At a Glance
- Tasks: Conduct vulnerability research and reverse engineering on complex cyber challenges.
- Company: Join BAE Systems Digital Intelligence, a leader in cybersecurity and digital intelligence.
- Benefits: Enjoy flexible working hours, 25+ days holiday, and a comprehensive benefits package.
- Why this job: Make a real impact on UK National Security while developing your skills in a supportive team.
- Qualifications: Experience in vulnerability research or reverse engineering; familiarity with various tools and programming languages.
- Other info: Receive dedicated training budget and mentorship for career growth.
The predicted salary is between 36000 - 60000 Β£ per year.
Overview
Operational Cyber Vulnerability Researcher. Location: Gloucester, Manchester, London. Onsite work required, with consideration for both full and part-time applicants. Requisition ID: 121884. Grade: GG10 β GG12.
Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverse engineering, and vulnerability research. With a focus on National Security, we work on some of the country\βs toughest challenges. Our people provide mission-changing capability for our customers across a wide variety of platforms and technologies. We are looking for experienced Vulnerability Researchers and Reverse Engineers who want to have a meaningful and tangible impact on the National Security of the UK. Whether you have worked in this space before or not, you will receive a dedicated training budget, along with all the mentorship and support to succeed in our team.
Role Description
- Technical delivery: perform vulnerability research and/or reverse engineering on complex and unique challenges, across a myriad of platforms.
- Mentorship, team-leadership, and collaboration: deliver your research as part of a team, whilst knowledge-sharing and mentoring junior team-members.
- Adaptability: work across a range of tools and platforms, picking up new ones or developing bespoke tooling when needed.
- Customer focus: understand what our customers consider to be mission-critical, and how to deliver in line with those needs.
What we are looking for
- Experience in vulnerability research, reverse engineering, or exploit development (professional background or other e.g. capture the flag challenges, bug bounties).
- Familiarity with a variety of tools and platforms (Ghidra, IDA, Unicorn, debuggers, Android, iOSβ¦).
- Knowledge of low-level programming languages across the application stack.
- Understanding of the exploit development lifecycle from identifying bugs up to proof-of-concept exploits.
- Ability to communicate regarding technical topics to a variety of audiences, including non-technical.
Why join us?
- You will receive a dedicated training budget to use during your first year with us. This can cover major cybersecurity conferences such as Black Hat, specialist training, and more.
- By joining the Operational Cyber Group, you will be addressing the most critical cyber needs of governments and businesses across the globe, with a meaningful and tangible impact on UK National Security.
- Work-life balance is important to us: we can offer a variety of hours to suit individual needs, such as part-time or flexible working around core hours, along with a minimum of 25 days of holiday per year.
- Our flexible benefits package includes private medical and dental insurance, a competitive pension scheme, cycle to work scheme, childcare vouchers, discount cards and more.
- We are a supportive, inclusive and friendly team, committed to helping each other learn and succeed. We have a number of Diversity and Support groups which cover everything from gender diversity to mental health and wellbeing.
- With clear career progression pathways, mentorship, as well as ongoing training throughout your career, you can feel confident that your aptitude will be rewarded.
- We offer additional leave to cover Reservist and Cadet Force Adult Volunteer duties.
Please be aware that this role is subject to security restrictions. We do not expect you to have a security clearance before applying, but you will need to be eligible to work in the UK, and be able to successfully achieve an eDV UK security clearance. For more details see https://www.gov.uk/government/publications/united-kingdom-security-vetting-clearance-levels/edv-guidance-pack-for-applicants. Our recruiters are happy to explain the process.
Why BAE Systems Digital Intelligence?
BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.
This is a place where you\βll be able to make a real difference. You\βll be part of an inclusive culture that values diversity of thought, rewards integrity, and merit, and where you\βll be empowered to fulfil your potential. We welcome people from all backgrounds and want to make sure that our recruitment processes are as inclusive as possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments.
#J-18808-Ljbffr
Operational Cyber Vulnerability Researcher employer: BAE Systems.
Contact Detail:
BAE Systems. Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Operational Cyber Vulnerability Researcher
β¨Tip Number 1
Network like a pro! Reach out to folks in the cybersecurity field, especially those who work at BAE Systems or similar companies. Attend meetups, webinars, and conferences to make connections that could lead to job opportunities.
β¨Tip Number 2
Show off your skills! Create a portfolio showcasing your vulnerability research or reverse engineering projects. Whether it's a personal website or a GitHub repo, having tangible examples of your work can really impress potential employers.
β¨Tip Number 3
Prepare for interviews by brushing up on your technical knowledge and soft skills. Practice explaining complex concepts in simple terms, as you'll need to communicate effectively with both technical and non-technical audiences.
β¨Tip Number 4
Don't forget to apply through our website! Itβs the best way to ensure your application gets seen by the right people. Plus, it shows you're genuinely interested in joining our team at StudySmarter.
We think you need these skills to ace Operational Cyber Vulnerability Researcher
Some tips for your application π«‘
Tailor Your Application: Make sure to customise your CV and cover letter for the Operational Cyber Vulnerability Researcher role. Highlight your relevant experience in vulnerability research and reverse engineering, and donβt forget to mention any specific tools youβve used that align with what weβre looking for.
Show Your Passion: We love seeing candidates who are genuinely excited about cybersecurity! Share any personal projects, capture the flag challenges, or bug bounties you've participated in. This shows us that youβre not just looking for a job, but that youβre passionate about making an impact in the field.
Be Clear and Concise: When writing your application, keep it clear and to the point. Use straightforward language to explain your skills and experiences. Remember, we want to understand your technical expertise without getting lost in jargon!
Apply Through Our Website: Donβt forget to submit your application through our website! Itβs the best way to ensure your application gets seen by the right people. Plus, youβll find all the details you need about the role and our team there.
How to prepare for a job interview at BAE Systems.
β¨Know Your Tools
Familiarise yourself with the tools mentioned in the job description, like Ghidra and IDA. Be ready to discuss your experience with these platforms and how you've used them in past projects or challenges.
β¨Showcase Your Problem-Solving Skills
Prepare to talk about specific instances where you've tackled complex vulnerabilities or reverse engineering tasks. Use the STAR method (Situation, Task, Action, Result) to structure your answers and highlight your adaptability.
β¨Communicate Clearly
Practice explaining technical concepts in simple terms. You might be asked to communicate your findings to non-technical stakeholders, so being able to break down complex ideas is crucial.
β¨Emphasise Teamwork and Mentorship
Since collaboration is key in this role, think of examples where you've worked as part of a team or mentored others. Highlight how you can contribute to a supportive and inclusive environment.