • Hardware red-black separation
  • A set of encryption and authentication algorithms certified at confidential confidentiality level
  • Key exchange: ECDH
  • Signing: ECDSA
  • Automatic key exchange with IKE protocol
  • X.509 Certificate-based operation (operational security, easy key management)
  • Two-stage device access control with smart-card and password
  • Administrator, authorized, unauthorized operator user level
  • Smart card based Crypto Initialization Key and User Card
  • Recording of Events, Alarms, Transaction information
  • Smart card based offline key upload
  • Online key upload via IP Key Management Center and EKADAS
  • Secure communication service over insecure networks
  • Simultaneous point-to-multipoint communication
  • Performance: 110 Mbps full-duplex (220 Mbps combined)
  • 512 tunnels
  • IPv4, IPv6, TCP, UDP, ICMP, SNMP, FTP
  • 2 x 10/100/1,000 Mbit/s Gigabit Ethernet (IEEE 802.3), autosense, autocrossover
  • Command-based configuration with local management (console) port, user-friendly command set
  • Remote management by SNMP-based IP Management Center
  • Local and remote (Management Center) configuration backup / refresh
  • VRRP (Active-Passive Redundancy)
  • Time synchronization with NTP
  • Local and remote (Management Center) software update
  • Communication with AGC-G and AGC-GX belonging to the same family
  • COMSEC, EMI/EMC and TEMPEST
It is subject to the sales license to be given by the Ministry of National Defense.

AGC-G - Gigabit Network Security Device

SECURE COMMUNICATION THROUGH GIGABIT NETWORKS

AGC-G provides security at the network layer of traffic between IP local area networks that communicate over insecure networks. The device connects between the local area network and the router and creates a security gateway. It provides data privacy, authentication, data integrity security services. The device is capable of processing data up to a total speed of 1.8 Gbit/s.

  • Data privacy at the "CONFIDENTIAL" level of confidentiality
  • Authentication
  • Data integrity
  • Tamper-proof, emergency-erase switch
  • Hardware-based implementation
  • Hardware-based random number generator
  • Hardware red-black separation
  • A set of encryption and authentication algorithms certified at confidential confidentiality level
  • Key exchange: ECDH
  • Signing: ECDSA
  • Automatic key exchange with IKE protocol
  • X.509 Certificate-based operation (operational security, easy key management)
  • Two-stage device access control with smart-card and password
  • Administrator, authorized, unauthorized operator user level
  • Smart card based Crypto Initialization Key and User Card
  • Recording of events, alarms, transaction information
  •  Smart card based offline key upload
  • Online key upload via IP Key Management Center and EKADAS
  • Secure communication of IP/Ethernet networks over unsecured unprotected networks
  • Gigabit data transmission from one point to many points at the same time in the network structure
  • Performance: 900 Mbps full-duplex (1.8 Gbps combined)
  • 2,000 tunnels
  • IPv4, IPv6, TCP, UDP, ICMP, SNMP, FTP
  • 2 x 10/100/1,000 Mbit/s gigabit ethernet (IEEE 802.3), auto sense, auto crossover
  • Command-based configuration with local management (console) port, user-friendly command set
  • Remote management by SNMP-based Security Management Center
  • Local and remote (Management Center) configuration backup / refresh
  • VRRP (active-passive redundancy)
  • Time synchronization with NTP
  • Software update locally and via Management Center
  • Communication with AGC-T and AGC-GX belonging to the same family
  • COMSEC, EMI/EMC and TEMPEST capability
It is subject to the sales license to be given by the Ministry of National Defense.
agc-g
agc-gx 10

AGC-GX - 10 Gigabit Network Security Device

10 SECURE COMMUNICATION OVER GIGABIT NETWORKS

AGC-GX provides security at the network layer of traffic between IP local area networks that communicate over insecure networks. The device connects between the local area network and the router and creates a security gateway. It provides data privacy, authentication, data integrity security services. The device is capable of meeting the security needs of IP networks in cloud and data centers that require very high performance.

