Cyber Security Consultant

TN United Kingdom
Bristol
3 weeks ago
Applications closed

Related Jobs

View all jobs

Senior Security Consultant - Security Architecture

Principal Security Consultant - Cloud Security

Information Security Consultant (Insurance)

Cyber Security Consultant

Cyber Security Consultant - AWS - Manchester

Cloud Security Consultant - AWS - Manchester

Social network you want to login/join with:

  • Does solving complex problems interest you?
  • Would you thrive in a collaborative environment?
  • Do you want to apply your skills to a complex problem domain?

Then we want to speak to you.

We are recruiting for a number of Principal Consultant and Senior Consultant roles, but wherever you go, you will work on some of the most challenging and rewarding security problems in the UK, designing and developing solutions that sit at the heart of our products.

Your work at Leonardo will see you take the lead in solving customer problems in an agile, innovative and team-centric manner. There is a clear and defined pathway to achieving chartership, NCSC certification and greater responsibility.

Your work may involve:

  1. Relate- Our customers and their concerns are at the heart of what we do. As a consultant you will actively listen and empathise with our customers to build rapport.
  2. Understand– We add value by solving problems. As a consultant you will define potential solutions to problems based on your experience and technical knowledge – sometimes with only limited information to hand.
  3. Assess– At Leonardo we adopt a risk-based approach to any security problem. As a consultant you will identify, measure and analyse security risks and explain to customers how these risks could impact their business objectives.
  4. Treat– Resolving risks is the technical core of our offering. As a consultant you will assist in defining appropriate and proportionate security solutions across people, process and technology, and align to the identified risk picture through the creation of security architecture visions, patterns and designs.
  5. Assure– Having confidence in security maturity is a key requirement especially in heavily regulated industries. As a consultant you will assist in defining and performing security assessments that span people, process and technology, and recommend remediations that arise from those assessments.
  6. Develop– All our offerings are based on a core set of products. As a consultant you will help in the technical development of our products to be used across our customer sectors.

The role may involve hybrid working, but we also encourage working on site from time to time at one of our Leonardo offices and closely with our customers. Talk to us to find out more.

Our Consultants work in multidisciplinary teams spanning a range of activities that depend on the customer’s requirements and your own strengths and interests.

  • As a Senior Consultant, you will often take the lead on a technical delivery or small to medium-sized project, or lead a workstream within a larger programme.
  • As a Principal Consultant, you will be considered a technical expert in a particular cyber domain and could be asked to lead a larger programme or a concurrent series of smaller engagements.

We are recruiting for a number of roles from a variety of backgrounds and skillsets, including:

  • Risk and Governance– Helping customers to improve their security strategy, policies and procedures and designing the best way to implement them in their business. Conducting security risk assessments and presenting results to senior management in a clear and understandable manner.
  • Compliance and Maturity– Conducting security audits and presenting results in reports and dashboards to help customers to understand their security compliance and maturity. Designing audit and resilience frameworks to help customers improve their existing auditing approach.
  • Design and Countermeasures– Reviewing risk assessments, system, site and network architectures and design documentation (HLD/LLD) to identify potential exploitable vulnerabilities and propose appropriate security controls in either an IT or OT environment. Working with solution architects to ensure that systems are Secure by Design and satisfy relevant accreditation requirements.

Based upon your skills and foundation knowledge, we will assess where your knowledge and skills would best fit and discuss the options with you.

Security Clearance

:

Life at Leonardo

With a company funded benefits package, a commitment to learning and development, and a flexible approach to working hours focused on the needs of both our employees and customers, a career with Leonardo has never offered as many opportunities or been more accessible to as many people.

  • Flexible Working:Flexible hours with hybrid working options. For part time opportunities, please talk to us.
  • Company funded flexible benefits:Access to private healthcare, dental schemes, Workplace ISA, Go Green Car Scheme, technology and lifestyle options (£500 annual allowance).
  • Holidays:25 days plus bank holidays, option to buy/sell leave and to accrue up to 12 additional flexi leave days per year.
  • Pension:Award winning pension scheme (up to 10% employer contribution).
  • Wellbeing:Employee Assistance Programme with access to free mental health support, financial wellbeing support and network groups to demonstrate our ongoing commitment to diversity & inclusion (Enable, Pride, Equalise, Reservists, Carers).
  • Lifestyle:Discounted Gym membership, Cycle to work scheme.
  • Training:Free access to more than 4000 online courses via Coursera.
  • Referral Incentive:You can earn a reward for successfully referring a friend or family member.
  • Bonus:Scheme in place for all employees at management level and below.

#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.

Cyber Security Jobs in the Public Sector: Protecting the UK’s Digital Future

Cyber threats have grown exponentially in recent years, targeting both private businesses and government institutions. As technology becomes ever more embedded in daily life—managing everything from national security to healthcare records—the risk of cyber attacks also increases. In the UK public sector, where vital services and sensitive citizen data are at stake, cyber security has become a top priority. For professionals looking for a meaningful career at the intersection of technology, national security, and public service, cyber security jobs in the UK public sector present an exciting and fulfilling path. In this blog post, we’ll delve into why cyber security is so critical to government agencies, the most in-demand roles, the skills and qualifications required, and how to navigate the application process. By the end, you’ll have a clearer sense of how you can leverage your technical expertise to protect the nation’s digital infrastructure.