challenges of a kind not previously addressed by big tech. It's working fast, at scale, and we're making a difference. Responsibilities: Conduct vulnerabilityresearch of the native components of the most critical systems and products (mobile and desktop apps, cloud). Collaborate closely with other security … and products. Bring insight into all aspects of modern security issues to our products and rapidly developing prototypes for mitigations. Support Red Team with vulnerabilityresearch and exploit development. Minimum Qualifications: Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, or other relevant majors. 3+ years of … experience in ethical hacking, vulnerabilityresearch, product security, exploit development, or being a member of a red team. First-hand experience in C/C++ reviews, fuzzing, reverse engineering, and binary exploitation. Advanced knowledge and understanding in at least one of the following disciplines: end-user device security More ❯
understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Researcher Requisition ID: 121399 Location: Manchester - Full-time onsite work required, with consideration for both full and part-time applicants - please speak to your … recruiter about the options Grade: GG10 - GG12 Our world-class team of Vulnerability Researchers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are looking for a diverse range of talent from experienced Vulnerability … important is a willingness to learn as all of our projects bring new and interesting challenges. What you will be doing for us: Performing VulnerabilityResearch and Reverse Engineering to handle complex and unique challenges across a myriad of platforms. Learning to use tools like Ghidra, IDA Pro More ❯
understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Researcher Requisition ID: 121396 Location: Gloucester or London - Full-time onsite work required, with consideration for both full and part-time applicants - please speak … to your recruiter about the options Grade: GG10 - GG12 Our world class team of Vulnerability Researchers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are growing our VR team significantly and are looking … for a diverse range of talent from experienced Vulnerability Researchers with a proven track record to those with a keen interest and aptitude looking to develop their skills in this exciting space! We have a community of technical specialists with a friendly and inclusive culture with great opportunities to More ❯
Cambridge, Cambridgeshire, UK Hybrid / WFH Options
ARM
and identify, analyze and mitigate security risks in architecture specifications, as well good interpersonal skills for cross site collaborations. You will also be performing vulnerabilityresearch and develop security validation collateral. Ensuring timely delivery of the security collaterals in an evolving environment is a challenge which will stretch … strive for continuous improvement and are a hands-on team member this position would be of interest to you. Responsibilities: Conduct comprehensive threat modelling, vulnerability analysis, and security risk assessments of Arm architecture specifications spanning CPU, Software, and System architectures. Collaborate with architecture development, implementation, and vulnerabilityresearch … of planning, reviews, status updates and meetings, as well as delivery against expectation. Required Skills and Experience: Strong understanding of security principles, threat modelling, vulnerability analysis, and security risk assessment. Demonstrated ability in computer security - Security risk analysis of hardware/software architecture/implementations, played CTFs, published researchMore ❯
Cloud (ADC) roles engage with AWS customers who require specialized security solutions for their cloud services. The ReSec Red Team members participate in security research and review, penetration testing, threat modeling and design. We are looking for a Senior Security Engineer with a focus on database security to help … ensure our services and applications are designed and implemented to the highest security standards. We need individuals who are passionate about security and vulnerabilityresearch as well as database technologies. BASIC QUALIFICATIONS 6+ years' experience in software security (vulnerabilityresearch, penetration testing, etc) Bachelors' degree in … break things"). Experience performing or supporting Red Team engagements/penetration testing Participation in computer security competitions (CTFs), Bug Bounty programs, opensource security research, CVE analysis Domain expertise in at least 3 of: security architecture and engineering, communication and network security, identity and access management (IAM), security assessment More ❯
infrastructure to benchmark the progress of advanced AI capabilities in the domain of cyber security. Our goal is to carry out and publish scientific research supporting a global effort to understand the risks and improve the safety of advanced AI systems. Our current focus is on doing this by … tasks that we can measure the performance of AI agents against. We are building a cross-functional team of cybersecurity researchers, machine learning researchers, research engineers and infrastructure engineers to help us create new kinds of capability and safety evaluations. As such to scale up we require all candidates … AI systems as they are released. JOB SUMMARY As a Cyber Security Researcher at AISI your role will range from helping design our overall research strategy and threat model, to working with research and infrastructure engineers to build environments and challenges against which to benchmark the capabilities of More ❯
scripting/programming languages. Strong knowledge of penetration testing tools (e.g., Metasploit, Burp Suite, Nmap, Wireshark). Experience with reverse engineering, exploit development, and vulnerability research. Familiarity with operating systems (Windows, Linux, macOS) and their security mechanisms. Understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge More ❯
