Permanent Vulnerability Research Jobs in England

16 of 16 Permanent Vulnerability Research Jobs in England

Security Engineer - Offensive Security, Native

London, UK
TN United Kingdom
challenges of a kind not previously addressed by big tech. It's working fast, at scale, and we're making a difference. Responsibilities: Conduct vulnerability research of the native components of the most critical systems and products (mobile and desktop apps, cloud). Collaborate closely with other security … and products. Bring insight into all aspects of modern security issues to our products and rapidly developing prototypes for mitigations. Support Red Team with vulnerability research and exploit development. Minimum Qualifications: Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, or other relevant majors. 3+ years of … experience in ethical hacking, vulnerability research, product security, exploit development, or being a member of a red team. First-hand experience in C/C++ reviews, fuzzing, reverse engineering, and binary exploitation. Advanced knowledge and understanding in at least one of the following disciplines: end-user device security More ❯
Posted:

Vulnerability Researcher- Manchester

Manchester, North West
BAE Systems
understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Researcher Requisition ID: 121399 Location: Manchester - Full-time onsite work required, with consideration for both full and part-time applicants - please speak to your … recruiter about the options Grade: GG10 - GG12 Our world-class team of Vulnerability Researchers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are looking for a diverse range of talent from experienced Vulnerability … important is a willingness to learn as all of our projects bring new and interesting challenges. What you will be doing for us: Performing Vulnerability Research and Reverse Engineering to handle complex and unique challenges across a myriad of platforms. Learning to use tools like Ghidra, IDA Pro More ❯
Employment Type: Permanent
Posted:

Vulnerability Researcher

Gloucester, Gloucestershire, South West
BAE Systems
understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Researcher Requisition ID: 121396 Location: Gloucester or London - Full-time onsite work required, with consideration for both full and part-time applicants - please speak … to your recruiter about the options Grade: GG10 - GG12 Our world class team of Vulnerability Researchers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are growing our VR team significantly and are looking … for a diverse range of talent from experienced Vulnerability Researchers with a proven track record to those with a keen interest and aptitude looking to develop their skills in this exciting space! We have a community of technical specialists with a friendly and inclusive culture with great opportunities to More ❯
Employment Type: Permanent
Posted:

Senior Security Engineer (Research)

Cambridge, Cambridgeshire, UK
Hybrid / WFH Options
ARM
and identify, analyze and mitigate security risks in architecture specifications, as well good interpersonal skills for cross site collaborations. You will also be performing vulnerability research and develop security validation collateral. Ensuring timely delivery of the security collaterals in an evolving environment is a challenge which will stretch … strive for continuous improvement and are a hands-on team member this position would be of interest to you. Responsibilities: Conduct comprehensive threat modelling, vulnerability analysis, and security risk assessments of Arm architecture specifications spanning CPU, Software, and System architectures. Collaborate with architecture development, implementation, and vulnerability research … of planning, reviews, status updates and meetings, as well as delivery against expectation. Required Skills and Experience: Strong understanding of security principles, threat modelling, vulnerability analysis, and security risk assessment. Demonstrated ability in computer security - Security risk analysis of hardware/software architecture/implementations, played CTFs, published research More ❯
Posted:

Senior Security Engineer, ReSec Red Team

London, United Kingdom
Amazon
Cloud (ADC) roles engage with AWS customers who require specialized security solutions for their cloud services. The ReSec Red Team members participate in security research and review, penetration testing, threat modeling and design. We are looking for a Senior Security Engineer with a focus on database security to help … ensure our services and applications are designed and implemented to the highest security standards. We need individuals who are passionate about security and vulnerability research as well as database technologies. BASIC QUALIFICATIONS 6+ years' experience in software security (vulnerability research, penetration testing, etc) Bachelors' degree in … break things"). Experience performing or supporting Red Team engagements/penetration testing Participation in computer security competitions (CTFs), Bug Bounty programs, opensource security research, CVE analysis Domain expertise in at least 3 of: security architecture and engineering, communication and network security, identity and access management (IAM), security assessment More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security researcher

London, UK
Hybrid / WFH Options
AI Security Institute
infrastructure to benchmark the progress of advanced AI capabilities in the domain of cyber security. Our goal is to carry out and publish scientific research supporting a global effort to understand the risks and improve the safety of advanced AI systems. Our current focus is on doing this by … tasks that we can measure the performance of AI agents against. We are building a cross-functional team of cybersecurity researchers, machine learning researchers, research engineers and infrastructure engineers to help us create new kinds of capability and safety evaluations. As such to scale up we require all candidates … AI systems as they are released. JOB SUMMARY As a Cyber Security Researcher at AISI your role will range from helping design our overall research strategy and threat model, to working with research and infrastructure engineers to build environments and challenges against which to benchmark the capabilities of More ❯
Posted:

Senior Penetration Tester / Ethical Hacker (C++, C#, PowerShell)

London, UK
NEUROTIC
scripting/programming languages. Strong knowledge of penetration testing tools (e.g., Metasploit, Burp Suite, Nmap, Wireshark). Experience with reverse engineering, exploit development, and vulnerability research. Familiarity with operating systems (Windows, Linux, macOS) and their security mechanisms. Understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge More ❯
Posted:

