3 of 3 Permanent Reverse Engineering Jobs in Gloucestershire

Cyber Software Vulnerability Engineer

Hiring Organisation
Forward Role
Location
Cheltenham, Gloucestershire, South West, United Kingdom
Employment Type
Permanent
Salary
£85,000
just to understand how they work, but to identify weaknesses, assess risks, and develop mitigation strategies. What You'll Be Doing Software analysis and reverse engineering of compiled or interpreted code. Reverse engineering a wide range of technologies to uncover vulnerabilities and improve security including operating … systems and/or firmware internals, security architectures and hardware abstraction. Engineering software from design to delivery in modern languages, using Agile delivery. Working closely with cybersecurity teams to prioritize vulnerabilities and implement patching strategies. Collaborating in Agile teams to deliver innovative, secure, and robust technical solutions. What ...

Security Engineer

Hiring Organisation
Searchability NS&D
Location
Gloucestershire, England, United Kingdom
Employment Type
Full-Time
Salary
£70,000 - £90,000 per annum
attack techniques. This role involves close collaboration with multidisciplinary teams and clear documentation of research outcomes. Key responsibilities include: Hardware teardown, characterisation, and reverse engineering Data extraction from flash memory technologies including NAND, eMMC, and SPI Conducting side channel attacks such as timing analysis, voltage glitching, and power … channel attack techniques Proficiency in C, C++, Python, or similar Good working knowledge of Linux environments Eligibility for, or existing, eDV clearance Desirable experience Reverse engineering using tools such as Ghidra, IDA Pro, or Binary Ninja Embedded software development on ARM, AVR, or MIPS platforms Vulnerability research, exploit ...

Security Engineer

Hiring Organisation
Searchability NS&D
Location
Gloucester, England, United Kingdom
attack techniques. This role involves close collaboration with multidisciplinary teams and clear documentation of research outcomes. Key responsibilities include: Hardware teardown, characterisation, and reverse engineering Data extraction from flash memory technologies including NAND, eMMC, and SPI Conducting side channel attacks such as timing analysis, voltage glitching, and power … channel attack techniques Proficiency in C, C++, Python, or similar Good working knowledge of Linux environments Eligibility for, or existing, eDV clearance Desirable experience Reverse engineering using tools such as Ghidra, IDA Pro, or Binary Ninja Embedded software development on ARM, AVR, or MIPS platforms Vulnerability research, exploit ...