Principal Cybersecurity Researcher (ReverseEngineering) London, UK With 1,000 intelligence professionals, over $300M in sales, and serving over 1,900 clients worldwide, Recorded Future is the world's most advanced, and largest, intelligence company! Reversing Emulation and Testing (RET) is a core function of Insikt Group's Technical Analysis (TA) Team. We seek a principal technical threat … researcher with deep subject-matter expertise across malware analysis, reverseengineering, and malicious tooling. This role requires the ability to lead high-impact research and drive innovation in analytical capabilities within Insikt Group. You will guide and shape technical research into state-sponsored and cybercriminal malware, collaborating across functional intelligence teams to support finished intelligence reporting and platform … enrichment. Your responsibilities will include not only conducting advanced malware reverseengineering and infrastructure emulation but also designing and implementing internal tools and workflows that increase our team's efficiency. You will be expected to develop and formalize novel approaches to dynamic analysis, configuration extraction, and threat behavior modeling. This position entails representing Insikt Group's technical threat More ❯
ll apply your creative and critical problem solving skills to quickly design and build tooling that enables programmatic automation at a massive scale. You must have a passion for engineering solutions to complex security challenges, and recognize and fill gaps in capabilities. Above all, you should be passionate about information security, the threat landscape and security automation and tooling. … years of experience on a Security Operations team, coordinating responses to security incidents. - Proficiency with one high-level programming or scripting language. PREFERRED QUALIFICATIONS - 3+ years experience performing detection engineering in a dedicated or hybrid capacity supporting incident response and threat intel operations. - 5+ years experience working in incident response response, security automation tooling, threat intelligence, or forensics. - Experience … with Amazon Web Services. - Experience in Security Incident Response and proficiency in at least one of the following domains: Malware Analysis/ReverseEngineering; Digital Forensics; Security Tool Development & Automation; Programming/Scripting; Network & OS Security; Identity Management Amazon is an equal opportunities employer. We believe passionately that employing a diverse workforce is central to our success. We More ❯
extension. Daily rate of 480 €uros Required: 8 years+ Business Analysis experience 4-6 years iterative and waterfall development experience. Skills and experience : Degree in Information Systems/Systems Engineering or similar is desirable Proven work experience of working on high visibility projects in traditional environments with strong project governance (i.e highly regulated environments) Proven experience in business transformation … projects/master data management projects Proven experience in producing defining and documenting Product and Services Roadmaps Proven experience in documenting legacy systems, working with architects and business to reverse engineer systems Proven work experience as BI Business Analyst Proven experience of working in projects with offshore development teams Role specific skills, competencies & responsibilities: Business Vision and Scope definition More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
supporting a major global tech client in the expansion of their elite malware analysis team. They're hiring Malware Analysts with deep Android security expertise to uncover malicious behaviours, reverse engineer complex APKs, and assess real-world risks at scale. This isn’t about bug hunting, this is deep forensic work to detect intentionally hidden threats before they reach … millions. The Role: Reverseengineering Android apps to detect hidden malicious behaviour Analysing potential threats: malware, premium call triggers, surveillance capabilities Supporting automated detection with human-led scrutiny and investigation Must-Have: Strong hands-on experience in Android malware analysis Background in reverseengineering APKs and obfuscated code Security-first mindset with the ability to think More ❯
automation. We were born the right way to do this - we're building out from a leading digital and technology capability and adding the rest, rather than trying to reverse engineer a legacy business into a more modern version of itself. At Assembly we ask our people to embody three core values: Show Up: actively contribute to a space More ❯
automation. We were born the right way to do this - we're building out from a leading digital and technology capability and adding the rest, rather than trying to reverse engineer a legacy business into a more modern version of itself. At Assembly we ask our people to embody three core values: Show Up: actively contribute to a space More ❯
automation. We were born the right way to do this - we're building out from a leading digital and technology capability and adding the rest, rather than trying to reverse engineer a legacy business into a more modern version of itself. At Assembly we ask our people to embody three core values: Show Up: actively contribute to a space More ❯
is a unique opportunity to contribute to the transformation of our Town Planning department by shaping the future of our data architecture. You will play a pivotal role in reverseengineering the current data model of our IDOX Uniform system and designing a future-state architecture that aligns with our organizational goals and planning processes. Key Responsibilities Immerse … yourself in the Town Planning department to understand current workflows and data usage. Reverse engineer the As-Is physical data model of the IDOX Uniform system. Design the To-Be conceptual and physical data models that reflect ideal organisational processes. Map data integration points and data flows across systems. Document data lineage and support the implementation of Role-Based More ❯
piece of work within its strategic planning function. You'll play a central role in transforming how planning data is structured, shared, and governed. The work focuses on the reverseengineering of the existing data model within the IDOX Uniform platform , mapping out current state, and designing a future-fit architecture that supports strategic decision-making and improved … service delivery. Key Responsibilities: Analyse current workflows and how data is used across the Town Planning function Reverse engineer the As-Is physical data model of the IDOX Uniform system Design a To-Be conceptual and physical data model aligned with business goals Develop a full data dictionary and data catalogue Map data flows and integration points across internal More ❯
automation. We were born the right way to do this - we're building out from a leading digital and technology capability and adding the rest, rather than trying to reverse engineer a legacy business into a more modern version of itself. At Assembly we ask our people to embody three core values: Show Up: actively contribute to a space More ❯
automation. We were born the right way to do this - we're building out from a leading digital and technology capability and adding the rest, rather than trying to reverse engineer a legacy business into a more modern version of itself. At Assembly we ask our people to embody three core values: Show Up : actively contribute to a space More ❯
Data Architect needed in Westminster, £420 per day PAYE - Reference: RQ You will play a pivotal role in reverseengineering the current data model of our IDOX Uniform system and designing a future-state architecture that aligns with our organizational goals and planning processes. Key Responsibilities - Immerse yourself in the Town Planning department to understand current workflows and … data usage. Reverse engineer the As-Is physical data model of the IDOX Uniform system. Design the To-Be conceptual and physical data models that reflect ideal organisational processes. Develop a comprehensive data dictionary/catalog. Map data integration points and data flows across systems. Document data lineage and support the implementation of Role-Based Access Control (RBAC). More ❯
automation. We were born the right way to do this - we're building out from a leading digital and technology capability and adding the rest, rather than trying to reverse engineer a legacy business into a more modern version of itself.At Assembly we ask our people to embody three core values: Show Up: actively contribute to a space of More ❯
about is your obsession with making AI-generated content that stops people mid-scroll . We want the people who don't just watch viral content-they study it, reverse-engineer it, and know exactly what makes a video explode . The ones who take risks, fail fast, and then go again . The ones who care about every … to craft AI-driven content that algorithms love. Social Media Growth & Engagement - Hacking retention, optimizing content for platform algorithms, and building audiences that keep coming back . AI Prompt Engineering for Content Creation - Writing the right prompts to generate viral AI scripts, voiceovers, and visuals . What's In It for You? C ompetitive compensation, bonuses, skin in the More ❯