track record of end-to-end testing of complex systems. Coordinate and execute system/network level pen tests and ethical hacking exercises. Proactively research and identify network and system vulnerabilities and provide recommended countermeasures or controls to reduce risk to an acceptable and manageable level. Review results of … SANS Top 25 web application and network vulnerabilities. Expertise and experience in web/API application and network penetration testing. Knowledge of exploit development, vulnerabilityresearch/reporting, or writing system modules in C & C++, a major advantage and added bonus. Detailed understanding of OSI and TCP stack … understanding of protecting AI and LLMs through tailored penetration testing methodologies and practices. Prior knowledge or academic familiarity with reverse engineering, malware analysis, security research, and forensic tools will be an added advantage. Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race More ❯
of end to end testing of complex systems. Co-ordinate and execute system/network level pen tests and ethical hacking exercises. Pro-actively research and identify network and system vulnerabilities and provide recommended counter measures or controls to reduce risk to acceptable and manageable level. Review results of … SANS Top 25 web application and network vulnerabilities. Expertise and experience in web/API application and network penetration testing. Knowledge of exploit development, vulnerabilityresearch/reporting or writing system modules in C & C++, a major advantage and added bonus. Detailed understanding of OSI and TCP stack … understanding of protecting AI and LLMs through tailored penetration testing methodologies and practices. Prior knowledge or academic familiarity with reverse engineering, malware analysis, security research and forensic tools will be an added advantage. Additional Information Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard More ❯
offensive security testing on software supply chains including CI/CD systems, source control, and dependency-based attack vectors Participation in bug bounties, CTFs, vulnerabilityresearch, open source tool development, and security presentations Ability to learn and apply new technologies quickly and in complex deployments Experience testing AI More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
BAE Systems (New)
and find your specialism - whether that's being a high-assurance developer, a researcher pulling apart all sorts of technology, or a cutting-edge vulnerability researcher. Who we're looking for: We want people who love to code. Someone with the right attitude and aptitude for solving complex problems. … knowledge of modern software engineering practices would be a bonus. Special consideration will be given to individuals who demonstrate an interest and aptitude for vulnerabilityresearch or reverse engineering e.g. by playing Capture The Flag challenges. Why join us? Operational Cyber Group addresses the most critical cyber needs More ❯
you gain new security skills in the course of your duties. Key job responsibilities Security reviews for hardware including servers and devices. Penetration testing & vulnerability research. Threat modeling. Security training and outreach to internal development teams. Security guidance documentation. Assistance with recruiting activities. BASIC QUALIFICATIONS BS in Computer Science More ❯
you gain new security skills in the course of your duties. Key job responsibilities Security reviews for hardware including servers and devices. Penetration testing & vulnerability research. Threat modeling. Security training and outreach to internal development teams. Security guidance documentation. Assistance with recruiting activities. About the team Diverse Experiences Amazon More ❯
teams to continuously validate security throughout the service/system lifecycle. You will be an expert across multiple domains such as cyber security; threat, vulnerability and risk assessments (TVRA), security tools (e.g. Splunk, Crowstrike, etc.), application of security frameworks (e.g. ISM, NIST, etc.) and/or implementation and monitoring … standard and generating high-quality testing plans and reports, striving for excellence in security testing procedures. Conducting offensive security testing and engaging in ongoing vulnerabilityresearch to proactively identify potential risks. Systematically identifying vulnerabilities and meticulously tracking them to facilitate timely remediation efforts. Staying ahead of emerging threats More ❯
teams to continuously validate security throughout the service/system lifecycle. You will be an expert across multiple domains such as cyber security; threat, vulnerability and risk assessments (TVRA), security tools (e.g. Splunk, Crowstrike, etc.), application of security frameworks (e.g. ISM, NIST, etc.) and/or implementation and monitoring … standard and generating high-quality testing plans and reports, striving for excellence in security testing procedures. Conducting offensive security testing and engaging in ongoing vulnerabilityresearch to proactively identify potential risks. Systematically identifying vulnerabilities and meticulously tracking them to facilitate timely remediation efforts. Staying ahead of emerging threats More ❯
My client is looking for experienced Cyber Security candidates with a background in research, cyber security or ethical hacking, to join their team based in Cheltenham. You'd be joining a team of highly experienced, deeply technical and passionate people, focused on delivering quality solutions that blend rapid development … cyber security research and software engineering skills. The Role: Working alongside hugely talented and respected researchers, vulnerability researchers and software engineers. Tackling a wide range of challenging problems using various technologies. Conducting cutting-edge, novel and world-leading research. Designing and producing niche solutions with immediate real-world … things. Continually learning new skills and technologies. Candidates must have the following skills/experience: Several years experience working in Cyber Security; ideally on research focused projects. Familiarity with C, C++, or Python. Experience and knowledge of operating system internals (desktop, mobile or embedded systems). Reverse Engineering or More ❯