to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Threat Hunting … Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & ReverseEngineering Network & Endpoint Security Monitoring (EDR, IDS/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working More ❯
to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Willingness to … Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & ReverseEngineering Network & Endpoint Security Monitoring (EDR, IDS/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
Learn more at Experience and Skills Some information security experience working within a Security Operations Center or Cyber Security Incident Response Teams Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, Information Security or professional certification related to Digital Forensics, Incident Response, or Ethical Hacking (e.g., GCIH, CEH, GCFE, GCFA, and CFCE). Knowledge of main concepts related … using security tools including Defender for Cloud, GuardDuty, CloudTrail, or CloudWatch. System administration on Unix, Linux, or Windows Network forensics, logging, and event management Defensive network infrastructure (operations or engineering) Vulnerability assessment and penetration testing concepts Malware analysis concepts, techniques, and reverseengineering In-depth knowledge of network and host security technologies and products (such as firewalls More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malware analysis and reverseengineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: ? Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
security tools such as firewalls, VPNs, AV, IDS/IPS, and log management. Experience analysing log data and network security events. Desirable Skills: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst certification. Familiarity with additional SIEM tools such as QRadar. Benefits: 25 days annual leave, with the option to purchase more Health cash plan Life More ❯
skills. Good understanding of network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work independently with minimal supervision. Willingness to work in a 24/7 or More ❯
compliance, resilience, and security across cloud-based environments. Establish integration patterns between customer platforms and back-office systems (e.g. Finance, HR, CRM). Overview of the role: Work with Engineering, Product, Data, and Commercial leaders to identify and prioritise architectural opportunities. Align data architecture principles with strategic business and technology goals. Present architectural findings, roadmaps, and decisions to both … Establish integration patterns between customer platforms and back-office systems (e.g. Finance, HR, CRM). Recommend standards for data modelling, master/reference data, and metadata governance. Collaborate with engineering, product, and commercial leaders to align architecture with business needs. Evaluate third-party APIs and reverse-engineer live system data models as needed. Author agile stories and support … engineering teams throughout development. Support testing, reconciliation, and integration verification activities. Core skills and experience: Proven experience designing scalable data architectures in cloud and hybrid environments. Expertise in data modelling, SQL, and platforms like Snowflake, dbt, Power BI, and Databricks. Fluency in Python and knowledge of multiple cloud providers (AWS, Azure, GCP). Understanding of security principles including role More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Forward Role
mitigation strategies. What You'll Be Doing Researching, designing, and building resilient systems to support National Security objectives. Conducting vulnerability assessments and threat modelling on software and hardware components. Reverseengineering a wide range of technologies to uncover vulnerabilities and improve security. Writing secure, high-performance code that integrates deeply with operating systems and platforms. Developing tools and More ❯
protection Data modelling, cleansing and enrichment: produce data models and understand where to use different types of data models with the ability to compare different data models. Able to reverse-engineer a data model from a live system as required. Stakeholder engagement: collaborate with internal and external stakeholders to understand data requirements and communicate insights effectively. Quality assurance: ensure More ❯
agreed specifications. Continuously monitor and improve all aspects of the service. Requirement: An aptitude for applying technology and structured problem solving At least a 2.1 in a technical subject – Engineering, Computer Science, Physics, Maths – and good A Levels An ability to decipher business requirements and develop technical development specifications Demonstrated ability to work in an Agile environment Technically proficient … in JAVA and SQL. Must be able to read JAVA/SQL to reverse engineer existing systems/solutions A record of accomplishment in delivering on project tasks and an ability to carry tasks through to completion. An ability to work in teams and learn quickly A demonstrated interest in and experience of using IT and software The role More ❯
response Mentor and train incident other team members on detection techniques and processes Qualification/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of … ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics and network analysis techniques and tools - Understanding of malware and reverseengineering - Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills More ❯
response Mentor and train incident other team members on detection techniques and processes Qualification/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of … ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics and network analysis techniques and tools - Understanding of malware and reverseengineering - Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills More ❯
Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Forward Role
you well in this role. You'll bring a structured approach to dissecting complex systems and conducting cutting-edge research. Required skills and experience: Experience in areas such as Reverseengineering in IDA Pro or Ghidra, Malware analysis, Vulnerability analysis and/or exploitation development. Processor architectures (x86-64 and ARM). Debugging with gdb, binary exploitation and More ❯
Engineering Managers are passionate people leaders. You take pride in building great products and growing people and leaders. You represent the engineering organization and can turn undefined or partial requirements into an execution plan. You understand technology and can dive deep when needed to remove obstacles and address challenges by suggesting realistic solutions. You have an eye for … that your position and career are not about only yourself, but about your team(s). When you speak, you speak for the business and for your team. Daily Engineering Manager responsibilities include: Managing engineering requests and desired outcomes: Collaborate with Product Management to define the scope of products and deliverables. Estimate and communicate efforts timelines and feasibility … assignments. (Re)Organize the team when needed. Assist with customer escalations. Participate in setting and maintaining the department budget. Required Qualifications Bachelor's degree in computer science or related engineering or scientific field. 5+ years of experience leading a team of software engineers or other technical specialists (System Administrators, Professional Services, Technical Consultants) 10+ years of experience in data More ❯
