Gloucester, Gloucestershire, South West, United Kingdom
Forward Role
at dissecting technical systems, not just to understand how they work, but to identify weaknesses, assess risks, and develop mitigation strategies. What You'll Be Doing Software analysis and reverseengineering of compiled or interpreted code that could be obfuscated or defensively structured, for either x86/x64 or ARM processor architectures. Reverseengineering a wide … range of technologies to uncover vulnerabilities and improve security including operating systems and/or firmware internals, security architectures and hardware abstraction. Engineering software from design to delivery in modern IDEs and languages, using Agile delivery. Creating tested and testable code. Integrating with automated verification systems, CI and CD pipelines. Working closely with cybersecurity teams to prioritize vulnerabilities and … in one or more of C, C++, Java or C#. Familiarity with scripting and automation using Python, Bash, Powershell or Groovy. Experience working with IDA Pro or Ghidra for reverseengineering Experience working with Linux or Windows-based systems. Awareness of secure coding practices and modern cybersecurity threats. Knowledge of principles used in Agile environments. Desirable exposure Any More ❯
at dissecting technical systems, not just to understand how they work, but to identify weaknesses, assess risks, and develop mitigation strategies. What You'll Be Doing Software analysis and reverseengineering of compiled or interpreted code that could be obfuscated or defensively structured, for either x86/x64 or ARM processor architectures. Reverseengineering a wide … range of technologies to uncover vulnerabilities and improve security including operating systems and/or firmware internals, security architectures and hardware abstraction. Engineering software from design to delivery in modern IDEs and languages, using Agile delivery. Creating tested and testable code. Integrating with automated verification systems, CI and CD pipelines. Working closely with cybersecurity teams to prioritize vulnerabilities and … in one or more of C, C++, Java or C#. Familiarity with scripting and automation using Python, Bash, Powershell or Groovy. Experience working with IDA Pro or Ghidra for reverseengineering Experience working with Linux or Windows-based systems. Awareness of secure coding practices and modern cybersecurity threats. Knowledge of principles used in Agile environments. Desirable exposure Any More ❯
Aspiron are retained by one of the most exciting London based security startups building an ReverseEngineering and Malware Analysis product. They are building a world class tech hub in the UK, looking for strong security research talent to join them on their mission, building cutting edge tech enabling you to work with the UK and US Gov … analysing software created in C/C++, GO, Rust, Java or C# and developing novel program analysis techniques for identifying using AI models. Requirements: Recent and relevant experience in Reverseengineering, Security research, malware analysis and Vulnerability research. Familiar with IDA Pro or Ghidra or other reverseengineering tools Experienced with low level languages: C/ More ❯
Aspiron are retained by one of the most exciting London based security startups building an ReverseEngineering and Malware Analysis product. They are building a world class tech hub in the UK, looking for strong security research talent to join them on their mission, building cutting edge tech enabling you to work with the UK and US Gov … analysing software created in C/C++, GO, Rust, Java or C# and developing novel program analysis techniques for identifying using AI models. Requirements: Recent and relevant experience in Reverseengineering, Security research, malware analysis and Vulnerability research. Familiar with IDA Pro or Ghidra or other reverseengineering tools Experienced with low level languages: C/ More ❯
Aspiron are retained by one of the most exciting London based security startups building an ReverseEngineering and Malware Analysis product. They are building a world class tech hub in the UK, looking for strong security research talent to join them on their mission, building cutting edge tech enabling you to work with the UK and US Gov … analysing software created in C/C++, GO, Rust, Java or C# and developing novel program analysis techniques for identifying using AI models. Requirements: Recent and relevant experience in Reverseengineering, Security research, malware analysis and Vulnerability research. Familiar with IDA Pro or Ghidra or other reverseengineering tools Experienced with low level languages: C/ More ❯
Aspiron are retained by one of the most exciting London based security startups building an ReverseEngineering and Malware Analysis product. They are building a world class tech hub in the UK, looking for strong security research talent to join them on their mission, building cutting edge tech enabling you to work with the UK and US Gov … analysing software created in C/C++, GO, Rust, Java or C# and developing novel program analysis techniques for identifying using AI models. Requirements: Recent and relevant experience in Reverseengineering, Security research, malware analysis and Vulnerability research. Familiar with IDA Pro or Ghidra or other reverseengineering tools Experienced with low level languages: C/ More ❯
london (city of london), south east england, united kingdom
Aspiron Search
Aspiron are retained by one of the most exciting London based security startups building an ReverseEngineering and Malware Analysis product. They are building a world class tech hub in the UK, looking for strong security research talent to join them on their mission, building cutting edge tech enabling you to work with the UK and US Gov … analysing software created in C/C++, GO, Rust, Java or C# and developing novel program analysis techniques for identifying using AI models. Requirements: Recent and relevant experience in Reverseengineering, Security research, malware analysis and Vulnerability research. Familiar with IDA Pro or Ghidra or other reverseengineering tools Experienced with low level languages: C/ More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
