Cyber Security Design Authority

Thales
Doncaster
9 months ago
Applications closed

Related Jobs

View all jobs

Security Architect / Technical Design Authority

Enterprise Security Architect

Cyber Security Lead / Monitoring (Defence sector)

Cyber Security Consultant

Information Security Consultant

Information Security Consultant

Location: Reading, United KingdomThales people architect identity management and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange funds, people cross borders, energy become smarter and much more. More than 30,000 organizations already rely on us to verify the identities of people and things, grant access to digital services, analyze vast quantities of information and encrypt data to make the connected world more secure.Together we offer fantastic opportunities for committed employees to learn and develop their career with us. At Thales UK, we research, develop, and supply technology and services that impact the lives of millions of people each day to make life better, and keep us safer. We innovate across five major industries; Aerospace, Defence, Ground Transportation, Security and Space. Your health and well-being matters to us and that’s why we offer you the flexibility to do what’s important to you; whether that’s part time hours, job sharing, home working, or the ability to flex your start and finish times. Where possible, we support a working pattern that suits your lifestyle and helps you reach your ambitions.

Cyber Security Design Authority

Location:Can be flexible on Base location (Reading, Crawley, Bristol, Ebbw Vale, Cheadle, Doncaster Home Start); circa. 40% remote but will need to be flexible to travel around the numerous Thales & Customer facilities/locations.

As a Cyber Security Design Authority you will work with our technical and engineering to team to guide and assure the cybersecurity engineering activities associated with their products/solutions. You will have a key role to advise and support the business unit's leadership in their cybersecurity transformation and maturity growth.

Key responsibilities:

Act in capacity as the Cyber Design Authority (DA) across the Thales Business Line (BL) Programme covering Core, Low & High team activities, services & deliverables with a direct reporting line to the UK Head of Cyber and BL Technical Director.

Ensure adherence to and intelligent application of Thales UK Cyber Engineering Governance and processes across all BL activities.

Support cybersecurity maturity development of BL, including cybersecurity knowledge transfer and upskilling to senior BL staff.

Assess and assure cybersecurity aspects of products and solutions through life. This includes, but is no limited to, assessing key cybersecurity approach, the cyber engineering artefacts and the overall security case. 

Provide guidance on the applicable Policies & Standards required for the relevant industrial applications.

Evaluation and guidance for technology selection and the impact to security / cyber risks.

Key Skills:

We are keen to hear from experience Cyber Security professionals who have:

Operated in multi stakeholder environments with the ability to influence to ensure right outcomes are reached.

Selected and follow structured processes to identify threats, vulnerabilities, assess exposure and identify & mitigate security risks.

Guided teams to take systems through formal assurance and acceptance including working with customer organisations and 3rd parties.

Applied secure by design approach through engineering lifecycle and in service.

The understanding where and how key cybersecurity technologies are applied, the fundamentals behind the technology and the ability to assess suitability of candidate products.

Articulated (and distinguish between) cyber security and cyber resilience approaches.

Experience:

Have worked within senior Cyber Security Engineering roles such as Principle Engineer, Architect or Design Authority positions.

Proven experience of guiding complex projects through security risks and mitigation activities.

Working with external partners and accreditation bodies.

Experience of applying cybersecurity to OT, IOT and/or embedded environments.

Qualifications:

Engineering degree or equivalent in an appropriate field.

Desirable:

CISSP Accreditation

CCP Architect

SABSA Chartered Security Arch – Foundation & Practitioner

IEng/CEng

Behaviours & Motivation/Aptitude:

Enthusiastic about the way in which Cybersecurity & Trust will make the world a safer place.

Possess a desire to expand knowledge and continually acquire new knowledge & skills required for the job & personal growth.

Connects at a deep level with others; is a trusted adviser to top stakeholders; develops and maintains a network of influential players in the industry critical to Thales’s future success.

Makes timely, high-impact, high-quality decisions in uncertain and ambiguous contexts; sees these through to completion.

#LI-SW1

In line with Thales' Baseline Security requirements, candidates will be asked to provide evidence of identity, eligibility to work in the UK and employment and/or education history for up to three years. Some vacancies may require full Security Clearance which can require further evidence to be provided. For further details of the evidence required to apply for Baseline and Security Clearance please refer to the Defence Business Services National Security Vetting (DBS NSV) Agency.

At Thales we provide CAREERS and not only jobs. With Thales employing 80,000 employees in 68 countries our mobility policy enables thousands of employees each year to develop their careers at home and abroad, in their existing areas of expertise or by branching out into new fields. Together we believe that embracing flexibility is a smarter way of working.

Thales UK is committed to providing an inclusive and barrier-free recruitment process. We will provide reasonable adjustments and support to ensure neuro-diverse applicants or those with a disability or long-term condition can be their best during the recruitment process. To request an adjustment,if you need this job advert in an alternative format or if you have any questions about the recruitment process, please contact Resourcing Ops for mid to senior roles, or the Early Careers Team for graduate and apprentice roles.

Great journeys start here, apply now!

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.