to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Threat Hunting … Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & ReverseEngineering Network & Endpoint Security Monitoring (EDR, IDS/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working More ❯
to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Willingness to … Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & ReverseEngineering Network & Endpoint Security Monitoring (EDR, IDS/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malware analysis and reverseengineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity More ❯
databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malware analysis and reverseengineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
security tools such as firewalls, VPNs, AV, IDS/IPS, and log management. Experience analysing log data and network security events. Desirable Skills: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst certification. Familiarity with additional SIEM tools such as QRadar. Benefits: 25 days annual leave, with the option to purchase more Health cash plan Life More ❯
Interpersonal and presentation skills. Analytical skills. Understanding of network traffic and activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (Penetration Testing). Ability to learn forensic techniques and reverse engineer attacks. Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work independently. Willingness to work in a 24/7 operational environment or on More ❯
at dissecting technical systems, not just to understand how they work, but to identify weaknesses, assess risks, and develop mitigation strategies. What You'll Be Doing Software analysis and reverseengineering of compiled or interpreted code that could be obfuscated or defensively structured, for either x86/x64 or ARM processor architectures. Reverseengineering a wide … range of technologies to uncover vulnerabilities and improve security including operating systems and/or firmware internals, security architectures and hardware abstraction. Engineering software from design to delivery in modern IDEs and languages, using Agile delivery. Creating tested and testable code. Integrating with automated verification systems, CI and CD pipelines. Working closely with cybersecurity teams to prioritize vulnerabilities and … in one or more of C, C++, Java or C#. Familiarity with scripting and automation using Python, Bash, Powershell or Groovy. Experience working with IDA Pro or Ghidra for reverseengineering Experience working with Linux or Windows-based systems. Awareness of secure coding practices and modern cybersecurity threats. Knowledge of principles used in Agile environments. Desirable exposure Any More ❯
Job summary Are you looking for a pivotal role, where you can leverage your extensive experience in data engineering and architecture to design and implement robust data solutions that drive business insights and decision-making? We are looking for a Principal Data Engineer to lead a growing team and to own and help deliver our Digital and Data strategy. … such as GDPR and Cyber Essentials Plus Oversee robust data ingestion and integration frameworks that ensure data consistency, accuracy, and timeliness across our systems. Collaborate with business, product, and engineering teams to understand data needs and translate them into scalable technical designs and roadmaps. Continuously evolve our data infrastructure to improve performance, reduce latency, and enhance data accessibility across … the organisation. Provide technical guidance to data engineers and analysts, fostering a culture of engineering excellence and continuous learning and setting engineering standards Support the delivery of strategic projects Please refer to the attached job profile for more details. Key Skills, Knowledge and Experience: Advanced SQL and scripting skills (e.g., Python, TSQL, PowerShell) for data engineering, automation More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Forward Role
mitigation strategies. What You'll Be Doing Researching, designing, and building resilient systems to support National Security objectives. Conducting vulnerability assessments and threat modelling on software and hardware components. Reverseengineering a wide range of technologies to uncover vulnerabilities and improve security. Writing secure, high-performance code that integrates deeply with operating systems and platforms. Developing tools and More ❯
response Mentor and train incident other team members on detection techniques and processes Qualification/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of … ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics and network analysis techniques and tools - Understanding of malware and reverseengineering - Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms (AWS, Azure, Google, etc.) - Excellent verbal and written communication skills More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
Damco Spain SL
through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF. Bonus Points: Knowledge of reverseengineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc) is desirable. Some programming experience for example, C, Python, Go, and/or other languages More ❯
