Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
Confidential
Cyber Researcher Location: Gloucester, Manchester or London Our world class team of Cyber Researchers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are growing our Cyber Developer team significantly and are looking for … Responsibilities Researchers undertaking exploratory research are expected to: Rapidly summarise and assess new domains Provide domain knowledge for technical analysis, experimental development and subsequent engineering Researchers undertaking vulnerability & technical research are expected to: Know which pen-testing and reverseengineering tools and methodologies are appropriate to a … skills and experience in at least one of the areas below. An ideal candidate will cover several areas. Skills Technical Analysis: Network traffic analysis Reverseengineering Vulnerability analysis Exploit development Exploratory Research: OSINT and interacting with SMEs Developing new research skills as appropriate General: Technical Leadership Team management more »
Manchester, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
businesses can unlock digital advantage in the most demanding environments. Vulnerability Researcher - Operational Cyber Location: Manchester Our world-class team of Vulnerability Researchers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are looking … willingness to learn as all of our projects bring new and interesting challenges. What you will be doing for us: Performing Vulnerability Research and ReverseEngineering to handle complex and unique challenges across a myriad of platforms. Learning to use tools like Ghidra, IDA Pro, Unicorn and Frida … of staff with a keen interest in RE and VR to realise their potential. Ideal candidate background: An interest and aptitude for Vulnerability Research, ReverseEngineering, and Exploit Development (either from a professional background or by demonstrating an aptitude e.g. by playing capture the flag challenges). Low more »
Gloucester, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
Vulnerability Researcher Location: Gloucester, Manchester or London Our world class team of Vulnerability Researchers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are growing our VR team significantly and are looking for a … but most important is a willingness to learn as all of our projects bring new and interesting challenges. Job Summary Performing Vulnerability Research and ReverseEngineering to handle complex and unique challenges across a myriad of platforms Learning to use tools like Ghidra, IDA Pro, Unicorn and Frida … of staff with a keen interest in RE and VR to realise their potential Ideal candidate background: An interest and aptitude for Vulnerability Research, ReverseEngineering, and Exploit Development (either from a professional background or by demonstrating an aptitude e.g. by playing capture the flag challenges) Low-level more »
Gloucester, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
Operational Cyber Developer Location: Gloucester, Manchester or London Our world class team of Software Engineers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are growing our Cyber Developer team significantly and are looking … training plan with some of the best trainers and conferences available. Our focus is on a wide variety devices, platforms and technologies. Development or reverseengineering experience with mobile (Android, IOS), firmware, Linux, IoT and Windows is useful but most important is a willingness to learn as all more »
your financial future. Healthcare: Comprehensive Bupa healthcare coverage. Bonus: Profit share bonus awarded bi-annually. Essential Duties and Responsibilities: Overseeing tenders, offers, design, and engineering within your discipline. Providing technical support for electrical, PLC, and drive systems and adeptly troubleshooting faults. Developing and reviewing PLC and drive specifications, logic … to facilitate efficient fault-finding. Conducting Factory Acceptance Tests (FAT) procedures and running FAT with client witnesses. Retrieving PLC and drives programming code for reverseengineering or upgrading. Designing and coding electrical and PLC systems for onshore and offshore cranes and lifting equipment. Managing all technical and commercial more »
Engineer to take on the role of Infra Operation Service Lead. This position requires a hands-on leader with a strong passion for troubleshooting, reverseengineering, and automating live service operations. The ideal candidate will have extensive experience in Linux, Kubernetes, networking, databases, queues, Azure Cloud, and scripting more »
growth. What We're Looking For: Your Expertise: Bring your extensive experience in eDiscovery and Forensic Investigations, including leadership in complex cases like Malware ReverseEngineering and Ransomware Investigations. Leadership Skills: Lead and develop our team of eDiscovery Project Managers and Forensic Investigators, fostering growth and excellence. Business more »
Cyber Security Engineer opportunity! This is a dynamic and varied opportunity to join a team of bright and collaborative people, working across bug hunting, reverseengineering, and ethical hacking skills. Key Responsibilities: Working across diverse tools, programming languages, and emerging technologies Developing rapid prototypes, minimal viable products, and … world-class research Tackle complex cybersecurity challenges faced by the UK Skills and experience preferred for the role: Reverseengineering in IDA Pro or Ghidra. Familiarity with Wireshark or other network packet analysis tooling. Ethical hacking. Network and protocol analysis. Hardware debugging (UART, JTAG, SWD). Knowledge of more »
to build AI for understanding the contents and behaviour of software, without having access to the source code. Our product assists customers in binary reverseengineering, malware analysis, malware detection, exploit generation, software supply chain security, and vulnerability research. Job Description We are looking to hire an operational more »
audience, including both technical and nontechnical colleagues and senior stakeholders. Influential and credible with all stakeholders, colleagues and suppliers. Work closely with colleagues in Engineering, Architecture, and Product to create an integrated model spanning multiple lines of business and subject areas within the operational databases and data warehouses. Collaborate … relevant data models with standardised concepts and definitions across applications. Experience in modelling tools such as Erwin, ER/Studio or equivalent. Ability to reverse engineer a data model from an established system. Good understanding of how data models should be categorised within the organisation. Experience in data-warehousing more »
support experience. Bias for Action: Demonstrate problem-solving skills and a commitment to resolving customer issues. Facilitate close collaboration with the product development and engineering teams to ensure comprehensive technical knowledge of our offerings. Provide direct intervention when necessary, working alongside team members to resolve complex issues. Make and … in support ticketing/case management systems and software, with direct experience in case escalation resolution. Ability to work under pressure, with excellent analytical, reverseengineering, and problem-solving skills. Bachelor’s degree in Computer Science, Information Technology, or a related field, or equivalent practical experience. Compensation and more »
