Principal Cybersecurity Researcher (ReverseEngineering) London, UK With 1,000 intelligence professionals, over $300M in sales, and serving over 1,900 clients worldwide, Recorded Future is the world's most advanced, and largest, intelligence company! Reversing Emulation and Testing (RET) is a core function of Insikt Group's Technical Analysis (TA) Team. We seek a principal technical threat … researcher with deep subject-matter expertise across malware analysis, reverseengineering, and malicious tooling. This role requires the ability to lead high-impact research and drive innovation in analytical capabilities within Insikt Group. You will guide and shape technical research into state-sponsored and cybercriminal malware, collaborating across functional intelligence teams to support finished intelligence reporting and platform … enrichment. Your responsibilities will include not only conducting advanced malware reverseengineering and infrastructure emulation but also designing and implementing internal tools and workflows that increase our team's efficiency. You will be expected to develop and formalize novel approaches to dynamic analysis, configuration extraction, and threat behavior modeling. This position entails representing Insikt Group's technical threat More ❯
at dissecting technical systems, not just to understand how they work, but to identify weaknesses, assess risks, and develop mitigation strategies. What You'll Be Doing Software analysis and reverseengineering of compiled or interpreted code that could be obfuscated or defensively structured, for either x86/x64 or ARM processor architectures. Reverseengineering a wide … range of technologies to uncover vulnerabilities and improve security including operating systems and/or firmware internals, security architectures and hardware abstraction. Engineering software from design to delivery in modern IDEs and languages, using Agile delivery. Creating tested and testable code. Integrating with automated verification systems, CI and CD pipelines. Working closely with cybersecurity teams to prioritize vulnerabilities and … in one or more of C, C++, Java or C#. Familiarity with scripting and automation using Python, Bash, Powershell or Groovy. Experience working with IDA Pro or Ghidra for reverseengineering Experience working with Linux or Windows-based systems. Awareness of secure coding practices and modern cybersecurity threats. Knowledge of principles used in Agile environments. Desirable exposure Any More ❯
please speak to your recruiter about the options Requisition ID: 121884 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverseengineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for our … customers across a wide variety of platforms and technologies. We are looking for experienced Vulnerability Researchers and Reverse Engineers who want to have a meaningful and tangible impact on the National Security of the UK. Whether you have worked in this space before or not, you will receive a dedicated training budget, along with all the mentorship and support … to succeed in our team. Role Description Technical delivery: perform vulnerability research and/or reverseengineering on complex and unique challenges, across a myriad of platforms. Mentorship, team-leadership, and collaboration: deliver your research as part of a team, whilst knowledge-sharing and mentoring junior team-members. Adaptability: work across a range of tools and platforms, picking More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
plus strong scripting ability in Python for automation. Solid understanding of memory-safety vulnerabilities, undefined behaviour, sanitisers, and compiler instrumentation. Demonstrated ability to triage crashes using debuggers, profilers, and reverse-engineering tools (gdb/lldb, IDA/Ghidra). Excellent written communication for documenting findings and influencing engineering teams. "Nice To Have" Skills and Experience : Contributions to … Knowledge ofdistributed fuzzing at scale (GCP/AWS, Kubernetes, or bare-metal clusters). Familiarity with kernel, embedded, or firmware fuzzing (e.g., Syzkaller, QEMU-based harnesses). Background in reverseengineering, static analysis or symbolic execution. Experience integrating fuzzing intoCI/CD pipelines and tracking coverage metrics. If you're passionate about breaking software safely, love high-coverage More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Salt Search
support a high-profile planning transformation programme. This role will play a critical part in shaping the future of the council's planning data landscape. You'll lead the reverseengineering of an existing legacy planning system and design the target-state architecture that will support future reprocurement and wider service reform. Key Responsibilities: Reverse engineer the … analysts, and digital teams to align technical architecture with operational and policy needs. Identify opportunities for process or data improvements across business functions. Essential Skills & Experience: Proven ability to reverse engineer data models from legacy systems. Strong experience in data modelling (dimensional, relational, data vault, etc.). Deep understanding of OLTP systems and transactional data environments. Experience with system … a hands-on role suited to someone who can own the data architecture workstream, embed themselves in a cross-functional team, and deliver pragmatic outputs at pace. Prior experience reverse-engineering undocumented systems will be key. *Rates depend on experience and client requirements More ❯