  • Data security with "CONFIDENTIAL" level of confidentiality
  • Authentication
  • Data integrity
  • Tamper-proof, emergency-erase switch
  • Hardware-based implementation
  • Hardware-based true random number generator
  • Hardware red-black separation  
  • A set of encryption and authentication algorithms certified at confidential confidentiality level
  • Key exchange: ECDH
  • Signing: ECDSA
  • Automatic key exchange with IKE protocol
  • X.509 Certificate based operation
  • Two-stage, role-based device access control with smart-card and password
  • Smart-card-based Crypto Initialization Key and User Card
  • Recording of event, alarm, transaction information
  • Smart card based offline key upload
  • Online key upload via IP Key Management Center and EKADAS
  • Secure communication of IP/Ethernet networks over unsecured unprotected networks
  • High speed data transmission from one point to many points at the same time in the network structure
  • Performance: 9 Gbps full-duplex (18 Gbps combined)
  • 8,000 tunnels
  • IPv4, IPv6, TCP, UDP, ICMP, SNMP, FTP
  • 2 x 10 GbE (10 Gigabit Ethernet) Copper or Fiber
  • Command-based configuration with local management (console) port, user-friendly command set
  • Remote management by SNMP-based IP Management Center
  • Local and remote (Management Center) configuration backup / refresh
  • VRRP support for redundancy
  • Time synchronization with NTP
  • Software update locally and remotely via IP Management Center
  • Communication with AGC-G and AGC-T belonging to the same family
  • COMSEC, EMI/EMC and TEMPEST
It is subject to the sales license to be given by the Ministry of National Defense.

FASD-1 - Fax Analog Digital Converter

FAX SECURITY SOLUTIONS

With the FASD-1, which provides the opportunity to encrypt PC-based fax communication, it is possible to prevent the combination of red-black information existing in currently used faxes and to add AMSG-720B TEMPEST feature to fax communication. FASD-1 is UEKAE's low-cost solution for secure fax communication.

  • Ability to connect any crypto device conforming to RS-232 standard, 19,200/38,400 asynchronous N-8-1 protocol
  • Ability to encrypt faxes (fax without interface) that do not require crypto interface, working according to T.30 protocol
  • RJ-11 socket input to connect the telephone line
  • RJ-11 socket input to connect fax device
  • Data rates of 14,400, 9,600, 7,200, 4,800, and 2,400 bits/s
  • Compliance with MIL-STD-461E standard
  • Compliance with NATO SDIP 27/A TEMPEST standard
It is subject to the sales license to be given by the Ministry of National Defense.
fad-1
ip-aym

IP-AYM - IP Key Management Center

IP-GYM KEY MANAGEMENT CENTER

IP-AYM Key Management Center performs central key management of IPKC/AGC devices. IP-AYM works in harmony with IP-YM. IPKC/AGC's symmetric and asymmetric (certificate) keys are managed by IP-AYM. IPKC/AGC AYM works integrated with AU&İC (Key Generation and Processing Device) or EKADAS Key Management Infrastructure for key generation works. It includes distribution, accounting and management functions. It is designed on the basis of 24/7 operation and geographical and physical backup is possible. The user interface is web-based and the system can be managed from the desired secure point. Since it is designed in application architecture, it has an infrastructure suitable for expansion.

  • Key generation by AU&IC
  • Key distribution
  • Key accounting
  • Key destruction
  • Certificate production (with AU&IC)
  • Online certificate distribution
  • Certificate accounting
  • Certificate Revocation List (CRL) management
  • Key alarm monitoring
  • Key alarm configuration
  • User creation, deletion and update operations
  • Dynamic role management
  • Smart card based user identification
  • User and system logs
  • Geographical and physical backup
It is subject to the sales license to be given by the Ministry of National Defense.

IP-YM - IP Crypto Management Center

IPKC/AGC Management Center is a server-based system with a web user interface that enables centralized management of IPKC/AGC IP crypto devices. It ensures that the configuration, alarm and logs of the devices can be managed centrally and securely. The IPKC/AGC Management Center has advanced features that enable network administrators to easily perform management activities.

  • Single point management of devices
  • Multiple browser support
  • Advanced AJAX-based user interface
  • Client-server architecture
  • Multiple user support
  • Role and permission based user management
  • Customizable role creation
  • Configurable log and report generation
  • Online key upload with Key Management Center software
  • Online backup
  • E-mail alert
  • Throughput monitoring with device performance management
  • Graphical monitoring of device MIB counters
  • Alarm management and reporting
  • Built-in Syslog support and device log management
  • Built-in FTP server
  • Geographical and physical backup
  • Smart card based authentication
  • Role-based user authorization
  • SSLv3
  • SNMPv3
  • Use of IPKC/AGC assigned to management communication
  • Hierarchical grouping of devices
  • Display of managed devices and groups in tree structure
  • Periodic device connection check
  • Automatic device recognition and management
  • Ability to test inter-device connectivity
  • Optional device date and time configuration
  • Detailed IPSec configuration management
  • Device IPSec configuration error checking and reporting
  • IPSec tunnel monitoring
  • Remote firmware update
  • Device configuration backup and restore
  • Key group creation
  • Device network configuration
  • Device network elements management
  • Device local user management
It is subject to the sales license to be given by the Ministry of National Defense.
ip-ym
sge

(SGE) Cyber Security Institute

The Cyber Security Institute, which was established to carry out studies to increase the national cyber security capacity, carries out research and development activities in the field of cyber security; carries out solutions-oriented projects for military institutions, public institutions and organizations and the private sector.