Penetration Tester

London, UK
Visa Inc
track record of end-to-end testing of complex systems. Coordinate and execute system/network level pen tests and ethical hacking exercises. Proactively research and identify network and system vulnerabilities and provide recommended countermeasures or controls to reduce risk to an acceptable and manageable level. Review results of … SANS Top 25 web application and network vulnerabilities. Expertise and experience in web/API application and network penetration testing. Knowledge of exploit development, vulnerability research/reporting, or writing system modules in C & C++, a major advantage and added bonus. Detailed understanding of OSI and TCP stack … understanding of protecting AI and LLMs through tailored penetration testing methodologies and practices. Prior knowledge or academic familiarity with reverse engineering, malware analysis, security research, and forensic tools will be an added advantage. Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race More ❯
Posted:

Penetration Tester

London, UK
Visa
of end to end testing of complex systems. Co-ordinate and execute system/network level pen tests and ethical hacking exercises. Pro-actively research and identify network and system vulnerabilities and provide recommended counter measures or controls to reduce risk to acceptable and manageable level. Review results of … SANS Top 25 web application and network vulnerabilities. Expertise and experience in web/API application and network penetration testing. Knowledge of exploit development, vulnerability research/reporting or writing system modules in C & C++, a major advantage and added bonus. Detailed understanding of OSI and TCP stack … understanding of protecting AI and LLMs through tailored penetration testing methodologies and practices. Prior knowledge or academic familiarity with reverse engineering, malware analysis, security research and forensic tools will be an added advantage. Additional Information Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard More ❯
Posted:

Offensive Security Engineer

London, United Kingdom
Hybrid / WFH Options
Palantir Technologies
offensive security testing on software supply chains including CI/CD systems, source control, and dependency-based attack vectors Participation in bug bounties, CTFs, vulnerability research, open source tool development, and security presentations Ability to learn and apply new technologies quickly and in complex deployments Experience testing AI More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

National Security Cyber Accelerator Programme - Gloucester

Gloucester, Gloucestershire, United Kingdom
Hybrid / WFH Options
BAE Systems (New)
and find your specialism - whether that's being a high-assurance developer, a researcher pulling apart all sorts of technology, or a cutting-edge vulnerability researcher. Who we're looking for: We want people who love to code. Someone with the right attitude and aptitude for solving complex problems. … knowledge of modern software engineering practices would be a bonus. Special consideration will be given to individuals who demonstrate an interest and aptitude for vulnerability research or reverse engineering e.g. by playing Capture The Flag challenges. Why join us? Operational Cyber Group addresses the most critical cyber needs More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer - Hardware, Firmware, Virtualization, Secure Hardware And Foundational Techno[...]

London, UK
Amazon
you gain new security skills in the course of your duties. Key job responsibilities Security reviews for hardware including servers and devices. Penetration testing & vulnerability research. Threat modeling. Security training and outreach to internal development teams. Security guidance documentation. Assistance with recruiting activities. BASIC QUALIFICATIONS BS in Computer Science More ❯
Posted:

Security Engineer - Hardware, Firmware, Virtualization, Secure Hardware And Foundational Technologie

London, UK
Amazon
you gain new security skills in the course of your duties. Key job responsibilities Security reviews for hardware including servers and devices. Penetration testing & vulnerability research. Threat modeling. Security training and outreach to internal development teams. Security guidance documentation. Assistance with recruiting activities. About the team Diverse Experiences Amazon More ❯
Posted:

Principal Security Engineer, AWS Security

London, United Kingdom
Amazon
teams to continuously validate security throughout the service/system lifecycle. You will be an expert across multiple domains such as cyber security; threat, vulnerability and risk assessments (TVRA), security tools (e.g. Splunk, Crowstrike, etc.), application of security frameworks (e.g. ISM, NIST, etc.) and/or implementation and monitoring … standard and generating high-quality testing plans and reports, striving for excellence in security testing procedures. Conducting offensive security testing and engaging in ongoing vulnerability research to proactively identify potential risks. Systematically identifying vulnerabilities and meticulously tracking them to facilitate timely remediation efforts. Staying ahead of emerging threats More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Principal Security Engineer, AWS Secuirty

London, UK
Amazon
teams to continuously validate security throughout the service/system lifecycle. You will be an expert across multiple domains such as cyber security; threat, vulnerability and risk assessments (TVRA), security tools (e.g. Splunk, Crowstrike, etc.), application of security frameworks (e.g. ISM, NIST, etc.) and/or implementation and monitoring … standard and generating high-quality testing plans and reports, striving for excellence in security testing procedures. Conducting offensive security testing and engaging in ongoing vulnerability research to proactively identify potential risks. Systematically identifying vulnerabilities and meticulously tracking them to facilitate timely remediation efforts. Staying ahead of emerging threats More ❯
Posted:

Cyber Security Consultant

Cheltenham, Gloucestershire, UK
Berkeley Square IT
My client is looking for experienced Cyber Security candidates with a background in research, cyber security or ethical hacking, to join their team based in Cheltenham. You'd be joining a team of highly experienced, deeply technical and passionate people, focused on delivering quality solutions that blend rapid development … cyber security research and software engineering skills. The Role: Working alongside hugely talented and respected researchers, vulnerability researchers and software engineers. Tackling a wide range of challenging problems using various technologies. Conducting cutting-edge, novel and world-leading research. Designing and producing niche solutions with immediate real-world … things. Continually learning new skills and technologies. Candidates must have the following skills/experience: Several years experience working in Cyber Security; ideally on research focused projects. Familiarity with C, C++, or Python. Experience and knowledge of operating system internals (desktop, mobile or embedded systems). Reverse Engineering or More ❯
Posted:
Vulnerability Research
England
10th Percentile
£89,500
25th Percentile
£96,250
Median
£100,000