Engineering Managers are passionate people leaders. You take pride in building great products and growing people and leaders. You represent the engineering organization and can turn undefined or partial requirements into an execution plan. You understand technology and can dive deep when needed to remove obstacles and address challenges by suggesting realistic solutions. You have an eye for … that your position and career are not about only yourself, but about your team(s). When you speak, you speak for the business and for your team. Daily Engineering Manager responsibilities include: Managing engineering requests and desired outcomes: Collaborate with Product Management to define the scope of products and deliverables. Estimate and communicate efforts timelines and feasibility … assignments. (Re)Organize the team when needed. Assist with customer escalations. Participate in setting and maintaining the department budget. Required Qualifications Bachelor's degree in computer science or related engineering or scientific field. 5+ years of experience leading a team of software engineers or other technical specialists (System Administrators, Professional Services, Technical Consultants) 10+ years of experience in data More ❯
mysteries of outdated systems? If so, we have an exciting opportunity for you! Our client are seeking a talented and experienced Principle Embedded Software Engineer with a specialization in reverseengineering old embedded technology to join this dynamic team! The main objective of this role will be to reverse engineer a range of outdated embedded systems and … to current industry standards. Alongside this you will be given the opportunity to lead on the newer and more complex projects that the business is working on. Your Responsibilities: - Reverse engineer and analyse legacy embedded systems, including hardware and software components. - Develop strategies and methodologies for extracting code, protocols, and data from outdated embedded devices. - Collaborate with cross-functional … teams to understand system requirements and design specifications of legacy systems. - Identify and document system vulnerabilities, weaknesses, and potential security risks in the reverse-engineered technology. - Perform testing, debugging, and code optimization to ensure the compatibility and functionality of the reverse-engineered systems. Your Skills and Qualifications: - Bachelor's degree in Computer Science, Electrical Engineering, or a More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Circle Group
of complex targets, including mobile platforms, embedded systems, and non-trivial binaries. The role is fully remote and demands a high level of autonomy, skill, and commitment. Core Responsibilities Reverseengineering software and firmware to uncover security flaws Developing and demonstrating proof-of-concept exploits Analysing binary targets using tools like IDA Pro, Binary Ninja, or Ghidra Engaging … tools and techniques Strong low-level programming and debugging skills Eligible for security clearance in the UK, US, Australia, or New Zealand Degree (or equivalent experience) in Computer Science, Engineering, Cybersecurity or related field Desirable Existing security clearance (Secret or above) Knowledge of anti-reversing techniques, implants, and advanced threat emulation Proficiency in multiple architectures (e.g. x86, ARM) Background More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
of complex targets, including mobile platforms, embedded systems, and non-trivial binaries. The role is fully remote and demands a high level of autonomy, skill, and commitment. Core Responsibilities Reverseengineering software and firmware to uncover security flaws Developing and demonstrating proof-of-concept exploits Analysing binary targets using tools like IDA Pro, Binary Ninja, or Ghidra Engaging … tools and techniques Strong low-level programming and debugging skills Eligible for security clearance in the UK, US, Australia, or New Zealand Degree (or equivalent experience) in Computer Science, Engineering, Cybersecurity or related field Desirable Existing security clearance (Secret or above) Knowledge of anti-reversing techniques, implants, and advanced threat emulation Proficiency in multiple architectures (e.g. x86, ARM) Background More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Circle Group
of complex targets, including mobile platforms, embedded systems, and non-trivial binaries. The role is fully remote and demands a high level of autonomy, skill, and commitment. Core Responsibilities Reverseengineering software and firmware to uncover security flaws Developing and demonstrating proof-of-concept exploits Analysing binary targets using tools like IDA Pro, Binary Ninja, or Ghidra Engaging … tools and techniques Strong low-level programming and debugging skills Eligible for security clearance in the UK, US, Australia, or New Zealand Degree (or equivalent experience) in Computer Science, Engineering, Cybersecurity or related field Desirable Existing security clearance (Secret or above) Knowledge of anti-reversing techniques, implants, and advanced threat emulation Proficiency in multiple architectures (e.g. x86, ARM) Background More ❯
University (48 months' programme). Responsibilities: As a Software Engineer degree apprentice, you'll learn how to be accountable for the undertaking and completion of the analysis of software engineering business issues for either the entire requirement or subset thereof dependent on complexity and/or scope size You'll be instrumentalin implementingGlue'ssoftware solutions, or part thereof, dependent … on complexity and scope size, is understood and correctly used You'll facilitate ongoing support of oursoftware solutions or part thereof, dependent on complexity and technology, e. g.by troubleshooting, reverseengineering and conducting root cause analysis As a Software Engineer degree apprentice, you'll learn how to apply engineering principles to all stages of the software development More ❯
