Principal Cybersecurity Researcher (ReverseEngineering) London, UK With 1,000 intelligence professionals, over $300M in sales, and serving over 1,900 clients worldwide, Recorded Future is the world's most advanced, and largest, intelligence company! Reversing Emulation and Testing (RET) is a core function of Insikt Group's Technical Analysis (TA) Team. We seek a principal technical threat … researcher with deep subject-matter expertise across malware analysis, reverseengineering, and malicious tooling. This role requires the ability to lead high-impact research and drive innovation in analytical capabilities within Insikt Group. You will guide and shape technical research into state-sponsored and cybercriminal malware, collaborating across functional intelligence teams to support finished intelligence reporting and platform … enrichment. Your responsibilities will include not only conducting advanced malware reverseengineering and infrastructure emulation but also designing and implementing internal tools and workflows that increase our team's efficiency. You will be expected to develop and formalize novel approaches to dynamic analysis, configuration extraction, and threat behavior modeling. This position entails representing Insikt Group's technical threat More ❯
at dissecting technical systems, not just to understand how they work, but to identify weaknesses, assess risks, and develop mitigation strategies. What You'll Be Doing Software analysis and reverseengineering of compiled or interpreted code that could be obfuscated or defensively structured, for either x86/x64 or ARM processor architectures. Reverseengineering a wide … range of technologies to uncover vulnerabilities and improve security including operating systems and/or firmware internals, security architectures and hardware abstraction. Engineering software from design to delivery in modern IDEs and languages, using Agile delivery. Creating tested and testable code. Integrating with automated verification systems, CI and CD pipelines. Working closely with cybersecurity teams to prioritize vulnerabilities and … in one or more of C, C++, Java or C#. Familiarity with scripting and automation using Python, Bash, Powershell or Groovy. Experience working with IDA Pro or Ghidra for reverseengineering Experience working with Linux or Windows-based systems. Awareness of secure coding practices and modern cybersecurity threats. Knowledge of principles used in Agile environments. Desirable exposure Any More ❯
please speak to your recruiter about the options Requisition ID: 121884 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverseengineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for our … customers across a wide variety of platforms and technologies. We are looking for experienced Vulnerability Researchers and Reverse Engineers who want to have a meaningful and tangible impact on the National Security of the UK. Whether you have worked in this space before or not, you will receive a dedicated training budget, along with all the mentorship and support … to succeed in our team. Role Description Technical delivery: perform vulnerability research and/or reverseengineering on complex and unique challenges, across a myriad of platforms. Mentorship, team-leadership, and collaboration: deliver your research as part of a team, whilst knowledge-sharing and mentoring junior team-members. Adaptability: work across a range of tools and platforms, picking More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
plus strong scripting ability in Python for automation. Solid understanding of memory-safety vulnerabilities, undefined behaviour, sanitisers, and compiler instrumentation. Demonstrated ability to triage crashes using debuggers, profilers, and reverse-engineering tools (gdb/lldb, IDA/Ghidra). Excellent written communication for documenting findings and influencing engineering teams. "Nice To Have" Skills and Experience : Contributions to … Knowledge ofdistributed fuzzing at scale (GCP/AWS, Kubernetes, or bare-metal clusters). Familiarity with kernel, embedded, or firmware fuzzing (e.g., Syzkaller, QEMU-based harnesses). Background in reverseengineering, static analysis or symbolic execution. Experience integrating fuzzing intoCI/CD pipelines and tracking coverage metrics. If you're passionate about breaking software safely, love high-coverage More ❯
a major global tech client in the expansion of their elite malware analysis team. They're hiring two Malware Analysts with deep Android security expertise to uncover malicious behaviours, reverse engineer complex APKs, and assess real-world risks at scale. This isn't about bug hunting, this is deep forensic work to detect intentionally hidden threats. The Role: Reverseengineering Android apps to detect hidden malicious behaviour Analysing potential threats: malware, premium call triggers, surveillance capabilities Supporting automated detection with human-led scrutiny and investigation Must-Have: Strong hands-on experience in Android malware analysis Background in reverseengineering APKs and obfuscated code Security-first mindset with the ability to think like an attacker Nice More ❯
please speak to your recruiter about the options Requisition ID: 121883 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverseengineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for our … a variety of audiences, including non-technical, through presentations and technical reports. Experience working with teams and leading technical tasks. Other desirable skills include: experience performing network traffic analysis, reverseengineering, vulnerability analysis, exploit development, working knowledge of modern cryptography. Why join us? You will receive a dedicated training budget to use during your first year with us. More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malware analysis and reverseengineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure More ❯
to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Threat Hunting … Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & ReverseEngineering Network & Endpoint Security Monitoring (EDR, IDS/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working More ❯
to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Willingness to … Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & ReverseEngineering Network & Endpoint Security Monitoring (EDR, IDS/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working More ❯