a major global tech client in the expansion of their elite malware analysis team. They're hiring two Malware Analysts with deep Android security expertise to uncover malicious behaviours, reverse engineer complex APKs, and assess real-world risks at scale. This isn't about bug hunting, this is deep forensic work to detect intentionally hidden threats. The Role: Reverseengineering Android apps to detect hidden malicious behaviour Analysing potential threats: malware, premium call triggers, surveillance capabilities Supporting automated detection with human-led scrutiny and investigation Must-Have: Strong hands-on experience in Android malware analysis Background in reverseengineering APKs and obfuscated code Security-first mindset with the ability to think like an attacker Nice More ❯
please speak to your recruiter about the options Requisition ID: 121883 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverseengineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for our … a variety of audiences, including non-technical, through presentations and technical reports. Experience working with teams and leading technical tasks. Other desirable skills include: experience performing network traffic analysis, reverseengineering, vulnerability analysis, exploit development, working knowledge of modern cryptography. Why join us? You will receive a dedicated training budget to use during your first year with us. More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malware analysis and reverseengineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure More ❯
to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Willingness to … Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & ReverseEngineering Network & Endpoint Security Monitoring (EDR, IDS/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working More ❯
troubleshooting. Good knowledge of VMware , Windows (all versions), and Linux systems. Confident with Group Policy , Registry editing , permissions, and auditing. Scripting in PowerShell , VBScript , or Python . Ability to reverse-engineer install media and configuration processes. Background working in secure environments with a focus on secure application configs. Strong technical documentation skills. Desirable Skills Experience with Azure DevOps and More ❯
troubleshooting. Good knowledge of VMware , Windows (all versions), and Linux systems. Confident with Group Policy , Registry editing , permissions, and auditing. Scripting in PowerShell , VBScript , or Python . Ability to reverse-engineer install media and configuration processes. Background working in secure environments with a focus on secure application configs. Strong technical documentation skills. Desirable Skills Experience with Azure DevOps and More ❯
MITRE ATT&CK framework. Sound understanding of network protocols (TCP/IP, HTTP, SMTP, etc.), firewalls, VPNs, AV products, and enterprise infrastructure. Desirable skills: Skills in malware analysis or reverse engineering. Experience with scripting or programming (Python, PowerShell, Bash, etc.). Relevant SOC certifications (e.g., CREST, Blue Team Level 1). Exposure to additional SIEM tools such as QRadar. More ❯
90k DOEMust be eligible for high level security clearance (sole UK national and resident in the UK for 10+ years) Role details: We're partnering with a leading technology & engineering company who support high-profile clients that are vital to UK National Security. They're looking for a Cyber Software Engineer to deliver mission critical solutions, helping to keep … the nation safe, secure and prosperous. In this role you will you'll make, break, assure and secure systems across a variety of projects. Responsibilities: Software analysis and reverseengineering of compiled or interpreted code that could be obfuscated or defensively structured, for either x86/x64 or ARM processor architectures. Operating systems and/or firmware internals … security architectures and hardware abstraction. Engineering software from design to delivery in modern IDEs and languages, using Agile delivery. Creating tested and testable code. Integrating with automated verification systems, CI and CD pipelines. Requirements: IDA Pro or Ghidra for reverse engineering. C, C++, Java or C# for solution creation. Python, Bash, Powershell or Groovy for prototyping and tool More ❯
/IPS, firewall solutions, offensive security tools ) Basic knowledge of Linux/Unix operating systems Certifications such as Network+, Security+, CySA + Experience with scripting or programming, including malware reverseengineering Professional-level foreign language skills, preferably Russian, Farsi , or Chinese Data or statistical analysis skills Familiarity with open, deep, and dark web cybercriminal marketplaces and forums Experience … of online HUMINT operations and/or social engineering techniques Capacity to read security logs and code to understand the content and context About Us Why ReliaQuest? Making security possible for our customers starts with our commitment to our people. We inspire every individual to be the best that they can be and provide the tools necessary to get More ❯