please speak to your recruiter about the options Requisition ID: 121882 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverseengineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for our More ❯
with Product Managers and other teams to consolidate requirements into a cohesive roadmap or technical approach. Staying updated on industry and technological advancements and presenting on those topics to engineering groups. Mentoring less experienced team members to support their career development. Championing best practices in design, architecture, code reuse, performance, and quality. Working with the engineering team across … experience with C/C++ on Windows and/or macOS. Expert C/C++ coding skills, including experience at the driver and kernel module level. Excellent debugging skills, reverseengineering techniques, and experience debugging user and kernel space code. Experience with Windows Filtering Platform on Windows and/or system extensions on macOS. Knowledge of software development More ❯
Salary : £15.08 per hour Location : Consett, UK Type : Permanent, Full-time Industry : Manufacturing/Engineering Job Description Are you an experienced, time-served machinist with a deep understanding of CNC programming and operation? Our client in Consett specializes in reverseengineering, providing precision parts and components for a variety of industries. They are seeking a permanent CNC … and Fagor systems to join their team who specialises in either CNC Milling or Turning. This role requires proficiency in programming and operating CNC equipment, with a focus on reverseengineering processes. Responsibilities Program and operate CNC machines, focusing on either milling or turning, with Mazak and Fagor controls. Work with engineers to reverse-engineer parts and … components, ensuring accuracy and quality. Read and interpret engineering drawings, blueprints, and technical specifications. Set up machines, install tooling, and ensure proper calibration for each production run. Conduct quality inspections to ensure finished products meet required specifications. Perform routine maintenance and troubleshooting on CNC machinery. Adhere to all safety protocols and maintain a clean and organized work environment. Requirements More ❯
Doncaster, Yorkshire, United Kingdom Hybrid / WFH Options
RH Recruiting Limited
complex lifting systems. Key Responsibilities: Programming, fault-finding, and support of PLC and electrical control systems Development and review of PLC logic, FDS documents, and design specifications Retrieval and reverseengineering of existing PLC code Preparation of documentation, workpacks, and certification Creation and execution of Factory Acceptance Tests (FAT) with client representatives Full project engineering and management … complex lifting systems. Key Responsibilities: Programming, fault-finding, and support of PLC and electrical control systems Development and review of PLC logic, FDS documents, and design specifications Retrieval and reverseengineering of existing PLC code Preparation of documentation, workpacks, and certification Creation and execution of Factory Acceptance Tests (FAT) with client representatives Full project engineering and management More ❯
please speak to your recruiter about the options Requisition ID: 121884 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverseengineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for our … customers across a wide variety of platforms and technologies. We are looking for experienced Vulnerability Researchers and Reverse Engineers who want to have a meaningful and tangible impact on the National Security of the UK. Whether you have worked in this space before or not, you will receive a dedicated training budget, along with all the mentorship and support … to succeed in our team. Role Description Technical delivery: perform vulnerability research and/or reverseengineering on complex and unique challenges, across a myriad of platforms. Mentorship, team-leadership, and collaboration: deliver your research as part of a team, whilst knowledge-sharing and mentoring junior team-members. Adaptability: work across a range of tools and platforms, picking More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
plus strong scripting ability in Python for automation. Solid understanding of memory-safety vulnerabilities, undefined behaviour, sanitisers, and compiler instrumentation. Demonstrated ability to triage crashes using debuggers, profilers, and reverse-engineering tools (gdb/lldb, IDA/Ghidra). Excellent written communication for documenting findings and influencing engineering teams. "Nice To Have" Skills and Experience : Contributions to … of distributed fuzzing at scale (GCP/AWS, Kubernetes, or bare-metal clusters). Familiarity with kernel, embedded, or firmware fuzzing (e.g., Syzkaller, QEMU-based harnesses). Background in reverseengineering, static analysis or symbolic execution. Experience integrating fuzzing into CI/CD pipelines and tracking coverage metrics. If you're passionate about breaking software safely, love high More ❯