National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Lead security engineer

LHH
Luton
6 days ago
Create job alert

The successful candidate will report to the Head of Engineering Products and be responsible for providing security advice to product development teams in a range areas including:
Production of Security Managements Plans, work package descriptions and cost estimates in support of product bids, services and proposals.
Undertaking security risk assessments, risk mitigation plans, mitigation gap analysis and preparation of security management documentation for system Accreditation.
Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities.
Liaison with Security Accreditors and Security Assurance Coordinators in support of security accreditation.
Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams in support of evaluation activities.
Preparation of TEMPEST Control Plans, advising development teams on appropriate implementation techniques and liaising with TEMPEST test facilities.
Advising development teams on suitable platform lockdown and configurations, and supporting Penetration test activities. Prepare and implement through life support and maintenance for product security including vulnerability and patch management plans
Lead security incident management teams during incident/crisis situations in conjunction with Head of Product Security for EW/FCA
Review and maintain corporate product security policies.
Deliver product security training to project engineering teams.
Experience in the development of security solutions for a military &/or commercial products and systems.
Graduate degree in relevant engineering, computing or related scientific discipline, and/or evidence of further professional study.
ISC2Certified Information System Security Professional.
Security, HMG IS1&2, ISO27000 series standards, NIST SP800 series standards, JSP440, JSP604, guidance material provided by NCSC, CPNI and NIST.
Practical experience of producing Security Accreditation documentation
Practical experience of NCSC and Common Criteria security evaluation techniques.
Knowledge of current crypto technologies and key management systems
Understanding operating systems, firmware and software security controls and how to apply them.
Understanding of existing, current and emerging technologies including cloud, virtualisation and web
Enterprise Security Architectures (SABSA, MODAF).

working full time hours which can often be in a demanding environment, with occasional travel throughout the UK and abroad. The role allows for working from home but there will be times you will be expected to attend site, for face to face meetings and when working with sensitive material.

Security Clearance

You must be eligible for full security clearance. Knowledge of Quantum Cryptography & Quantum Key management.


~ Current threat intelligence awareness.


~ Knowledge of NATO security policy, risk management and Accreditation.


~ Understanding of the role of advisory boards within the UK Government or NATO for security.

Related Jobs

View all jobs

Lead Security Engineer (OT)

Lead Security Engineer (Luton)

Lead Security Engineer

Lead Security Engineer - Chase UK

Lead Product Security Engineer

OT Security Engineer

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

The Ultimate Assessment-Centre Survival Guide for Cyber Security Jobs in the UK

Assessment centres for cyber security positions in the UK are designed to mirror real-world threat landscapes and test both your technical acumen and soft skills under pressure. Across multiple stages—psychometric assessments, penetration testing exercises, incident response group tasks, case studies, interviews and even informal networking breaks—employers assess your ability to identify vulnerabilities, collaborate in high-stakes scenarios and communicate effectively. This guide walks you through each component, equipping you to stand out and secure your next role in cyber defence.

Top 10 Mistakes Candidates Make When Applying for Cyber Security Jobs—And How to Avoid Them

Avoid the most common pitfalls when applying for cyber security jobs in the UK. Discover the top 10 mistakes candidates make—plus practical fixes, insider tips and curated resources that will help you secure your next infosec role. Introduction Whether it’s a Security-Operations Centre (SOC) in Canary Wharf or a fast-growing threat-intelligence start-up in Manchester, demand for cyber security talent continues to surge. Yet hiring managers on CyberSecurityJobs.tech still reject the majority of applications long before interview—usually for mistakes that can be fixed in minutes. We analysed recent vacancies, spoke with in-house recruiters and combed through the most-read guides on our site. Below is a definitive list of the ten most expensive mistakes we see, each paired with an actionable tip and a trusted resource for deeper reading. Bookmark this page before you press Apply.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.