Kingston Upon Thames, Surrey, United Kingdom Hybrid / WFH Options
Unilever
identify, assess, and reduce external exposure. Bug Bounty Program Management : Experience managing or collaborating with external bug bounty platforms (e.g., HackerOne, Bugcrowd), including triage and remediation workflows. Exploit Development & VulnerabilityResearch : Ability to identify and exploit zero-day and known vulnerabilities, and develop custom proof-of-concept exploits. Tool Proficiency : Offensive tools: Cobalt Strike, Metasploit, Burp Suite, Nmap … through offensive testing. Experience - 15+ years in cybersecurity, with 5+ years in offensive security and team leadership. - Deep hands-on experience with red/purple teaming, adversary emulation, and vulnerability exploitation. - Proficiency with tools such as Cobalt Strike, Metasploit, Burp Suite, BloodHound, and custom scripting. - Strong understanding of MITRE ATT&CK, cyber kill chain, and threat-informed defense. - Experience More ❯
Kingston-on-soar, Nottinghamshire, United Kingdom Hybrid / WFH Options
Unilever
identify, assess, and reduce external exposure. Bug Bounty Program Management : Experience managing or collaborating with external bug bounty platforms (e.g., HackerOne, Bugcrowd), including triage and remediation workflows. Exploit Development & VulnerabilityResearch : Ability to identify and exploit zero-day and known vulnerabilities, and develop custom proof-of-concept exploits. Tool Proficiency : Offensive tools: Cobalt Strike, Metasploit, Burp Suite, Nmap … through offensive testing. Experience - 15+ years in cybersecurity, with 5+ years in offensive security and team leadership. - Deep hands-on experience with red/purple teaming, adversary emulation, and vulnerability exploitation. - Proficiency with tools such as Cobalt Strike, Metasploit, Burp Suite, BloodHound, and custom scripting. - Strong understanding of MITRE ATT&CK, cyber kill chain, and threat-informed defense. - Experience More ❯
on our client's mobile team. Experience supporting development on or analysis of Mobile devices Strong proficiency in C programming Experience doing reverse engineering on diverse architectures Experience with vulnerabilityresearch Salaries from 225K to 275K, TS/SCI FS poly required, Annapolis Junction. More ❯
implementation of cybersecurity solutions in conjunction with the Navy tactical configuration development and associated tactical applications, applying principles and techniques of network engineering, cybersecurity engineering, and systems administration. Conduct vulnerabilityresearch, malware analysis, penetration testing, and reverse engineering development of computer network operations, as required. Conduct installation and integration of Commercial Off-The-Shelf (COTS) cybersecurity tools and More ❯
and maintains full spectrum cyber solutions. Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations. Provides DevOps solutions enabling software quality assurance for vulnerabilityresearch, reverse engineering, penetration testing (red/blue teams), and develops specialized cyber software solutions and tools based on mission requirements. Applies system knowledge. of subject matter (hardware … software, networks, cloud, etc.) to conduct research to evaluate potential vulnerabilities and develop new capabilities to exploit and/or mitigate vulnerabilities. Required Skills: • Minimum of 3 years Software Engineering experience, or related field • Python Coding and Development • Gitlab/GitHub Continuous Integration & Continuous Development • (CI/CD) Implementation and Application • Bachelor's degree from an accredited college in More ❯
self-motivated individuals for our Technical Operator positions to work closely with our Penetration Testers. You should have multiple years conducting targeting in support of cyber operations, specifically conducting vulnerabilityresearch on targets and systems to gain network/system access. You should have experience developing technical operation plans and gaining approval to execute them, briefing options and … relate alternative solutions and risks. • Develop routine proposals incorporating appropriate technical and operational issues into a plan based on consensus. • Write correspondence and coordinate with participants regarding operational plans, vulnerability assessments, risk evaluations, possible remedies, or execution plans. When appropriate, prepare intelligence reports following guidelines. • Ability to analyze the operational environment to identify appropriate equipment/systems required to … operations, incident response or computer forensics. • Ability to interact and communicate with individuals from diverse backgrounds and cultures and to convey technical information to non-technical individuals. • Ability to research, analyze, prioritize, problem solve, synthesize large amounts of data/information, and to work several tasks concurrently with minimal supervision. • Capable of handling stressful situations and demonstrated strong oral More ❯
UX design lead is a key member of a web design team responsible for leading the design of user interfaces and experiences. They collaborate closely with stakeholders, conduct user research, and manage a team of designers. Their goal is to create designs that are user-friendly, intuitive, and engaging. Position Responsibilities: • Gathering and Evaluating User Requirements: Working with product … sites function and look. • Troubleshooting UX Problems: Identifying and addressing issues related to responsiveness. • Adhering to Style Standards: Ensuring consistency in fonts, colors, and images2. • Testing and Analysis: Conducts vulnerabilityresearch, penetration testing, malware analysis and reverse engineering development of computer network operations tools. Required Qualifications: • An Active TS/SCI Clearance with Polygraph • 5+ years of experience More ❯
has immediate and funded openings in the Annapolis Junction, MD area for candidates experienced in the following areas: 1. ISSE/ISSO 2. CNO Developers/Reverse Engineers/Vulnerability Researchers 3. Full stack Software Engineers 4. Web Developers 5. DSP Engineers 6. Data Scientists 7. Automated Software Testers 8. High Performance Computing Systems Engineers 9. Cloud Developers 10. More ❯
risks are remediated in collaboration with service teams. Perform design reviews, threat modeling, security reviews, penetration testing, and red teaming on production systems. Scope and conduct penetration testing and vulnerabilityresearch on complex proprietary software and hardware. Collaborate with Amazon Security teams to develop large-scale testing, monitoring, remediation, and analytics solutions. Work with internal development teams to More ❯
Solihull, West Midlands, England, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
Associate Vulnerability Researcher Location: Solihull, hybrid (2 days a week on site) Salary: Up to £40,000 excellent benefits Sector: UK Telecoms & Cyber Security R&D About the role Love hacking, reverse engineering, or exploring binary analysis tools in your spare time? Join a top-tier UK telecoms lab as an Associate Vulnerability Researcher. You’ll learn from … with senior researchers to turn discoveries into actionable reports. You’ll be great if you have A solid understanding of computing fundamentals and networking. Enthusiasm for reverse engineering and vulnerability discovery. Exposure to tools like Ghidra, radare2 or IDA Pro, even through personal projects. SC or DV clearance (or eligible, sponsorship available). Benefits you'll enjoy Generous pension More ❯
applicants - please speak to your recruiter about the options Requisition ID: 121882 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverse engineering, and vulnerability research. With a focus on National Security, we work on some of the country's toughest challenges. Our people provide mission-changing capability for More ❯
applicants - please speak to your recruiter about the options Requisition ID: 121882 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverse engineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for More ❯
sector to maintain resiliency and security. Read more about UKTL here ! Successful candidates will join a state-of-the-art facility and be supporting the team conducting testing and research on the latest technologies and innovations in the industry. You will work alongside our infrastructure and Cybersecurity professionals to ensure that the UK's world class Telecoms infrastructure grows More ❯