The main fields of activity of our institute, which has made a significant contribution to the creation of cyber security knowledge and tactical infrastructure in our country with many successful projects to date, are secure software development, penetration tests and vulnerability analysis.

blank
6-yze card logo

(IZE) Artificial Intelligence Institute

Artificial Intelligence Institute is the first institute established within the scope of TUBITAK centers and institutes, which cuts the sectors and research fields horizontally and focuses directly on the emerging technology field. For this reason, it constitutes an innovative model in terms of both the open innovation and co-development approach of the institute and its focus on emerging technology.

Artificial Intelligence Institute aims to develop core technologies in the field of artificial intelligence and bring these innovations from the forefront of science to the use of the industry as soon as possible. Focusing on the transformative potential of artificial intelligence, it will continue to play its part in pioneering efforts to create and sustain artificial intelligence-based innovation, growth and productivity in Turkey. Working with industry and public institutions in Turkey, together with other organizations within the artificial intelligence ecosystem, spreading the use of artificial intelligence and increasing the workforce specialized in this field are among its primary goals.

blank

Competence Centers

Discover institutes laboratories technologies products projects of BİLGEM.

Intern

TÜBİTAK BİLGEM builds its basic strategy for the future on qualified knowledge and qualified people focused on national targets in the research, technology development and innovation ecosystem.

Starting from the understanding that "the most important resource of a country is generally people, specifically scientists," TÜBİTAK encourages and supports our youth from an early age. In this context, providing young minds with early exposure to technology production is crucial for the success of our National Technology Move. Accordingly, TÜBİTAK BİLGEM offers internship opportunities to undergraduate students from universities every year.

You can follow internship announcements and submit your applications through the Career Gateway at https://kariyerkapisi.cbiko.gov.tr.

You can access frequently asked questions about internships at TÜBİTAK BİLGEM from here. 

Application Conditions
  • Students enrolled in undergraduate (2nd year and above) and associate degree programs in departments offering education in universities and conducting insurance procedures through the higher education institution to which they are affiliated can benefit from the internship opportunity.
  • For undergraduate and associate degree students, a minimum Weighted Grade Point Average (GPA) of 2.50 out of 4 is required. The GPA of candidates with a 100-point system is converted to a 4-point system based on the "Conversion Table of Grades from the 4-Point System to the 100-Point System" published by the Higher Education Council.
  • There is no requirement for a foreign language certificate during the internship application process.
  • Students enrolled in departments such as Forensic Computing Engineering, Computer Sciences, Computer Science and Engineering, Computer Engineering, Computer and Informatics, Computer and Software Engineering, Information Systems Engineering, Electrical and Electronics Engineering, Control Engineering, Control and Computer Engineering, Control and Automation Engineering, Mechanical Engineering, Mechatronics Engineering, Telecommunication Engineering, or Software Engineering in universities can apply for internships.

Internship applications are accepted between December and January, and the internship period covers June, July, and August.

stajyer-img-1

Scholar

Scholar assignments are made for research and development activities for undergraduate, master's, doctoral students, and post-doctoral researchers. In our center, scholars are appointed for practical purposes in externally funded, TARAL, or European Union projects.

You can contact us via the email address bilgem.yetenekkazanimi@tubitak.gov.tr to apply to be a scholar.
Application Conditions

(1) The conditions for undergraduate scholars in externally funded projects conducted by the institution are specified below:

  •  Being a student continuing undergraduate education at higher education institutions established in Turkey (excluding foreign language preparatory students).
  • Having a weighted cumulative GPA for previous years, excluding preparatory years, based on the university's grading system, which satisfies the formula score and foreign language requirements in the recruitment criteria.
  • Completing at least the first semester of the first year of undergraduate education.
  • Having a GPA of "+3.00" and a University Placement Exam Ranking of "10,000 ≥" for undergraduate general average.
  • For foreign students placed in Turkish universities without taking the ÖSYM exam or for those who completed undergraduate education through exams such as Vertical Transfer Exam, the lowest university placement ranking of the department from the year the candidate started the undergraduate program is considered in the ranking formula.

