3 of 3 Permanent Vulnerability Research Jobs in London

Senior Principal Offensive Security Engineer

Hiring Organisation
Oracle
Location
South London, UK
Employment Type
Full-time
with the capabilities to ensure our systems and services meet the security objectives we communicate to customers. The Offensive Security group performs security assessments, vulnerability research, static and dynamic analysis research, penetration testing, red-teaming, and security tool development. We ensure the security of the software … with the capabilities to ensure our systems and services meet the security objectives we communicate to customers. The Offensive Security group performs security assessments, vulnerability research, static and dynamic analysis research, penetration testing, red-teaming, and security tool development. We ensure the security of the software ...

Security Testing Consultant

Hiring Organisation
Anson Mccade
Location
London, United Kingdom
Employment Type
Permanent, Work From Home
Salary
£65,000
early and drive solutions independently Experience working to tight deadlines and managing multiple priorities Technical interest or experience in areas such as adversary emulation, vulnerability research, reverse engineering, or emerging technologies Willingness to travel within the UK and internationally Current CHECK Team Member or equivalent certification (e.g. OSCP … similar) Background in application, OS, database, or security operations Experience delivering testing within Government, Telecommunications, Energy, or Financial Services sectors Exploit development or advanced vulnerability research experience Security Clearance SC clearance is required for this role Candidates must be eligible to obtain SC, including meeting UK residency ...

Cyber Software Engineer

Hiring Organisation
Sanderson Recruitment
Location
London, United Kingdom
Employment Type
Permanent
small IoT devices through to the Cloud. The key requirements You will likely have experience in the below areas: Software analysis, reverse engineering and vulnerability research of compiled or interpreted code that could be disguised or defensively structured Operating systems and/or firmware internals, security architectures ...