mysteries of outdated systems? If so, we have an exciting opportunity for you! Our client are seeking a talented and experienced Principle Embedded Software Engineer with a specialization in reverseengineering old embedded technology to join this dynamic team! The main objective of this role will be to reverse engineer a range of outdated embedded systems and … to current industry standards. Alongside this you will be given the opportunity to lead on the newer and more complex projects that the business is working on. Your Responsibilities: - Reverse engineer and analyse legacy embedded systems, including hardware and software components. - Develop strategies and methodologies for extracting code, protocols, and data from outdated embedded devices. - Collaborate with cross-functional … teams to understand system requirements and design specifications of legacy systems. - Identify and document system vulnerabilities, weaknesses, and potential security risks in the reverse-engineered technology. - Perform testing, debugging, and code optimization to ensure the compatibility and functionality of the reverse-engineered systems. Your Skills and Qualifications: - Bachelor's degree in Computer Science, Electrical Engineering, or a More ❯
working on advanced Research & Development (R&D), software-defined radio (SDR) systems, and payload development for a variety of Defence, Cyber, and Intelligence programmes. If you have experience in reverseengineering and a strong background in DSP, this is an exceptional opportunity to contribute to cutting-edge projects and further develop your expertise. As a DSP Engineer, you … will be at the forefront of innovation, applying your expertise to reverse engineer existing systems, develop new DSP algorithms, and design and integrate SDR platforms. You will also play a pivotal role in payload development and contribute to the continuous improvement of mission-critical technologies. You will need current DV Clearance to apply for this role, and will require … eDV Security Clearance, and have been born in the UK, to start this role Key Responsibilities: ReverseEngineering & Analysis – Hardware, software, and signals based reverseengineering of RF systems: identify vulnerabilities or areas for improvement. Software-Defined Radio (SDR) Development – Develop and optimize SDR solutions using cutting-edge DSP techniques for various applications in communications and More ❯
with Product Managers and other teams to consolidate requirements into a cohesive roadmap or technical approach. Staying updated on industry and technological advancements and presenting on those topics to engineering groups. Mentoring less experienced team members to support their career development. Championing best practices in design, architecture, code reuse, performance, and quality. Working with the engineering team across … experience with C/C++ on Windows and/or macOS. Expert C/C++ coding skills, including experience at the driver and kernel module level. Excellent debugging skills, reverseengineering techniques, and experience debugging user and kernel space code. Experience with Windows Filtering Platform on Windows and/or system extensions on macOS. Knowledge of software development More ❯
9 Brazennose Street, Manchester, England Hybrid / WFH Options
REPLY LTD
solutions in a collaborative environment. Role As a Software Engineer degree apprentice, you'll learn how to be accountable for the undertaking and completion of the analysis of software engineering business issues for either the entire requirement or subset thereof dependent on complexity and/or scope size You'll be instrumental in implementing WM Reply’ software solutions, or … and scope size, is understood and correctly used. You'll facilitate ongoing support of our software solutions or part thereof, dependent on complexity and technology, e. g. by troubleshooting, reverseengineering and conducting root cause analysis As a Software Engineer degree apprentice, you'll learn how to apply engineering principles to all stages of the software development More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Circle Group
of complex targets, including mobile platforms, embedded systems, and non-trivial binaries. The role is fully remote and demands a high level of autonomy, skill, and commitment. Core Responsibilities Reverseengineering software and firmware to uncover security flaws Developing and demonstrating proof-of-concept exploits Analysing binary targets using tools like IDA Pro, Binary Ninja, or Ghidra Engaging … tools and techniques Strong low-level programming and debugging skills Eligible for security clearance in the UK, US, Australia, or New Zealand Degree (or equivalent experience) in Computer Science, Engineering, Cybersecurity or related field Desirable Existing security clearance (Secret or above) Knowledge of anti-reversing techniques, implants, and advanced threat emulation Proficiency in multiple architectures (e.g. x86, ARM) Background More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
of complex targets, including mobile platforms, embedded systems, and non-trivial binaries. The role is fully remote and demands a high level of autonomy, skill, and commitment. Core Responsibilities Reverseengineering software and firmware to uncover security flaws Developing and demonstrating proof-of-concept exploits Analysing binary targets using tools like IDA Pro, Binary Ninja, or Ghidra Engaging … tools and techniques Strong low-level programming and debugging skills Eligible for security clearance in the UK, US, Australia, or New Zealand Degree (or equivalent experience) in Computer Science, Engineering, Cybersecurity or related field Desirable Existing security clearance (Secret or above) Knowledge of anti-reversing techniques, implants, and advanced threat emulation Proficiency in multiple architectures (e.g. x86, ARM) Background More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Circle Group
of complex targets, including mobile platforms, embedded systems, and non-trivial binaries. The role is fully remote and demands a high level of autonomy, skill, and commitment. Core Responsibilities Reverseengineering software and firmware to uncover security flaws Developing and demonstrating proof-of-concept exploits Analysing binary targets using tools like IDA Pro, Binary Ninja, or Ghidra Engaging … tools and techniques Strong low-level programming and debugging skills Eligible for security clearance in the UK, US, Australia, or New Zealand Degree (or equivalent experience) in Computer Science, Engineering, Cybersecurity or related field Desirable Existing security clearance (Secret or above) Knowledge of anti-reversing techniques, implants, and advanced threat emulation Proficiency in multiple architectures (e.g. x86, ARM) Background More ❯
please speak to your recruiter about the options Requisition ID: 121882 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverseengineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for our More ❯