(2) The conditions for master's degree scholars in externally funded projects conducted by the institution are specified below:

  • Being a student continuing master's degree education at higher education institutions established in Turkey (excluding special students and foreign language preparatory students).
  • Currently pursuing a master's degree in the project's field of responsibility.

(3) The conditions for doctoral students in externally funded projects conducted by the institution are specified below:

  • Being a student continuing doctoral education at higher education institutions established in Turkey (excluding special students and foreign language preparatory students).
  • Currently pursuing a doctorate in the project's field of responsibility or conducting a doctorate in areas determined within the framework of the YÖK-TÜBİTAK Doctoral Program Project Collaboration Protocol. (Students in medical specialization and artistic proficiency are accepted as doctoral students.)
bursiyer-img-1

Candidate Researcher

Students in the 3rd and 4th years of relevant engineering departments at universities can apply to our Part-Time Candidate Researcher positions through our Job Application System at kariyer.tubitak.gov.tr. By doing so, they can gain work experience at TÜBİTAK BİLGEM during their university years.

This program does not have an end date. Candidate Researcher personnel working part-time during their university period can seamlessly transition to full-time employment as Researcher personnel at TÜBİTAK BİLGEM without interrupting their career journey after graduating from the undergraduate program.

Application Conditions

Conditions for the Candidate Researcher Program:

  • Being a 3rd or 4th-year student in the relevant departments specified in the announcements at universities.
  • Foreign language proficiency: Achieving appropriate scores in the exam types specified in the announcement or studying in a program that is 100% in English for undergraduate education.
  • Satisfying the formula score:

Weighted Graduation Average + (10,000/University Placement Exam Ranking) + Additional Score* >= 3.20

*Candidates who have achieved rankings and awards in national and international competitions will receive an additional score of 0.3.

aday-arastırmacı-img-1

Researcher

By joining TÜBİTAK BİLGEM as a Researcher, you can contribute to developments in the fields of information technology, information security, and advanced electronics. You'll have the opportunity to make your mark on innovations, closely follow advancements, enhance your skills, and shape your future by advancing in your career.

You can apply to our currently open positions through the TÜBİTAK Job Application System .

Application Conditions

Conditions for Job Application:

  • Foreign language proficiency: Attaining appropriate scores in the exam types specified in the announcement or studying in a program that is 100% in English for undergraduate education.
  • Fulfilling specific requirements stated in the announcement (such as undergraduate department, years of experience, expertise, etc.).
  • Satisfying the formula score:

For Candidates with Less than 3 Years of Experience:

Weighted Graduation Average + (10,000 / University Placement Exam Ranking) + Additional Score* >= 3.20

 

For Candidates with 3 Years and More of Experience:

Weighted Graduation Average + (10,000 / University Placement Exam Ranking) + 5*[1 / (1 + e^(5 - years of experience) ) ] + Additional Score* >= 3.20


*Candidates who have achieved rankings and awards in national and international competitions will receive an additional score of 0.3.

arastırmacı-img-1

MILSEC 4 - Secure IP Terminal

SAFE IP TERMINAL

While the MİLSEC-4 terminal offers an up-to-date solution for next-generation secure communication (voice, data and video) in IP networks, it provides an uninterrupted communication service by maintaining the compatibility of secure voice communication in PSTN networks with PSTN secure phones in use.
provides.

Configuration, surveillance and software update processes of MILSEC-4 terminals are carried out securely remotely using the Security Management Center (GYM). MİLSEC-4 terminal is capable of IP Network Key Loading (IPAAY) through secure communication with GYM without the need for an additional device.

MİLSEC-4 terminals are interoperable with MİLSEC-1A and MİLSEC-2 phones and offer the opportunity to replace MİLSEC-1A and MİLSEC-2 phones without interruption in the gradual transformation of PSTN networks to next generation IP networks.

FEATURES

  • End-to-end secure voice communication in PSTN networks
  • End-to-end secure voice, image and data transmission in IP networks
  • NATO SCIP compliance on IP networks
  • Compatibility with commercial SIP products
  • Interoperability with MILSEC1A and MILSEC2 secure phones
  • National and AES crypto algorithms
  • Remote software update
  • Easy operation with touch screen

It is subject to the sales license to be given by the Ministry of National Defense.