Vulnerability Researcher Vice President in City of London
Vulnerability Researcher Vice President

Vulnerability Researcher Vice President in City of London

City of London Full-Time 72000 - 108000 £ / year (est.) No home office possible
J

At a Glance

  • Tasks: Lead advanced vulnerability research and develop cutting-edge security solutions.
  • Company: Join a leading firm in cybersecurity with a focus on innovation and resilience.
  • Benefits: Competitive salary, flexible work options, and opportunities for professional growth.
  • Why this job: Make a real impact in cybersecurity while working with top experts in the field.
  • Qualifications: 5+ years in cybersecurity, strong technical skills, and a passion for vulnerability research.
  • Other info: Collaborative environment with exciting challenges and career advancement opportunities.

The predicted salary is between 72000 - 108000 £ per year.

As an Assessments & Exercises Vice President in the Cybersecurity and Tech Controls line of business, you will contribute significantly to enhancing the firm's cybersecurity or resiliency posture by using industry-standard assessment methodologies and techniques to proactively identify risks and vulnerabilities in people, processes, and technology. Design and deploy risk-driven tests and simulations (or manage a highly-skilled team that does) and inform analysis to clearly outline root-causes. In this role, you will evaluate preventative controls, incident response processes, and detection capabilities, and advise cross-functional teams on security strategy and risk management. We are seeking a dedicated vulnerability researcher to engage in advanced vulnerability analysis and research, addressing the complex demands of our mission. In this role, you will work closely with fellow researchers and defense teams to identify vulnerabilities and develop cutting-edge solutions. The ideal candidate will be self-motivated, possess extensive technical curiosity, and have a strong background in reverse engineering. You will thrive in a collaborative environment, working on challenging targets to enhance our security posture.

Job responsibilities

  • Design and execute testing and simulations - such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the development and refinement of assessment methodologies, tools, and frameworks to ensure alignment with the firm's strategy and compliance with regulatory requirements.
  • Evaluate controls for effectiveness and impact on operational risk, as well as opportunities to automate control evaluation.
  • Collaborate closely with cross-functional teams to develop comprehensive assessment reports - including detailed findings, risk assessments, and remediation recommendations - making data-driven decisions that encourage continuous improvement.
  • Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm's assessment strategy and risk management.
  • Engage with peers and industry groups that share threat intelligence analytics.
  • Conduct in-depth vulnerability research and exploit development across a broad range of software on modern operating systems, edge devices, on-premise, and open-source software.
  • Reverse engineer binaries using tools such as IDA Pro, Ghidra, or Binary Ninja to identify novel attack surfaces and develop proof-of-concept exploits.
  • Use common VR toolsets such as Fuzzers, disassemblers, debuggers, and code browsers for static and dynamic analysis.
  • N-Day vulnerability analysis, patch diffing, and zero-day vulnerability research.
  • Collaborate with other teams to share findings, support vulnerability triage, patch prioritization, and IOCs sharing, supporting the firm's mission requirements.
  • Document research findings, proof-of-concepts, and technical workflows.

Required qualifications, capabilities, and skills

  • 5+ years of experience in cybersecurity or resiliency, with demonstrated exceptional organizational skills to plan, design, and coordinate the development of offensive security testing, assessments, or simulation exercises.
  • Track record of discovered vulnerabilities (CVEs) in high-profile targets in at least one of the following environments: operating systems, mobile devices, web applications, browsers.
  • Proven hands-on experience in vulnerability research and PoC/exploit development, reporting, and mitigating security vulnerabilities in open-source projects.
  • Expertise in advanced analysis frameworks leveraging symbolic execution techniques and dynamic binary instrumentation to uncover, triage, and exploit complex software vulnerabilities.
  • Hands-on proficiency exploiting complex vulnerability classes - including user-after-free, double free, type confusion - and applying advanced exploitation techniques such as heap spraying and controlled memory corruption to achieve reliable code execution.
  • Strong understanding of at least two operating systems internals throughout user mode and kernel mode (Microsoft Windows, GNU/Linux, Android, MacOS, or iOS).
  • Experience auditing large C/C++, Java, and .Net codebases combining automated static analyzers with manual review to trace data and control flow, uncover memory-safety, injection, and deserialization vulnerabilities and produce proof-of-concept code.
  • Extensive reverse engineering expertise on x86/x64 and ARM/ARM64 binaries, employing IDA Pro, Ghidra, Binary Ninja, WinDbg, GDB, and RR for deep static/dynamic analysis and root cause vulnerability discovery.
  • Knowledge of US financial services sector cybersecurity or resiliency organization practices, operations risk management processes, principles, regulations, threats, risks, and incident response methodologies.
  • Ability to identify systemic security or resiliency issues as they relate to threats, vulnerabilities, or risks, with a focus on recommendations for enhancements or remediation, and proficiency in multiple security assessment methodologies (e.g., Open Worldwide Application Security Project (OWASP) Top Ten, National Institute of Standards and Technology (NIST) Cybersecurity Framework), offensive testing tools, or resiliency testing equivalents.
  • Excellent communication, collaboration, and report writing skills, with the ability to influence and engage stakeholders across various functions and levels.