ll apply your creative and critical problem solving skills to quickly design and build tooling that enables programmatic automation at a massive scale. You must have a passion for engineering solutions to complex security challenges, and recognize and fill gaps in capabilities. Above all, you should be passionate about information security, the threat landscape and security automation and tooling. … years of experience on a Security Operations team, coordinating responses to security incidents. - Proficiency with one high-level programming or scripting language. PREFERRED QUALIFICATIONS - 3+ years experience performing detection engineering in a dedicated or hybrid capacity supporting incident response and threat intel operations. - 5+ years experience working in incident response response, security automation tooling, threat intelligence, or forensics. - Experience … with Amazon Web Services. - Experience in Security Incident Response and proficiency in at least one of the following domains: Malware Analysis/ReverseEngineering; Digital Forensics; Security Tool Development & Automation; Programming/Scripting; Network & OS Security; Identity Management Amazon is an equal opportunities employer. We believe passionately that employing a diverse workforce is central to our success. We More ❯
response Mentor and train incident other team members on detection techniques and processes Qualification/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of … ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics and network analysis techniques and tools - Understanding of malware and reverseengineering - Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills More ❯
Gloucester, Gloucestershire, South West, United Kingdom
SEGULA Technologies Limited
of the future in a fast-growing international company! At SEGULA Technologies you will have the opportunity to work on exciting projects and help shaping the future within an engineering company which is at the heart of innovation. SEGULA Technologies serves clients in the aerospace, automotive, energy, marine and off highway. Job Description We are seeking a highly skilled … Gauge R&R studies, and supporting the modernisation of legacy routines. You will also assist in training, documentation, and knowledge transfer as required. Qualifications Degree level or apprenticeship in Engineering discipline Experience in CMM programming and inspection in the aerospace or precision manufacturing industry. Proficiency in CMM software (CAMIO & MODUS). Reverseengineering Strong understanding of GD … T and ability to interpret complex engineering drawings. Familiarity with aerospace quality standards such as AS9100, NADCAP, and EASA/CAA regulations. Excellent analytical, problem-solving, and communication skills. Ability to work independently and as part of a cross-functional team. Additional Information Experience with multi-axis CMM systems and probing technologies. Knowledge of other inspection tools (e.g., laser More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF. Bonus Points: Knowledge of reverseengineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc) is desirable. Some programming experience for example, C, Python, Go, and/or other languages More ❯
Newcastle Upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
Managers6. Suppliers7. Peer Networks Person Specification Personal Qualities, Knowledge and Skills Essential Data modelling - Understand the concepts and principles of data modelling and able to produce relevant data models. Reverse engineer data models from a live system. Ability to identify the conformity of data across different systems Data Analysis & Synthesis - Undertakes data profiling and source system analysis and can More ❯
LONDON Employer SOLIRIUS LTD Vacancy Description As a DevOps Engineer degree apprentice, you'll learn how to be accountable for the undertaking and completion of the analysis of software engineering business issues for either the entire requirement or subset thereof dependent on complexity and/or scope size You'll be instrumental in implementing Solirius' data solutions, or part … and scope size, is understood and correctly used You'll facilitate ongoing support of our data solutions or part thereof, dependent on complexity and technology, e. g. by troubleshooting, reverseengineering and conducting root cause analysis As a DevOps Engineer degree apprentice, you'll learn how to apply engineering principles to all stages of the software development … to further build your technical skills Take part in client-facing work, helping to understand user needs and build high-quality solutions Contribute to the growth of our DevOps Engineering practice by supporting innovation and quality Typically work on a client project for 6-12 months before moving to a new challenge Have the opportunity to explore different specialisms More ❯
escalation point for complex security incidents within the SOC team. Oversee incident response activities and ensure timely communication with stakeholders. Facilitate tabletop exercises and training for analysts, including malware reverseengineering, threat intelligence, and log analysis. Lead and mentor SOC analysts, fostering a high-performing team. Improve SOC services, including security monitoring, incident detection, analysis, and response. Establish More ❯
please speak to your recruiter about the options Requisition ID: 121882 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverseengineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for our More ❯