is for you! You will combine static and dynamic program analysis with state-of-the-art AI models, to assist their customers in binary reverseengineering, vulnerability detection, exploit generation, software supply chain security, and malware detection. They are seeking an Senior Machine Learning Engineer to join the more »
flows Structural understanding of the partners tax set up, regulatory framework and supply chain Understanding the optimal position, strategy and roadmap to exit and reverseengineering growth to achieve the perfect composition Strategic leadership and decision making of portfolio businesses growth plans with ultimate autonomy on the brands more »
in-situ by the experienced unit analysis team. However, the engineer should have in-depth Electronic circuit design knowledge, which will allow them to reverse engineer electronic schematics to fully understand the design operation and failure modes across a wide range of equipment types. The engineer will also be more »
Southampton, Hampshire, South East, United Kingdom
ERIKS
and worn/damaged components Have as a minimum basic electrical testing capability to assess electrical condition of AC & DC components Have sound mechanical engineering knowledge to identify and rectify faulty and worn/damaged components and understand reclamation techniques and reverseengineering options Your offer: And more »
in-situ by the experienced unit analysis team. However, the engineer should have in-depth Electronic circuit design knowledge, which will allow them to reverse engineer electronic schematics to fully understand the design operation and failure modes across a wide range of equipment types. The engineer will also be more »
knowledge of the windows kernel and develop applications that interact with the Windows NT Kernal. Experience in Windows driver development Experience in developing or reverseengineering applications that make substantial use of Windows API Experience in developing applications in c/C++ and Python Hands-on experience developing more »
knowledge of the windows kernel and develop applications that interact with the Windows NT Kernal. Experience in Windows driver development Experience in developing or reverseengineering applications that make substantial use of Windows API Experience in developing applications in c/C++ and Python Hands-on experience developing more »
miles from the office for the remote option.) Job Summary Responsible for managing the daily and overall work processes and practical implementation of cyber engineering and technical standards within one or more assigned areas of the Cyber Security. Monitors assigned areas of Cyber Operations to ensure technical adherence to … vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses detected incidents. Conducts network or software vulnerability assessments and penetration testing utilizing reverseengineering techniques. Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or more »
miles from the office for the remote option.) Job Summary Responsible for managing the daily and overall work processes and practical implementation of cyber engineering and technical standards within one or more assigned areas of the Cyber Security. Monitors assigned areas of Cyber Operations to ensure technical adherence to … vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses detected incidents. Conducts network or software vulnerability assessments and penetration testing utilizing reverseengineering techniques. Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or more »
miles from the office for the remote option.) Job Summary Responsible for managing the daily and overall work processes and practical implementation of cyber engineering and technical standards within one or more assigned areas of the Cyber Security. Monitors assigned areas of Cyber Operations to ensure technical adherence to … vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses detected incidents. Conducts network or software vulnerability assessments and penetration testing utilizing reverseengineering techniques. Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or … impact on business results, and typically manages one or more groups of professional employees. Job Description Responsibilities Lead daily operations of the Threat Detection Engineering and the Security Operations Orchestration/Automation programs. Provide thought leadership for program improvements and new initiatives. Recommend and produce key metrics, KPIs, and more »
miles from the office for the remote option.) Job Summary Responsible for managing the daily and overall work processes and practical implementation of cyber engineering and technical standards within one or more assigned areas of the Cyber Security. Monitors assigned areas of Cyber Operations to ensure technical adherence to … vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses detected incidents. Conducts network or software vulnerability assessments and penetration testing utilizing reverseengineering techniques. Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or … impact on business results, and typically manages one or more groups of professional employees. Job Description Responsibilities Lead daily operations of the Threat Detection Engineering and the Security Operations Orchestration/Automation programs. Provide thought leadership for program improvements and new initiatives. Recommend and produce key metrics, KPIs, and more »
functional project teams. Directs and develops long-term objectives and plans related to the company's technical vision. Provides innovative solutions for complex cyber engineering developmental problems that are competitive with industry and company standards. Responsible for monitoring, identifying, investigating and analyzing all response activities related to cybersecurity incidents … vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses detected incidents. Conducts network or software vulnerability assessments and penetration testing utilizing reverseengineering techniques. Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or … hunting, digital forensics, intelligence etc). Support related projects with critical delivery deadlines as needed. Qualifications Required: Bachelor's Degree in Computer Science, Computer Engineering, Cyber Security, or related industry/military experience. 7+ years' experience in Cyber Security, of which at least 5 or more years should be more »
functional project teams. Directs and develops long-term objectives and plans related to the company's technical vision. Provides innovative solutions for complex cyber engineering developmental problems that are competitive with industry and company standards. Responsible for monitoring, identifying, investigating and analyzing all response activities related to cybersecurity incidents … vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses detected incidents. Conducts network or software vulnerability assessments and penetration testing utilizing reverseengineering techniques. Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or … hunting, digital forensics, intelligence etc). Support related projects with critical delivery deadlines as needed. Qualifications Required: Bachelor's Degree in Computer Science, Computer Engineering, Cyber Security, or related industry/military experience. 7+ years' experience in Cyber Security, of which at least 5 or more years should be more »