Date: ASAP Clearance: DV/eDV Cleared Role Summary: Our Defence Clients Cyber Research Group (CRG) is looking for a Principal Cyber Researcher to conduct cutting-edge research and development across multiple cyber domains. As Cyber Researcher, you will drive technical investigations, design rapid prototypes, and uncover emerging threats and vulnerabilities. In addition to hands-on research, our Principal … Cyber Researcher will be involved in day-to-day CRG operations, help shape the team's long-term strategy, and support business development and bidding activities. To be eligible for this role you must hold active enhanced DV clearance or be eligible for one. Key Responsibilities: Conduct deep-dive research in vulnerability discovery, reverse engineering, and embedded systems … findings, and recommendations for internal and external stakeholders Manage small research teams, track progress, and report to customers Contribute to CRG's strategic planning and operational management Support business development efforts, including proposal writing and technical briefings Essential Skills and Experience: DV/eDV clearance Proficiency in programming languages such as C, C++, or Python Strong working knowledge of More ❯
Date: ASAP Clearance: DV/eDV Cleared Role Summary: Our Defence Clients Cyber Research Group (CRG) is looking for a Principal Cyber Researcher to conduct cutting-edge research and development across multiple cyber domains. As Cyber Researcher, you will drive technical investigations, design rapid prototypes, and uncover emerging threats and vulnerabilities. In addition to hands-on research, our Principal … Cyber Researcher will be involved in day-to-day CRG operations, help shape the team's long-term strategy, and support business development and bidding activities. To be eligible for this role you must hold active enhanced DV clearance or be eligible for one. Key Responsibilities: Conduct deep-dive research in vulnerability discovery, reverse engineering, and embedded systems … findings, and recommendations for internal and external stakeholders Manage small research teams, track progress, and report to customers Contribute to CRG's strategic planning and operational management Support business development efforts, including proposal writing and technical briefings Essential Skills and Experience: DV/eDV clearance Proficiency in programming languages such as C, C++, or Python Strong working knowledge of More ❯
Date: ASAP Clearance: DV/eDV Cleared Role Summary: Our Defence Clients Cyber Research Group (CRG) is looking for a Principal Cyber Researcher to conduct cutting-edge research and development across multiple cyber domains. As Cyber Researcher, you will drive technical investigations, design rapid prototypes, and uncover emerging threats and vulnerabilities. In addition to hands-on research, our Principal … Cyber Researcher will be involved in day-to-day CRG operations, help shape the team's long-term strategy, and support business development and bidding activities. To be eligible for this role you must hold active enhanced DV clearance or be eligible for one. Key Responsibilities: Conduct deep-dive research in vulnerability discovery, reverse engineering, and embedded systems … findings, and recommendations for internal and external stakeholders Manage small research teams, track progress, and report to customers Contribute to CRG's strategic planning and operational management Support business development efforts, including proposal writing and technical briefings Essential Skills and Experience: DV/eDV clearance Proficiency in programming languages such as C, C++, or Python Strong working knowledge of More ❯
eDV Job Summary: Our Defence Cyber Research Group (CRG) is seeking a technically proficient and analytically minded Vulnerability Researcher with experience in hardware analysis to support advanced research and development activities. As Vulnerability Researcher, you will conduct in-depth technical investigations, developing prototypes, and contributing to the discovery and analysis of emerging threats and vulnerabilities. You must be eligible … and recover data from flash memory including NAND, eMMC and SPI. Conduct side channel attacks such as timing attacks, voltage glitching and power analysis. Design and implement hardware/software rapid prototypes to explore novel cyber capabilities and concepts. Analyse network protocols and system behaviours to identify potential security weaknesses. Collaborate with multidisciplinary teams to deliver technical solutions and … research outcomes. Document findings and methodologies in a clear and structured manner for internal and external stakeholders. Essential Skills and Experience: Hardware development and prototyping, including PCB design and microcontroller programming. Experience extracting data from flash storage ICs. Familiarity with logic analysers and oscilloscopes. Advanced soldering and desoldering experience. Basic understanding of side channel attack techniques. (experience not required More ❯
eDV Job Summary: Our Defence Cyber Research Group (CRG) is seeking a technically proficient and analytically minded Vulnerability Researcher with experience in hardware analysis to support advanced research and development activities. As Vulnerability Researcher, you will conduct in-depth technical investigations, developing prototypes, and contributing to the discovery and analysis of emerging threats and vulnerabilities. You must be eligible … and recover data from flash memory including NAND, eMMC and SPI. Conduct side channel attacks such as timing attacks, voltage glitching and power analysis. Design and implement hardware/software rapid prototypes to explore novel cyber capabilities and concepts. Analyse network protocols and system behaviours to identify potential security weaknesses. Collaborate with multidisciplinary teams to deliver technical solutions and … research outcomes. Document findings and methodologies in a clear and structured manner for internal and external stakeholders. Essential Skills and Experience: Hardware development and prototyping, including PCB design and microcontroller programming. Experience extracting data from flash storage ICs. Familiarity with logic analysers and oscilloscopes. Advanced soldering and desoldering experience. Basic understanding of side channel attack techniques. (experience not required More ❯
