At Motorola Solutions, we believe that everything starts with our people. We’re a global close-knit community, united by the relentless pursuit to help keep people safer everywhere. We build and connect technologies to help protect people, property and places. Our solutions foster the collaboration that’s critical for safer communities, safer schools, safer hospitals, safer businesses, and ultimately, safer nations. Connect with a career that matters, and help us build a safer future.
Department OverviewAs a world leader in wireless, broadband, and internet technologies, Motorola Solutions is making products smarter—and life better—by unleashing the creativity of thousands of professionals from every corner of the globe.
The Product Safety, Security, and Regulatory Compliance team is responsible for the full lifecycle integrity of our portfolio. This team takes direct ownership of embedded device cybersecurity, ensuring our hardware is resilient against modern threats while simultaneously guaranteeing that all products meet stringent global safety and regulatory requirements.
By partnering with engineering teams worldwide on new product launches, we bridge the gap between innovative design and rigorous compliance. Our team remains a global leader in research, security and standards, with staff holding key roles in international development committees and industry associations to shape the future of secure, compliant technology.
Job Description
This role is mainly remote with occasional travel to the UK and EU offices.
As a global leader in mission-critical technology, Motorola Solutions is looking for a visionary Manager of Cybersecurity Engineering to take direct ownership of the security strategy for our world-class product portfolio. This role is responsible for leading and mentoring a team of cybersecurity professionals, defining and implementing security and compliance for embedded devices, and taking ownership of product integrity throughout its lifecycle. You will bridge the gap between innovative design and global compliance, ensuring our hardware and software remain resilient against emerging threats while strictly adhering to safety and regulatory standards.
Beyond technical oversight, you will act as a strategic advisor, analyzing the real-world impact of vulnerabilities and communicating complex security risks to both technical and executive stakeholders. By fostering collaboration and championing secure coding practices, you will ensure our products meet the highest industry standards. Ultimately, you will play a key role in shaping the future of secure, smarter technologies that make life better and safer for our customers worldwide.
Mission & Strategic Impact
Architect for Defense: Own and drive the comprehensive cybersecurity strategy for Motorola Solutions' mission-critical embedded devices, defending the hardware and software ecosystems that first responders rely on globally.
Anticipate the Adversary: Maintain a relentless pulse on the evolving threat landscape, translating emerging global threats into preemptive, actionable defense mechanisms for our product lines.
Bridge Strategy and Execution: Act as the critical translator between deep technical risk and business strategy, distilling complex security intelligence into decisive action plans for engineering, product managers, and executive leadership.
Technical Mastery & Innovation
Secure by Design: Partner deeply with engineering to integrate resilient, secure hardware and software architectures directly into the DNA of our product development.
Proactive Threat Management: Lead rigorous threat modeling and risk assessments, shifting the paradigm from reactive patching to systematically identifying and neutralizing vulnerabilities before they can be exploited.
Master the Vulnerability Management Lifecycle: Oversee the end-to-end process—from proactive identification and deep-dive analysis to coordinated remediation and final verification.
Real-World Risk Analysis: Evaluate threats not just in a vacuum, but against the operational realities of the field—analyzing exactly how user behavior and tactical deployments intersect with potential attack vectors.
Champion the Secure SDLC: Elevate security from a compliance checkpoint to a core engineering principle, integrating rigorous security standards into every phase of the development lifecycle—from initial design to final deployment.
Leadership & Team Empowerment
Elevate the Talent: Lead, empower, and mentor a specialized team of cybersecurity engineers, driving technical excellence and fostering a culture of rigorous, continuous learning.
Navigate Compliance with Agility: Ensure uncompromised adherence to relevant global security regulations and standards, integrating compliance seamlessly into the development pipeline.
Basic Requirements
- A Proven Leader: You bring 5–10 years of cybersecurity experience, including demonstrating successfully steering teams and mentoring talent to reach their full potential.
- A Technical Strategist: You possess a deep-seated understanding of risk management, threat modeling, and the cryptographic technologies that keep modern systems secure.
- Embedded Expert: You don't just work with software; you have a profound understanding of the intersection between embedded code and hardware architecture.
The Analytical Mind: You thrive on complexity. You can dissect a convoluted technical challenge and drive it toward a decisive, scalable solution.
The Security Translator: You are a master communicator. Whether you are presenting to senior leadership or whiteboarding with engineers, you translate complex security risks into actionable business insights.
Real-World Perspective: You look beyond the CVSS score. You understand how products live in the "wild" and advocate for the safety and privacy of the end-user.
Regulatory Fluency: You are well-versed in industry gold standards like ISO 27001 and the NIST Cybersecurity Framework, treating compliance as a floor, not a ceiling.
Tech-Savvy: You have hands-on experience with a wide array of security orchestration and automation tools.
Certified Expertise: Industry credentials like CISSP, CISM, or CEH are highly regarded.
Cloud Horizons: Experience securing cloud-based ecosystems and infrastructure is a significant plus.
In return for your expertise, we’ll support you in this new challenge with coaching & development every step of the way. Also, to reward your hard work you’ll get:
Competitive salary and bonus schemes.
Two weeks additional pay per year (holiday bonus).
25 days holiday entitlement + bank holidays.
Attractive defined contribution pension scheme.
Employee stock purchase plan.
Flexible working options.
Private medical care.
Life assurance.
Enhanced maternity and paternity pay.
Career development support and wide ranging learning opportunities.
Employee health and wellbeing support EAP, wellbeing guidance etc.
Carbon neutral initiatives/goals.
Corporate social responsibility initiatives including support for volunteering days.
Well known companies discount scheme.
Travel Requirements10-25%
Relocation ProvidedNone
Position TypeExperiencedReferral Payment PlanYesCompanyMotorola Solutions UK Limited
EEO Statement
Motorola Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion or belief, sex, sexual orientation, gender identity, national origin, disability, veteran status or any other legally-protected characteristic.
We are proud of our people-first and community-focused culture, empowering every Motorolan to be their most authentic self and to do their best work to deliver on the promise of a safer world. If you’d like to join our team but feel that you don’t quite meet all of the preferred skills, we’d still love to hear why you think you’d be a great addition to our team.

