Embedded Software Lead

Hook, Hampshire
1 week ago
Create job alert

Embedded Software Lead - Layer2-3 Network Protocol Lead

Certain Advantage are recruiting on behalf of our innovative defence tech sector client for an Embedded Software Lead to join a multidisciplinary team advancing the possibilities of underwater secure acoustics communications.

As the Layer 2-3 Lead you will work in a multidisciplinary team of Chief Scientist & Chief Engineer, and, working alongside the Layer 1 Lead , you will be responsible for implementing, testing and supporting acoustic protocol developments in a new family of products for use in military environments.

Working with the Chief scientist, Layer 1 (Physical) Lead, and external SMEs you will help to specify, develop, implement & document, application tuned, layer 2 and layer 3 protocol solutions, aligned with hardened military off the shelf deployment hardware platforms.

Key focus areas for this role

Protocol Development: new and emerging networking protocols for Layer 1-3,
Shaping Standards: next-generation acoustic communication standards.
Performance Optimization: Build high-performance, low-latency solutions for real-time and mission-critical applications
Challenging Channel Solutions: Develop protocols capable of overcoming noise, interference, and unpredictable conditions in environments such as wireless, satellite, and battlefield communications.
Testing and Validation: Devise and execute test plans to evaluate protocol performance, reliability, and interoperability under extreme operating conditions.
Multiplatform Build and Deployment: Developing, testing, and deploying code through multiplatform build tools and deployment pipelines
Cybersecurity IntegrationYour experience

Ability to gain SC security clearance if not already Active
Bachelor's or Master's degree in Computer Science, Electrical Engineering, or a related field.
Expertise in programming languages like C, C++, and/or Rust, with a focus on low-level networking development, preferably against defence related requirements.
Strong understanding of networking concepts, including Layer 1-3 fundamentals, and a passion for creating innovative solutions beyond existing standards.
Proficiency in multiplatform build and deployment tools such as CMake, Bazel, Make, or Ninja, and version control systems like Git.
Proficiency in developing and applying tools for embedded system performance analysis and debugging.

Does this sound like your next career move? Apply today! - and feel free to follow up with a direct message on LinkedIn!

Working with Certain Advantage

We go the extra mile to find the best people for the job. If you're hunting for a role where you can make an impact and grow your career, we'll work with you to find it.

We work with businesses across the UK to find the best people in Finance, Marketing, IT and Engineering.

If this job isn't for you, head to (url removed) and register for job alerts and career guidance tips

Related Jobs

View all jobs

Information Security Architect

Information Security Architect

Staff Electronics Hardware Lead Engineer

Global Risk Security Architect Expert Director

Risk Manager

Senior SoC RTL Engineer

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs for Non‑Technical Professionals: Where Do You Fit In?

Defence Needs More Than Hackers in Hoodies When headlines warn of ransomware crippling hospitals or deepfakes swaying elections, we picture hoodie‑clad hackers and elite penetration testers. Yet the reality of the UK’s cyber security sector is broader—and desperately short of talent. The Department for Science, Innovation & Technology (DSIT) estimates a shortfall of 11,200 cyber security professionals in 2024, while 43 % of advertised roles require governance, risk or communication skills rather than hands‑on technical exploits. Put plainly: if you can guide policy, manage projects, interpret regulations or inspire behaviour change, cyber security wants you. This guide highlights the fastest‑growing non‑technical roles, the transferable skills you already possess, and a concrete 90‑day plan to land a cyber security job—no packet sniffers required.

BAE Systems Cybersecurity Jobs in 2025: Your Complete UK Guide to Protecting Governments, Businesses and Critical Infrastructure

From securing the Royal Navy’s new Dreadnought submarines to foiling multimillion‑pound fraud rings, BAE Systems Digital Intelligence (DI)—formerly Detica—sits at the sharp end of global cyber defence. Head‑quartered in Guildford with hubs in Gloucester, Leeds and London, the 5,500‑strong DI business delivers threat‑intelligence platforms, secure‑by‑design software and 24/7 SOC services to government and commercial clients worldwide. With escalating ransomware, AI‑driven disinformation and complex supply‑chain threats, BAE plans to expand its UK cyber workforce by 20 % in 2025. Whether you’re a graduate passionate about reverse engineering, a DevSecOps engineer who loves IaC, or an incident‑response pro comfortable in high‑side environments, this guide explains how to land a BAE Systems cybersecurity job in 2025.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.