eDV Job Summary: Our Defence Cyber Research Group (CRG) is seeking a technically proficient and analytically minded Vulnerability Researcher with experience in hardware analysis to support advanced research and development activities. As Vulnerability Researcher, you will conduct in-depth technical investigations, developing prototypes, and contributing to the discovery and analysis of emerging threats and vulnerabilities. You must be eligible … and recover data from flash memory including NAND, eMMC and SPI. Conduct side channel attacks such as timing attacks, voltage glitching and power analysis. Design and implement hardware/software rapid prototypes to explore novel cyber capabilities and concepts. Analyse network protocols and system behaviours to identify potential security weaknesses. Collaborate with multidisciplinary teams to deliver technical solutions and … research outcomes. Document findings and methodologies in a clear and structured manner for internal and external stakeholders. Essential Skills and Experience: Hardware development and prototyping, including PCB design and microcontroller programming. Experience extracting data from flash storage ICs. Familiarity with logic analysers and oscilloscopes. Advanced soldering and desoldering experience. Basic understanding of side channel attack techniques. (experience not required More ❯
eDV Job Summary: Our Defence Cyber Research Group (CRG) is seeking a technically proficient and analytically minded Vulnerability Researcher with experience in hardware analysis to support advanced research and development activities. As Vulnerability Researcher, you will conduct in-depth technical investigations, developing prototypes, and contributing to the discovery and analysis of emerging threats and vulnerabilities. You must be eligible … and recover data from flash memory including NAND, eMMC and SPI. Conduct side channel attacks such as timing attacks, voltage glitching and power analysis. Design and implement hardware/software rapid prototypes to explore novel cyber capabilities and concepts. Analyse network protocols and system behaviours to identify potential security weaknesses. Collaborate with multidisciplinary teams to deliver technical solutions and … research outcomes. Document findings and methodologies in a clear and structured manner for internal and external stakeholders. Essential Skills and Experience: Hardware development and prototyping, including PCB design and microcontroller programming. Experience extracting data from flash storage ICs. Familiarity with logic analysers and oscilloscopes. Advanced soldering and desoldering experience. Basic understanding of side channel attack techniques. (experience not required More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
Searchability
uncover emerging cyber threats and vulnerabilities. This is a hands-on research role with added responsibility for shaping the team's strategy, managing small research projects, and supporting business development and bidding efforts. You'll collaborate with multidisciplinary teams to deliver innovative solutions, drive research outcomes, and influence the future direction of cyber capabilities in national security. Key Responsibilities … Conduct deep-dive research in vulnerability discovery, reverse engineering, and Embedded systems. Design and implement rapid prototypes to test novel cyber capabilities. Analyse network protocols and system behaviour to identify security weaknesses. Lead and manage small research teams, tracking progress and reporting to stakeholders. Document methodologies, findings, and recommendations clearly for technical and non-technical audiences. Support strategic planning … operational management, and business development initiatives. Skills & Experience Proficiency in programming languages such as C, C++, or Python. Strong knowledge of Linux systems, command-line tools, and system configuration. Solid understanding of networking protocols (TCP/IP, UDP, DNS, HTTP, ICMP). Rapid prototyping experience (eg, Raspberry Pi, Arduino, virtualised environments). Analytical and methodical problem-solving approach. Proven More ❯
Gloucester, Gloucestershire, South West, United Kingdom Hybrid / WFH Options
NSD
DV/UKIC Clearance About the Role We're looking for a hands-on Vulnerability Researcher to investigate emerging cyber threats and vulnerabilities. You'll work across hardware and software, developing prototypes, conducting side-channel analysis, and uncovering security weaknesses that support national security operations. This role offers the chance to collaborate with multidisciplinary teams, shape research initiatives, and … engineer hardware for analysis. Extract and recover data from flash memory (NAND, eMMC, SPI). Perform side-channel attacks (timing, voltage glitching, power analysis). Build rapid hardware/software prototypes to test new concepts. Analyse system and network behavior for potential vulnerabilities. Document and communicate findings clearly to technical and non-technical stakeholders. Skills & Experience Hardware prototyping, PCB … Strong Linux knowledge (CLI, system configuration). Analytical, methodical problem-solving approach. Must hold Enhanced DV/UKIC Clearance Nice-to-Haves: Reverse engineering (IDA Pro, Ghidra, Binary Ninja), embeddedsoftwaredevelopment, RF/SDR experience, network engineering exposure, vulnerability research. Benefits Hybrid/Remote Work Pattern - 1-2 days on-site per week 37-hour workweek More ❯