Preferred qualifications, capabilities, and skills

  • Bachelor's degree in computer science, or PhD in a related technical field, or an equivalent combination of education and/or experience in a related field.
  • 5+ years of experience in exploit research and development.
  • Experience using Fuzzing tools such as LibFuzzer, LibAFL, AFL++, OSS-Fuzz, Syzkaller and program analysis tools such as LLVM, Angr, KLEE, Intel Pin, DynamoRIO, and Frida.
  • Experience emulating embedded platforms for live debugging.
  • Kernel and low-level OS development.
  • Deep Linux internals knowledge (SELinux, AppArmor, Seccomp, eBPF, containers, VMs).
  • Deep Windows internals knowledge (KASLR, DSE, SSDT, IDT, SMEP, SMAP, PXN, KPP, KDP, VBS, HVCI, KMCI, UMCI).

Vulnerability Researcher Vice President in City of London employer: JP Morgan

As a leading firm in the Cybersecurity and Tech Controls sector, we pride ourselves on fostering a dynamic work culture that encourages innovation and collaboration. Our employees benefit from extensive professional development opportunities, competitive compensation packages, and a commitment to work-life balance, all while contributing to meaningful projects that enhance our cybersecurity posture. Located in a vibrant area, our team enjoys access to cutting-edge resources and a supportive environment that values technical curiosity and growth.
J

Contact Detail:

JP Morgan Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Vulnerability Researcher Vice President in City of London

✨Network Like a Pro

Get out there and connect with people in the cybersecurity field! Attend industry events, webinars, or local meetups. The more you engage with others, the better your chances of hearing about job openings that might not even be advertised.

✨Show Off Your Skills

Don’t just talk about your experience; demonstrate it! Create a portfolio showcasing your vulnerability research projects, proof-of-concept exploits, or any relevant assessments you've conducted. This will give potential employers a clear view of what you can bring to the table.

✨Ace the Interview

Prepare for interviews by brushing up on common cybersecurity scenarios and challenges. Be ready to discuss your past experiences in detail, especially those involving vulnerability analysis and exploit development. Practice makes perfect, so consider mock interviews with friends or mentors.

✨Apply Through Us!

When you find a role that excites you, apply through our website! We’re always on the lookout for passionate individuals like you. Plus, applying directly shows your enthusiasm and commitment to joining our team.

We think you need these skills to ace Vulnerability Researcher Vice President in City of London

Vulnerability Research
Exploit Development
Reverse Engineering
Penetration Testing
Technical Controls Assessments
Cyber Exercises
Resiliency Simulations
Threat Intelligence
Static and Dynamic Analysis
Fuzzing Tools
Operating Systems Internals
C/C++ Code Auditing
Communication Skills
Collaboration Skills
Report Writing

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to highlight your experience in vulnerability research and cybersecurity. Use keywords from the job description to show that you understand what we're looking for.

Showcase Your Skills: Don’t just list your skills; demonstrate them! Include specific examples of vulnerabilities you've discovered or exploits you've developed. This will help us see your hands-on experience in action.

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Explain why you're passionate about cybersecurity and how your background makes you a perfect fit for our team. Keep it engaging and relevant to the role.

Apply Through Our Website: We encourage you to apply through our website for a smoother process. It helps us keep track of applications and ensures you get the best chance to showcase your talents!

How to prepare for a job interview at JP Morgan

✨Know Your Stuff

Make sure you brush up on your technical skills and knowledge related to vulnerability research. Familiarise yourself with tools like IDA Pro, Ghidra, and the various types of vulnerabilities you might encounter. Being able to discuss your past experiences with specific vulnerabilities or exploits will show that you're not just a theory person but someone who has hands-on experience.

✨Show Your Curiosity

As a vulnerability researcher, your technical curiosity is key. Be prepared to discuss how you stay updated on emerging threats and vulnerabilities. Mention any relevant communities or forums you engage with, and share insights from recent research or findings that excite you. This will demonstrate your passion for the field and your proactive approach to learning.

✨Collaboration is Key

This role involves working closely with cross-functional teams, so be ready to talk about your collaboration experiences. Share examples of how you've worked with others to tackle complex problems or develop solutions. Highlight your communication skills and how you can influence stakeholders across different functions.

✨Prepare for Scenario Questions

Expect scenario-based questions that assess your problem-solving abilities in real-world situations. Think about how you would design a penetration test or evaluate a control's effectiveness. Practising these scenarios beforehand will help you articulate your thought process clearly during the interview.

Vulnerability Researcher Vice President in City of London
JP Morgan
Location: City of London

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

J
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>