MITRE ATT&CK framework. Sound understanding of network protocols (TCP/IP, HTTP, SMTP, etc.), firewalls, VPNs, AV products, and enterprise infrastructure. Desirable skills: Skills in malware analysis or reverse engineering. Experience with scripting or programming (Python, PowerShell, Bash, etc.). Relevant SOC certifications (e.g., CREST, Blue Team Level 1). Exposure to additional SIEM tools such as QRadar. More ❯
90k DOEMust be eligible for high level security clearance (sole UK national and resident in the UK for 10+ years) Role details: We're partnering with a leading technology & engineering company who support high-profile clients that are vital to UK National Security. They're looking for a Cyber Software Engineer to deliver mission critical solutions, helping to keep … the nation safe, secure and prosperous. In this role you will you'll make, break, assure and secure systems across a variety of projects. Responsibilities: Software analysis and reverseengineering of compiled or interpreted code that could be obfuscated or defensively structured, for either x86/x64 or ARM processor architectures. Operating systems and/or firmware internals … security architectures and hardware abstraction. Engineering software from design to delivery in modern IDEs and languages, using Agile delivery. Creating tested and testable code. Integrating with automated verification systems, CI and CD pipelines. Requirements: IDA Pro or Ghidra for reverse engineering. C, C++, Java or C# for solution creation. Python, Bash, Powershell or Groovy for prototyping and tool More ❯
/IPS, firewall solutions, offensive security tools ) Basic knowledge of Linux/Unix operating systems Certifications such as Network+, Security+, CySA + Experience with scripting or programming, including malware reverseengineering Professional-level foreign language skills, preferably Russian, Farsi , or Chinese Data or statistical analysis skills Familiarity with open, deep, and dark web cybercriminal marketplaces and forums Experience … of online HUMINT operations and/or social engineering techniques Capacity to read security logs and code to understand the content and context About Us Why ReliaQuest? Making security possible for our customers starts with our commitment to our people. We inspire every individual to be the best that they can be and provide the tools necessary to get More ❯
response Mentor and train incident other team members on detection techniques and processes Qualification/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of … ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics and network analysis techniques and tools - Understanding of malware and reverseengineering - Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills More ❯
Windows development stack to build robust and efficient software components. Implement and maintain C++ modules responsible for the backend of the product, including the core components. Research, analyze and reverse-engineer the behavior of Windows components to determine how to reliably collect audit data. Gain a thorough understanding of the current code base. Identify and resolve performance bottlenecks in More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF. Bonus Points: Knowledge of reverseengineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc) is desirable. Some programming experience for example, C, Python, Go, and/or other languages More ❯
Newcastle Upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
Managers6. Suppliers7. Peer Networks Person Specification Personal Qualities, Knowledge and Skills Essential Data modelling - Understand the concepts and principles of data modelling and able to produce relevant data models. Reverse engineer data models from a live system. Ability to identify the conformity of data across different systems Data Analysis & Synthesis - Undertakes data profiling and source system analysis and can More ❯
LONDON Employer SOLIRIUS LTD Vacancy Description As a DevOps Engineer degree apprentice, you'll learn how to be accountable for the undertaking and completion of the analysis of software engineering business issues for either the entire requirement or subset thereof dependent on complexity and/or scope size You'll be instrumental in implementing Solirius' data solutions, or part … and scope size, is understood and correctly used You'll facilitate ongoing support of our data solutions or part thereof, dependent on complexity and technology, e. g. by troubleshooting, reverseengineering and conducting root cause analysis As a DevOps Engineer degree apprentice, you'll learn how to apply engineering principles to all stages of the software development … to further build your technical skills Take part in client-facing work, helping to understand user needs and build high-quality solutions Contribute to the growth of our DevOps Engineering practice by supporting innovation and quality Typically work on a client project for 6-12 months before moving to a new challenge Have the opportunity to explore different specialisms More ❯
development experience is essential. Key experience C++ Multithreading Windows programming MS Visual Studio Unit testing Any experience in the following areas would be advantageous for any application Microservices architecture Reverseengineering in Windows Windows kernel development WinAPI COM/ATL/WTL SQL CI/CD C# Agile Algorithm development If you are looking for a role of More ❯
escalation point for complex security incidents within the SOC team. Oversee incident response activities and ensure timely communication with stakeholders. Facilitate tabletop exercises and training for analysts, including malware reverseengineering, threat intelligence, and log analysis. Lead and mentor SOC analysts, fostering a high-performing team. Improve SOC services, including security monitoring, incident detection, analysis, and response. Establish More ❯
Independently able to take objectives from ideation to execution. PLUSES Please note that these are desirable skills and are not required to apply for the position. Strong understanding of reverseengineering concepts and methodologies. Strong understanding of game protection technologies. Experience with disassemblers and decompilers: IDA Pro. Experience with core cryptography concepts. Experience with crash dumps and x64. More ❯
please speak to your recruiter about the options Requisition ID: 121882 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverseengineering, and vulnerability research. With a focus on National Security, we work on some of the country's toughest challenges. Our people provide mission-changing capability for our More ❯
please speak to your recruiter about the options Requisition ID: 121882 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverseengineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for our More ❯