National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Senior Product Security Consultant - Defense Systems (UK Nationals)

CENSUS
London
2 weeks ago
Applications closed

Related Jobs

View all jobs

Senior Product Security Engineer

Senior Information Security Consultant

Senior Information Security Consultant

Cybersecurity Assurance Consultant

Senior Cloud Security Consultant

Senior Cyber Security Consultant

Senior Product Security Consultant - Defense Systems (UK Nationals)

Join to apply for theSenior Product Security Consultant - Defense Systems (UK Nationals)role atCENSUS

Continue with Google Continue with Google

Senior Product Security Consultant - Defense Systems (UK Nationals)

2 days ago Be among the first 25 applicants

Join to apply for theSenior Product Security Consultant - Defense Systems (UK Nationals)role atCENSUS

Get AI-powered advice on this job and more exclusive features.

About CENSUS

CENSUS LABS is a cybersecurity engineering powerhouse specializing in securing products and organizations. Our identity is rooted in professionalism, engineering excellence, a scientific mindset, and hacking demeanor. We are research-driven, enabling us to deliver a diverse range of professional services.

About CENSUS

CENSUS LABS is a cybersecurity engineering powerhouse specializing in securing products and organizations. Our identity is rooted in professionalism, engineering excellence, a scientific mindset, and hacking demeanor. We are research-driven, enabling us to deliver a diverse range of professional services.

CENSUS is trusted to conduct high-impact product security engagements, helping our clients secure their solutions from design to deployment, using realistic and risk-informed approaches. Our expertise spans end-to-end systems, including Secure Communications, IoT, Medical Devices, Mobile, and Vehicle Computing platforms.

Learn more about CENSUS at census-labs.com.

About The Job

We are seeking a Senior Product Security Consultant to join our Cybersecurity Engineering Defense practice. This hybrid role combines deep technical security evaluation, client-facing pre-sales support, and technical project management. You will play a central role in designing and validating secure systems for the defense sector, aligning with international compliance standards and platform-specific security requirements.

You will work with engineering managers, technical stakeholders, and defense clients to assess product security posture, define security controls, and ensure system resilience through structured evaluations. You will also engage in proposal development, solution scoping, and roadmap planning for security-centric projects in line with mission and operational requirements.

Key Responsibilities

Product Security Evaluation

  • Perform architecture and implementation reviews of embedded, cloud-based, or mission-critical systems.
  • Analyze and validate secure boot flows, cryptographic controls, and firmware integrity mechanisms.
  • Conduct threat modeling and traceability analysis against defense-aligned frameworks (e.g., NIST SP 800-53, NIST RMF, Common Criteria, NATO NIAG, ISO 15408).
  • Evaluate usage of post-quantum and hybrid cryptographic algorithms in secure communication and key management schemes.
  • Conduct security testing of control systems, secure enclaves, radios, mission payload platforms, or ICS/SCADA endpoints.

Defense Industry Compliance & Assurance

  • Map system security evaluations to high-assurance certification needs (e.g., FIPS 140-3, Common Criteria EAL, DoD STIGs, DoDIN APL).
  • Support technical evidence creation for compliance-driven assurance cases and authority-to-operate (ATO) processes.
  • Identify platform-specific hardening strategies (e.g., RTOS, containerized defense apps, ruggedized embedded systems).

Pre-Sales Engineering Support

  • Collaborate with business development to define secure system architectures and value propositions.
  • Author technical sections of proposals, whitepapers, and compliance alignment reports.
  • Translate mission objectives and operational constraints into viable secure-by-design implementation pathways.
  • Conduct technical workshops and demos to engage with defense primes, integrators, and government clients.

Project and Stakeholder Management

  • Lead technical execution of security engagements with clear milestones, deliverables, and resourcing plans.
  • Maintain ongoing communication with client technical leads and internal engineering teams.
  • Ensure deliverables meet both compliance obligations and real-world threat resilience expectations.

