logo inner

Senior Product Security Consultant - Defense Systems (UK Nationals)

CENSUS SA%Label_position_type_remote_%, United Kingdom | Remote, Hybrid

About CENSUS


CENSUS LABS is a cybersecurity engineering powerhouse specializing in securing products and organizations. Our identity is rooted in professionalism, engineering excellence, a scientific mindset, and hacking demeanor. We are research-driven, enabling us to deliver a diverse range of professional services. CENSUS is trusted to conduct high-impact product security engagements, helping our clients secure their solutions from design to deployment, using realistic and risk-informed approaches. Our expertise spans end-to-end systems, including Secure Communications, IoT, Medical Devices, Mobile, and Vehicle Computing platforms.

Learn more about CENSUS at census-labs.com.

About the Job


We are seeking a Senior Product Security Consultant to join our Cybersecurity Engineering Defense practice. This hybrid role combines deep technical security evaluation, client-facing pre-sales support, and technical project management. You will play a central role in designing and validating secure systems for the defense sector, aligning with international compliance standards and platform-specific security requirements. You will work with engineering managers, technical stakeholders, and defense clients to assess product security posture, define security controls, and ensure system resilience through structured evaluations.

You will also engage in proposal development, solution scoping, and roadmap planning for security-centric projects in line with mission and operational requirements.

Key Responsibilities


Product Security Evaluation


  • Perform architecture and implementation reviews of embedded, cloud-based, or mission-critical systems.

  • Analyze and validate secure boot flows, cryptographic controls, and firmware integrity mechanisms.

  • Conduct threat modeling and traceability analysis against defense-aligned frameworks (e.g., NIST SP 800-53, NIST RMF, Common Criteria, NATO NIAG, ISO 15408).

  • Evaluate usage of post-quantum and hybrid cryptographic algorithms in secure communication and key management schemes.

  • Conduct security testing of control systems, secure enclaves, radios, mission payload platforms, or ICS/SCADA endpoints.

Defense Industry Compliance & Assurance


  • Map system security evaluations to high-assurance certification needs (e.g., FIPS 140-3, Common Criteria EAL, DoD STIGs, DoDIN APL).

  • Support technical evidence creation for compliance-driven assurance cases and authority-to-operate (ATO) processes.

  • Identify platform-specific hardening strategies (e.g., RTOS, containerized defense apps, ruggedized embedded systems).

Pre-Sales Engineering Support


  • Collaborate with business development to define secure system architectures and value propositions.

  • Author technical sections of proposals, whitepapers, and compliance alignment reports.

  • Translate mission objectives and operational constraints into viable secure-by-design implementation pathways.

  • Conduct technical workshops and demos to engage with defense primes, integrators, and government clients.

Project and Stakeholder Management


  • Lead technical execution of security engagements with clear milestones, deliverables, and resourcing plans.

  • Maintain ongoing communication with client technical leads and internal engineering teams.

  • Ensure deliverables meet both compliance obligations and real-world threat resilience expectations.

Minimum Qualifications


  • MSc or BSc in Computer Science, Electrical/Software Engineering, Cybersecurity, or a related technical discipline.

  • 5+ years of hands-on experience in cybersecurity for embedded systems, secure communications, or mission-critical platforms.

  • Strong technical writing and documentation skills in English.

  • Excellent analytical skills and attention to detail.

Required Skills


  • In-depth understanding of security architecture and common system design patterns (e.g., API gateways, microservices, message queues, service meshes).

  • Hands-on experience performing design-level security reviews and verifying implementation alignment with defined threat models.

  • Familiarity with defense-specific cybersecurity requirements (e.g., DFARS/NIST 800-171, CMMC, MIL-STD-882, STANAGs).

  • Understanding of tactical system constraints and secure integration challenges in C4ISR, unmanned systems, or EW contexts.

  • Exposure to Zero Trust principles in disconnected, intermittently connected, and low-bandwidth environments (D-DIL).

  • Knowledge of authentication, authorization, identity, and secrets management technologies (e.g., OAuth2, MFA, PKI, SSO, Cloud IAM, HashiCorp Vault).

  • Proficiency in applied cryptography (e.g., mTLS, E2EE, AEAD, key derivation, key wrapping, remote attestation).

  • Ability to identify security vulnerabilities across platforms (e.g., OWASP Top 10, misconfigurations, transport security gaps).

  • Excellent documentation and communication skills, able to articulate technical risks and findings to diverse audiences.

  • Experience in collaborative proposal development and interfacing with government acquisition stakeholders.

  • Problem solving skills, analytical thinking, and willingness to learn/grow.

Nice-to-Have Skills


  • Ability to read and analyze source code for logic flaws in one or more language families:

  • Mobile: Swift, Obj-C, Kotlin, Java, Dart, JavaScript

  • Web/Cloud: Java, Python, Go, PHP, Ruby, C#, JavaScript

  • Native/Embedded: C, C++

  • Experience debugging or instrumenting applications across edge, embedded, or cloud platforms.

  • Familiarity with Zero Trust architectures, enclaves, and confidential computing technologies.

  • Exposure to fuzzing, symbolic execution, or static analysis techniques.

  • Experience collaborating with distributed teams across different time zones and cultures.


Life at CENSUS SA

Thrive Here & What We Value1. Collaborative Work Environment2. Efficient Work Environment3. Personal Development Opportunities4. Creative Work Environment5. Equal Opportunity Employer6. Reasonable Accommodations for Disabled Employees7. Prohibition of Harassment Based on Protected Status8. Cuttingedge Research and Scientific Analysis9. Indepth Engineering Experience across Various Industries & Technologies10. Enjoyable Work Environment
Your tracker settings

We use cookies and similar methods to recognize visitors and remember their preferences. We also use them to measure ad campaign effectiveness, target ads and analyze site traffic. To learn more about these methods, including how to disable them, view our Cookie Policy or Privacy Policy.

By tapping `Accept`, you consent to the use of these methods by us and third parties. You can always change your tracker preferences by visiting our Cookie Policy.

logo innerThatStartupJob
Discover the best startup and their job positions, all in one place.
Copyright © 2025