multidisciplinary teams to deliver innovative solutions, drive research outcomes, and influence the future direction of cyber capabilities in national security. Key Responsibilities Conduct deep-dive research in vulnerability discovery, reverseengineering, and embedded systems. Design and implement rapid prototypes to test novel cyber capabilities. Analyse network protocols and system behaviour to identify security weaknesses. Lead and manage small … projects from concept to delivery. Excellent written and verbal communication skills. Active Enhanced DV/UKIC Clearance Desirable: Hardware prototyping, PCB design, embedded software development (ARM, AVR, PowerPC, MIPS), reverseengineering (IDA Pro, Ghidra, Binary Ninja), vulnerability research/exploit development, RF/SDR experience, penetration testing, and network engineering experience. Benefits Hybrid/Remote Work Pattern More ❯
Gloucester, England, United Kingdom Hybrid / WFH Options
Searchability NS&D
multidisciplinary teams to deliver innovative solutions, drive research outcomes, and influence the future direction of cyber capabilities in national security. Key Responsibilities Conduct deep-dive research in vulnerability discovery, reverseengineering, and embedded systems. Design and implement rapid prototypes to test novel cyber capabilities. Analyse network protocols and system behaviour to identify security weaknesses. Lead and manage small … projects from concept to delivery. Excellent written and verbal communication skills. Active Enhanced DV/UKIC Clearance Desirable: Hardware prototyping, PCB design, embedded software development (ARM, AVR, PowerPC, MIPS), reverseengineering (IDA Pro, Ghidra, Binary Ninja), vulnerability research/exploit development, RF/SDR experience, penetration testing, and network engineering experience. Benefits Hybrid/Remote Work Pattern More ❯
cheltenham, south west england, united kingdom Hybrid / WFH Options
Searchability NS&D
multidisciplinary teams to deliver innovative solutions, drive research outcomes, and influence the future direction of cyber capabilities in national security. Key Responsibilities Conduct deep-dive research in vulnerability discovery, reverseengineering, and embedded systems. Design and implement rapid prototypes to test novel cyber capabilities. Analyse network protocols and system behaviour to identify security weaknesses. Lead and manage small … projects from concept to delivery. Excellent written and verbal communication skills. Active Enhanced DV/UKIC Clearance Desirable: Hardware prototyping, PCB design, embedded software development (ARM, AVR, PowerPC, MIPS), reverseengineering (IDA Pro, Ghidra, Binary Ninja), vulnerability research/exploit development, RF/SDR experience, penetration testing, and network engineering experience. Benefits Hybrid/Remote Work Pattern More ❯
Doing: Security-Driven Development - Enhance and extend mobile app security solutions using system-level insights. Mobile OS Research - Dive into Android, iOS, and HarmonyOS Next to analyse system behaviours. ReverseEngineering & Security Testing - Utilise white hat techniques, including penetration testing and reverseengineering, to identify and address threats. Collaboration & Innovation - Work closely with the team in More ❯
Doing: Security-Driven Development - Enhance and extend mobile app security solutions using system-level insights. Mobile OS Research - Dive into Android, iOS, and HarmonyOS Next to analyse system behaviours. ReverseEngineering & Security Testing - Utilise white hat techniques, including penetration testing and reverseengineering, to identify and address threats. Collaboration & Innovation - Work closely with the team in More ❯
in Chinese and English and love tackling complex security challenges, this role is for you! Mobile OS Research Dive into Android, iOS, and HarmonyOS Next to analyse system behaviours. ReverseEngineering & Security Testing Utilise white hat techniques, including penetration testing and reverseengineering, to identify and address threats. Collaboration & Innovation Work closely with the team in More ❯
interest in embedded systems, IoT and hardware Demonstrated hardware security skills either in professional or hobbyist sphere Strong network protocol analysis using tools such as Wireshark An understanding of reverseengineering, experience using tools such as Ghidra, with particular focus on ARM and x86 architectures Ability to script in appropriate languages to facilitate testing Awareness of typical Industrial … wider system Performing lab-based testing of complex control systems used in Critical National Infrastructure, allowing more aggressive and invasive techniques to be used than in traditional ICS environments Reverseengineering the protocol used in a legacy specialised machine tool to allow it to be serviceable long into the future Attempting to bypass a custom digital rights management More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Bristol/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter you will be … creative and analytical problem-solver who can work independently and as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, Threat Intelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding … think like an adversary and anticipate their next moves. Strong understanding of forensic analysis principles. Desired Certifications (one or more is a plus) GIAC Certified Threat Hunter (GCTH) GIAC ReverseEngineering Malware (GREM) Offensive Security Certified Professional (OSCP) Certified Ethical Hacker (CEH) For any further queries regarding the role, please contact Danny Palmer at Reasonable Adjustments: Respect and More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Edinburgh/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter you will be … creative and analytical problem-solver who can work independently and as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, Threat Intelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding … think like an adversary and anticipate their next moves. Strong understanding of forensic analysis principles. Desired Certifications (one or more is a plus) GIAC Certified Threat Hunter (GCTH) GIAC ReverseEngineering Malware (GREM) Offensive Security Certified Professional (OSCP) Certified Ethical Hacker (CEH) For any further queries regarding the role, please contact Danny Palmer at Reasonable Adjustments: Respect and More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Threat Hunter Peterborough/Hybrid Working £75,000 - £85,000 + benefits Fantastic new permanent opportunity for an experienced Security Engineer with strong Threat Engineering/Hunting experience required to join this specialist financial services business to help them deliver a range of proactive threat hunting cyber security projects. As a specialist Threat Hunter you will be … creative and analytical problem-solver who can work independently and as part of a team to enhance their security posture. Skills Required: A strong proven background within Cyber Security engineering and at least 2-3 years' experience dedicated to Threat Hunting, Threat Intelligence and Threat Modelling. Proven experience in a SOC, CIRT, or similar security operations environment. Deep understanding … think like an adversary and anticipate their next moves. Strong understanding of forensic analysis principles. Desired Certifications (one or more is a plus) GIAC Certified Threat Hunter (GCTH) GIAC ReverseEngineering Malware (GREM) Offensive Security Certified Professional (OSCP) Certified Ethical Hacker (CEH) For any further queries regarding the role, please contact Danny Palmer at Reasonable Adjustments: Respect and More ❯
improvement of incident response processes. Key Responsibilities: Lead complex investigations into security incidents and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat intelligence into monitoring and detection workflows. Liaise More ❯
improvement of incident response processes. Key Responsibilities: Lead complex investigations into security incidents and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat intelligence into monitoring and detection workflows. Liaise More ❯
improvement of incident response processes. Key Responsibilities: Lead complex investigations into security incidents and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools - particularly IBM QRadar , Splunk, and Microsoft Sentinel. Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat More ❯
Leicester, Leicestershire, England, United Kingdom Hybrid / WFH Options
Akkodis
SSRS. Skilled in SPROC and Function development. Experience in Azure SQL, Azure Analytics, or similar (or a strong willingness to learn). Strong data analytical skills and ability to reverse engineer legacy data structures. What They Offer: Competitive salary and a 10% employer pension contribution. 10% Profit Share Bonus scheme. 30 days of annual leave plus Bank Holidays and More ❯
Leicester, Leicestershire, England, United Kingdom Hybrid / WFH Options
Akkodis
SSRS. Skilled in SPROC and Function development. Experience in Azure SQL, Azure Analytics, or similar (or a strong willingness to learn). Strong data analytical skills and ability to reverse engineer legacy data structures. What They Offer: Competitive salary and a 10% employer pension contribution. 10% Profit Share Bonus scheme. 30 days of annual leave plus Bank Holidays and More ❯
ATT&CK to attribute attacks and inform proactive defences. Crisis Management: Lead coordination between internal stakeholders, third parties, and law enforcement. Cybersecurity Advisory: Help clients improve incident readiness, detection engineering, and response capabilities. Innovation: Contribute to new playbooks, tools, and methodologies to evolve our DFIR practice. Mentorship: Train and coach junior consultants in incident response and digital forensics. Industry … certifications such as GIAC (GCFA, GEIR, GCFE, GREM, GNFA), CREST CRTIR, CISM, CISSP. Sector exposure across government, financial services, healthcare, or critical national infrastructure (CNI). Skills in malware reverseengineering and deep knowledge of adversary tradecraft. Experience working with regulators, insurers, and legal counsel during breaches. Contributions to the wider cybersecurity community (research, publications, speaking engagements). More ❯
cloud (including public, private, distributed, hybrid, and multi) and on-premise platforms and products Qualifications 3+ years people management or technical lead experience 5+ years of software or systems engineering experience Must possess or have the ability to obtain and maintain a Security Check (SC) clearance (required). Strong overall business and communication skills, including executive presentation skills and … etc. Preferred Qualifications Hands-on experience developing or securing services on a public cloud platform (e.g., AWS, Azure, GCP, OCI) Proven ability to drive culture and behavioral change within engineering organizations Strong knowledge of compliance program security controls, like ISO 27001, SOC 2, HITRUST, FedRAMP, and UK Cyber Essentials as applied to cloud SaaS, PaaS, and IaaS operations. Experience … features Expertise in applying risk identification techniques to develop security solutions Experience and understanding of cryptographic algorithms, standards, implementation and application Experience and understanding of threat modeling, penetration testing, reverseengineering and attacks on software Experience working with large enterprise customers The ideal candidate posseses or has the ability to obtain and maintain a Developed Vetting (DV) clearance. More ❯
development experience is essential. Key experience C++ Multithreading Windows programming MS Visual Studio Unit testing Any experience in the following areas would be advantageous for any application Microservices architecture Reverseengineering in Windows Windows kernel development WinAPI COM/ATL/WTL SQL CI/CD C# Agile Algorithm development If you are looking for a role of More ❯