Minimum Qualifications

  • MSc or BSc in Computer Science, Electrical/Software Engineering, Cybersecurity, or a related technical discipline.
  • 5+ years of hands-on experience in cybersecurity for embedded systems, secure communications, or mission-critical platforms.
  • Strong technical writing and documentation skills in English.
  • Excellent analytical skills and attention to detail.

Required Skills

  • In-depth understanding of security architecture and common system design patterns (e.g., API gateways, microservices, message queues, service meshes).
  • Hands-on experience performing design-level security reviews and verifying implementation alignment with defined threat models.
  • Familiarity with defense-specific cybersecurity requirements (e.g., DFARS/NIST 800-171, CMMC, MIL-STD-882, STANAGs).
  • Understanding of tactical system constraints and secure integration challenges in C4ISR, unmanned systems, or EW contexts.
  • Exposure to Zero Trust principles in disconnected, intermittently connected, and low-bandwidth environments (D-DIL).
  • Knowledge of authentication, authorization, identity, and secrets management technologies (e.g., OAuth2, MFA, PKI, SSO, Cloud IAM, HashiCorp Vault).
  • Proficiency in applied cryptography (e.g., mTLS, E2EE, AEAD, key derivation, key wrapping, remote attestation).
  • Ability to identify security vulnerabilities across platforms (e.g., OWASP Top 10, misconfigurations, transport security gaps).
  • Excellent documentation and communication skills, able to articulate technical risks and findings to diverse audiences.
  • Experience in collaborative proposal development and interfacing with government acquisition stakeholders.
  • Problem solving skills, analytical thinking, and willingness to learn/grow.

Nice-to-Have Skills

  • Ability to read and analyze source code for logic flaws in one or more language families:
  • Mobile: Swift, Obj-C, Kotlin, Java, Dart, JavaScript
  • Web/Cloud: Java, Python, Go, PHP, Ruby, C#, JavaScript
  • Native/Embedded: C, C++
  • Experience debugging or instrumenting applications across edge, embedded, or cloud platforms.
  • Familiarity with Zero Trust architectures, enclaves, and confidential computing technologies.
  • Exposure to fuzzing, symbolic execution, or static analysis techniques.
  • Experience collaborating with distributed teams across different time zones and cultures.

Seniority level

  • Seniority levelMid-Senior level

Employment type

  • Employment typeFull-time

Job function

  • Job functionInformation Technology
  • IndustriesComputer and Network Security

Referrals increase your chances of interviewing at CENSUS by 2x

Sign in to set job alerts for “Product Security Consultant” roles.

London, England, United Kingdom 1 week ago

Salesforce Industry Architect (Automotive)

Feltham, England, United Kingdom 2 weeks ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.


#J-18808-Ljbffr

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs Skills Radar 2026: Emerging Frameworks, Tools & Certifications to Learn Now

Cyber threats are evolving—and so must the people defending against them. As ransomware, AI-enhanced phishing, and supply chain attacks grow more advanced, UK employers are urgently hiring cyber security professionals with the right mix of strategic and hands-on skills. Welcome to the Cyber Security Jobs Skills Radar 2026, your go-to guide for the most in-demand tools, frameworks, certifications, and technologies shaping the UK's cyber workforce. Whether you're a SOC analyst, penetration tester, or cloud security architect, this annual radar is designed to help you stay ahead of the market.

How to Find Hidden Cyber Security Jobs in the UK Using Professional Bodies like BCS, CIISec & More

The demand for skilled cyber security professionals in the UK has never been higher. With threats increasing in sophistication and frequency, organisations are urgently hiring ethical hackers, threat analysts, GRC specialists, and security architects. But many of the most valuable roles—particularly in government, defence, and critical infrastructure—are never publicly advertised. Instead, these jobs are shared behind the scenes through trusted networks, private communities, and professional bodies. In this article, we explore how to uncover hidden cyber security jobs in the UK using organisations like the BCS (The Chartered Institute for IT), CIISec (The Chartered Institute of Information Security), ISACA, and ISC² UK Chapter. We’ll show you how to use membership directories, special interest groups, CPD events and informal networks to gain early access to roles most people never see.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.