At a Glance
- Tasks: Conduct vulnerability research and reverse engineering on complex cyber challenges.
- Company: Join a leading tech team focused on National Security and innovative solutions.
- Benefits: Flexible hours, competitive salary, training budget, and 25+ days holiday.
- Other info: Supportive team culture with clear career progression and ongoing training.
- Why this job: Make a real impact on UK National Security while developing your skills.
- Qualifications: Experience in vulnerability research or reverse engineering; familiarity with various tools.
The predicted salary is between 40000 - 55000 £ per year.
Location: Gloucester, Manchester, London – Onsite work required, with consideration for both full and part-time applicants.
Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverse engineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for our customers across a wide variety of platforms and technologies.
We are looking for experienced Vulnerability Researchers and Reverse Engineers who want to have a meaningful and tangible impact on the National Security of the UK. Whether you have worked in this space before or not, you will receive a dedicated training budget, along with all the mentorship and support to succeed in our team.
Technical delivery: perform vulnerability research and/or reverse engineering on complex and unique challenges, across a myriad of platforms.
Mentorship, team-leadership, and collaboration: deliver your research as part of a team, whilst knowledge-sharing and mentoring junior team-members.
Adaptability: work across a range of tools and platforms, picking up new ones or developing bespoke tooling when needed.
Customer focus: understand what our customers consider to be mission-critical, and how to deliver in line with those needs.
What we are looking for:
- Experience in vulnerability research, reverse engineering, or exploit development (professional background or other e.g. capture the flag challenges, bug bounties).
- Familiarity with a variety of tools and platforms (Ghidra, IDA, Unicorn, debuggers, Android, iOS…).
- Knowledge of low-level programming languages across the application stack.
- Understanding of the exploit development lifecycle from identifying bugs up to proof-of-concept exploits.
- Ability to communicate regarding technical topics to a variety of audiences, including non-technical.
Why join us?
- You will receive a dedicated training budget to use during your first year with us. This can cover major cybersecurity conferences such as Black Hat, specialist training, and more.
- By joining the Operational Cyber Group, you will be addressing the most critical cyber needs of governments and businesses across the globe, with a meaningful and tangible impact on UK National Security.
- Work-life balance is important to us: we can offer a variety of hours to suit individual needs, such as part-time or flexible working around core hours, along with a minimum of 25 days of holiday per year.
- Our flexible benefits package includes private medical and dental insurance, a competitive pension scheme, cycle to work scheme, childcare vouchers, discount cards and more.
- We are a supportive, inclusive and friendly team, committed to helping each other learn and succeed.
- We have a number of Diversity and Support groups which cover everything from gender diversity to mental health and wellbeing.
- With clear career progression pathways, mentorship, as well as ongoing training throughout your career, you can feel confident that your aptitude will be rewarded.
- We offer additional leave to cover Reservist and Cadet Force Adult Volunteer duties.
Please be aware that this role is subject to security restrictions. We do not expect you to have a security clearance before applying, but you will need to be eligible to work in the UK, and be able to successfully achieve an eDV UK security clearance.
BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.
This is a place where you’ll be able to make a real difference. You’ll be part of an inclusive culture that values diversity of thought, rewards integrity, and merit, and where you’ll be empowered to fulfil your potential.
We welcome people from all backgrounds and want to make sure that our recruitment processes are as inclusive as possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments.
Operational Cyber Vulnerability Researcher employer: Cyber UK
Contact Detail:
Cyber UK Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Operational Cyber Vulnerability Researcher
✨Tip Number 1
Network like a pro! Reach out to folks in the cybersecurity field on LinkedIn or at industry events. A friendly chat can lead to opportunities that aren’t even advertised yet.
✨Tip Number 2
Show off your skills! Participate in hackathons or capture the flag competitions. These experiences not only boost your CV but also give you real-world scenarios to discuss in interviews.
✨Tip Number 3
Tailor your approach! When you apply through our website, make sure to highlight your relevant experience in vulnerability research and reverse engineering. Customise your pitch to show how you can tackle our unique challenges.
✨Tip Number 4
Prepare for the interview! Brush up on your technical knowledge and be ready to explain complex concepts simply. Remember, we want to see how you communicate with both techies and non-techies alike.
We think you need these skills to ace Operational Cyber Vulnerability Researcher
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Operational Cyber Vulnerability Researcher role. Highlight your experience in vulnerability research and reverse engineering, and don’t forget to mention any relevant tools you’ve used. We want to see how your skills align with our mission!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about cyber security and how you can contribute to our team. Be sure to mention any specific projects or experiences that demonstrate your expertise in the field.
Showcase Your Technical Skills: In your application, be sure to showcase your technical skills clearly. Mention any familiarity with tools like Ghidra or IDA, and highlight your understanding of the exploit development lifecycle. We love seeing candidates who can communicate complex topics simply!
Apply Through Our Website: We encourage you to apply through our website for the best chance of success. It’s straightforward and ensures your application gets to the right people. Plus, you’ll find all the details you need about the role and our team!
How to prepare for a job interview at Cyber UK
✨Know Your Tools
Familiarise yourself with the tools mentioned in the job description, like Ghidra and IDA. Be ready to discuss your experience with these platforms and how you've used them in past projects or challenges.
✨Showcase Your Experience
Prepare to talk about your background in vulnerability research or reverse engineering. Whether it's professional work or personal projects like capture the flag challenges, have specific examples ready that demonstrate your skills and adaptability.
✨Communicate Clearly
Practice explaining complex technical concepts in simple terms. You might be asked to communicate your findings to non-technical audiences, so being able to break down your work is crucial.
✨Emphasise Teamwork
Highlight your experience in collaborative environments. Discuss how you've mentored others or worked as part of a team to solve problems, as this role values mentorship and knowledge-sharing.