IDA Disassembler Jobs in the South East

4 of 4 IDA Disassembler Jobs in the South East

Cyber Software Vulnerability Engineer

Hampshire, South East, United Kingdom
Forward Role
Looking For Proficiency in one or more of C, C++, Java or C#. Familiarity with scripting and automation using Python, Bash, Powershell or Groovy. Experience working with IDA Pro or Ghidra for reverse engineering Experience working with Linux or Windows-based systems. Awareness of secure coding practices and modern cybersecurity threats. Knowledge of principles used in More ❯
Employment Type: Permanent
Salary: £85,000
Posted:

Malware Analyst

london, south east england, united kingdom
NCC Group
Intelligence Analyst, or similar role with a focus on malware research and response. Strong knowledge of reverse engineering tools and techniques for malware analysis, including tools like IDA Pro, Ghidra, OllyDbg, or similar. Familiarity with programming languages such as Python, C++, or assembly for developing analysis tools and scripts. Expertise in creating and maintaining YARA rules. More ❯
Posted:

Malware Analyst

slough, south east england, united kingdom
NCC Group
Intelligence Analyst, or similar role with a focus on malware research and response. Strong knowledge of reverse engineering tools and techniques for malware analysis, including tools like IDA Pro, Ghidra, OllyDbg, or similar. Familiarity with programming languages such as Python, C++, or assembly for developing analysis tools and scripts. Expertise in creating and maintaining YARA rules. More ❯
Posted:

Malware Analyst

london (city of london), south east england, united kingdom
NCC Group
Intelligence Analyst, or similar role with a focus on malware research and response. Strong knowledge of reverse engineering tools and techniques for malware analysis, including tools like IDA Pro, Ghidra, OllyDbg, or similar. Familiarity with programming languages such as Python, C++, or assembly for developing analysis tools and scripts. Expertise in creating and maintaining YARA rules. More ❯
Posted: