bidding activities. To be eligible for this role you must hold active enhanced DV clearance or be eligible for one. Key Responsibilities: Conduct deep-dive research in vulnerability discovery, reverseengineering, and embedded systems Design and build rapid prototypes to validate novel cyber capabilities and concepts Analyse network protocols and system behaviours to identify security weaknesses Collaborate with … environments Proven track record of managing research projects from concept through delivery Desirable Experience: Hardware prototyping, PCB design and microcontroller programming. Experience using penetration testing or red team tools. Reverseengineering using Ghidra, IDA Pro, or Binary Ninja. Vulnerability research, including exploit development and mitigation bypass techniques. Embedded software development on ARM, AVR, PowerPC or MIPS platforms. Experience … with Radio Frequency (RF) systems, Software Defined Radios (SDRs), 2G/4G/5G, including tools like GNU Radio, Osmocom, srsRAN or USRP. Network engineering experience in home lab or professional environments. Next Steps: If interested, send your most recent CV to: so that we can speak in more detail. JBRP1_UKTJ More ❯
bidding activities. To be eligible for this role you must hold active enhanced DV clearance or be eligible for one. Key Responsibilities: Conduct deep-dive research in vulnerability discovery, reverseengineering, and embedded systems Design and build rapid prototypes to validate novel cyber capabilities and concepts Analyse network protocols and system behaviours to identify security weaknesses Collaborate with … environments Proven track record of managing research projects from concept through delivery Desirable Experience: Hardware prototyping, PCB design and microcontroller programming. Experience using penetration testing or red team tools. Reverseengineering using Ghidra, IDA Pro, or Binary Ninja. Vulnerability research, including exploit development and mitigation bypass techniques. Embedded software development on ARM, AVR, PowerPC or MIPS platforms. Experience … with Radio Frequency (RF) systems, Software Defined Radios (SDRs), 2G/4G/5G, including tools like GNU Radio, Osmocom, srsRAN or USRP. Network engineering experience in home lab or professional environments. Next Steps: If interested, send your most recent CV to: so that we can speak in more detail. JBRP1_UKTJ More ❯
bidding activities. To be eligible for this role you must hold active enhanced DV clearance or be eligible for one. Key Responsibilities: Conduct deep-dive research in vulnerability discovery, reverseengineering, and embedded systems Design and build rapid prototypes to validate novel cyber capabilities and concepts Analyse network protocols and system behaviours to identify security weaknesses Collaborate with … environments Proven track record of managing research projects from concept through delivery Desirable Experience: Hardware prototyping, PCB design and microcontroller programming. Experience using penetration testing or red team tools. Reverseengineering using Ghidra, IDA Pro, or Binary Ninja. Vulnerability research, including exploit development and mitigation bypass techniques. Embedded software development on ARM, AVR, PowerPC or MIPS platforms. Experience … with Radio Frequency (RF) systems, Software Defined Radios (SDRs), 2G/4G/5G, including tools like GNU Radio, Osmocom, srsRAN or USRP. Network engineering experience in home lab or professional environments. Next Steps: If interested, send your most recent CV to: so that we can speak in more detail. JBRP1_UKTJ More ❯
Gloucester, Gloucestershire, South West, United Kingdom Hybrid / WFH Options
NSD
security operations. This role offers the chance to collaborate with multidisciplinary teams, shape research initiatives, and deliver actionable insights in a high-impact environment. Key Responsibilities Tear down and reverse-engineer hardware for analysis. Extract and recover data from flash memory (NAND, eMMC, SPI). Perform side-channel attacks (timing, voltage glitching, power analysis). Build rapid hardware/… Programming experience in C, C++, or Python. Strong Linux knowledge (CLI, system configuration). Analytical, methodical problem-solving approach. Must hold Enhanced DV/UKIC Clearance Nice-to-Haves: Reverseengineering (IDA Pro, Ghidra, Binary Ninja), embedded software development, RF/SDR experience, network engineering exposure, vulnerability research. Benefits Hybrid/Remote Work Pattern - 1-2 days More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Bristol/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter you will be … creative and analytical problem-solver who can work independently and as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, Threat Intelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding … think like an adversary and anticipate their next moves. Strong understanding of forensic analysis principles. Desired Certifications (one or more is a plus) GIAC Certified Threat Hunter (GCTH) GIAC ReverseEngineering Malware (GREM) Offensive Security Certified Professional (OSCP) Certified Ethical Hacker (CEH) For any further queries regarding the role, please contact Danny Palmer at Reasonable Adjustments: Respect and More ❯
Bristol, Somerset, United Kingdom Hybrid / WFH Options
Sanderson Recruitment Plc
Cyber Security Threat Hunter Bristol/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter you will be … creative and analytical problem-solver who can work independently and as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, Threat Intelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding … think like an adversary and anticipate their next moves. Strong understanding of forensic analysis principles. Desired Certifications (one or more is a plus) GIAC Certified Threat Hunter (GCTH) GIAC ReverseEngineering Malware (GREM) Offensive Security Certified Professional (OSCP) Certified Ethical Hacker (CEH) For any further queries regarding the role, please contact Danny Palmer at (see below) Reasonable Adjustments More ❯
prototypes, and contributing to the discovery and analysis of emerging threats and vulnerabilities. You must be eligible for or already hold eDV clearance. Key Responsibilities: Hardware teardowns, characterisations and reverse engineering. Extract and recover data from flash memory including NAND, eMMC and SPI. Conduct side channel attacks such as timing attacks, voltage glitching and power analysis. Design and implement … line tools and system configuration. Demonstrated analytical and problem-solving capabilities, with a methodical and inquisitive approach to technical challenges. Eligible for or hold active eDV clearance Desirable Experience: Reverseengineering using tools such as IDA Pro, Ghidra, or Binary Ninja. Vulnerability research, including exploit development and mitigation bypass techniques. Embedded software development for platforms such as ARM … Cortex, AVR, or MIPS. Experience with Radio Frequency (RF) systems, Software Defined Radios (SDRs), 2G/4G/5G, including tools like GNU Radio, Osmocom, srsRAN or USRP. Network engineering experience either home lab or professional. Next Steps: If interested, send your most recent to: so that we can speak in more detail. JBRP1_UKTJ More ❯
prototypes, and contributing to the discovery and analysis of emerging threats and vulnerabilities. You must be eligible for or already hold eDV clearance. Key Responsibilities: Hardware teardowns, characterisations and reverse engineering. Extract and recover data from flash memory including NAND, eMMC and SPI. Conduct side channel attacks such as timing attacks, voltage glitching and power analysis. Design and implement … line tools and system configuration. Demonstrated analytical and problem-solving capabilities, with a methodical and inquisitive approach to technical challenges. Eligible for or hold active eDV clearance Desirable Experience: Reverseengineering using tools such as IDA Pro, Ghidra, or Binary Ninja. Vulnerability research, including exploit development and mitigation bypass techniques. Embedded software development for platforms such as ARM … Cortex, AVR, or MIPS. Experience with Radio Frequency (RF) systems, Software Defined Radios (SDRs), 2G/4G/5G, including tools like GNU Radio, Osmocom, srsRAN or USRP. Network engineering experience either home lab or professional. Next Steps: If interested, send your most recent to: so that we can speak in more detail. JBRP1_UKTJ More ❯
prototypes, and contributing to the discovery and analysis of emerging threats and vulnerabilities. You must be eligible for or already hold eDV clearance. Key Responsibilities: Hardware teardowns, characterisations and reverse engineering. Extract and recover data from flash memory including NAND, eMMC and SPI. Conduct side channel attacks such as timing attacks, voltage glitching and power analysis. Design and implement … line tools and system configuration. Demonstrated analytical and problem-solving capabilities, with a methodical and inquisitive approach to technical challenges. Eligible for or hold active eDV clearance Desirable Experience: Reverseengineering using tools such as IDA Pro, Ghidra, or Binary Ninja. Vulnerability research, including exploit development and mitigation bypass techniques. Embedded software development for platforms such as ARM … Cortex, AVR, or MIPS. Experience with Radio Frequency (RF) systems, Software Defined Radios (SDRs), 2G/4G/5G, including tools like GNU Radio, Osmocom, srsRAN or USRP. Network engineering experience either home lab or professional. Next Steps: If interested, send your most recent to: so that we can speak in more detail. JBRP1_UKTJ More ❯