At a Glance
- Tasks: Identify software vulnerabilities and develop exploits while guiding a talented team.
- Company: L3Harris, a leader in defence technology with a focus on innovation.
- Benefits: Generous holiday, private medical insurance, pension scheme, and wellness support.
- Other info: Inclusive culture with opportunities for professional growth and mentorship.
- Why this job: Join a mission-driven team making a real impact on national security.
- Qualifications: 3+ years in vulnerability research and experience with various programming languages.
The predicted salary is between 60000 - 80000 £ per year.
L3Harris is dedicated to recruiting and developing high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers’ mission and quest for professional growth. L3Harris provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do. L3Harris is the Trusted Disruptor in defence tech. With customers’ mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security.
Responsibilities:
- Finding vulnerabilities in ubiquitous Internet-deployed software and/or popular devices’ software or firmware.
- Constructing exploits for vulnerabilities discovered by yourself or your team.
- Guiding the team’s technical outcomes to measurable deliverables for the organisation.
- Training, management and provision of guidance to all levels of team members.
- Regular interaction with managers and customer-facing staff members to field queries and questions about technical work.
- Take an active role in cross-team projects when required.
Qualifications:
- 3+ years of Vulnerability Research, reverse engineering, and bug-hunting.
- Experience with static and dynamic binary analysis.
- Experience with iOS, Android, Windows, Linux, or embedded systems kernel, user land, and internals or browser internals.
- Experience with common tools in security research (e.g. IdaPro, Ghidra, Radare, Binary Ninja, AFL, SysInternals, GDB, WinDBG, etc).
- Experience with common programming languages (e.g. C/C++, Python, Swift, etc).
- Experience with common architectures (e.g. x86/64, ARM, AARCH64, MIPS, PowerPC, TILEGX, etc).
- Experience with modern security system features, exploit mitigations, and evasion techniques (e.g. defeating ASLR, DEP, Control Flow Guard, ROP, Security Product/AV Evasion, etc).
- Experience with a wide-range of modern exploitation concepts and techniques.
Preferred Additional Skills:
- Experience with Computer Network Operations / Computer Network Exploitation.
- Experience with symbolic execution and emulation software (e.g. QEMU, Corellium, VHDL, etc).
- Cryptographic experience (e.g. side-channel attacks, implementing AES, etc).
- Experience teaching and mentoring junior vulnerability researchers.
- Bespoke fuzzer development experience.
Employee Benefits:
- Bonus scheme
- 25 days holiday per year (plus bank holidays), increasing with long service and with the opportunity to buy/sell up to 5 days
- Private medical insurance with optional family cover
- Pension scheme of up to 8% employer contribution
- Life Assurance 4x salary (flexible up to 10x)
- Group income protection
- Flexible opt-in extras such as a health care cash plan, dental insurance, gym membership, critical illness cover, cycle to work scheme, travel insurance and electric car scheme
- Employee Family Assistance Program providing mental health and wellbeing support
Important to know:
Due to the nature of our work some of our roles require a UK nationality and the ability to obtain a security clearance. Applicants who accept a conditional offer of employment must meet the requirement of right to work in the UK and must meet eligibility requirements for access to classified information and will be subject to government security checks. L3Harris Technologies is proud to be an Equal Opportunity Employer. We are committed to maintaining a workplace that is free from unlawful discrimination and offers equal opportunities for all. Applications from individuals are encouraged regardless of age, disability, sex, gender reassignment, sexual orientation, pregnancy and maternity, race, religion or belief, and marriage and civil partnerships.
Senior Security Software Research Engineer employer: L3Harris Technologies
Contact Detail:
L3Harris Technologies Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Security Software Research Engineer
✨Tip Number 1
Network like a pro! Reach out to current or former employees at L3Harris on LinkedIn. A friendly chat can give you insider info and maybe even a referral, which can really boost your chances.
✨Tip Number 2
Prepare for the interview by brushing up on your technical skills. Make sure you can discuss your experience with vulnerability research and the tools mentioned in the job description. We want to see your passion and expertise shine through!
✨Tip Number 3
Showcase your problem-solving skills during interviews. Be ready to tackle hypothetical scenarios related to security vulnerabilities. This is your chance to demonstrate how you think on your feet and approach challenges.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in joining the L3Harris team.
We think you need these skills to ace Senior Security Software Research Engineer
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Senior Security Software Research Engineer role. Highlight your experience with vulnerability research and the specific tools mentioned in the job description. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about security software and how your background makes you a great fit for our team. Don’t forget to mention any relevant projects or achievements that showcase your expertise.
Showcase Your Technical Skills: In your application, be sure to highlight your technical skills, especially those related to reverse engineering and exploit development. We love seeing candidates who can demonstrate their knowledge of programming languages and modern exploitation techniques!
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and you’ll be able to keep track of your application status. Plus, we love seeing applications come directly from our site!
How to prepare for a job interview at L3Harris Technologies
✨Know Your Stuff
Make sure you brush up on your technical skills, especially in vulnerability research and reverse engineering. Familiarise yourself with the tools mentioned in the job description, like IdaPro and Ghidra, so you can confidently discuss your experience and how you've used them in past projects.
✨Showcase Your Problem-Solving Skills
Prepare to discuss specific examples of vulnerabilities you've found and how you approached exploiting them. Be ready to explain your thought process and the methodologies you used, as this will demonstrate your analytical skills and ability to deliver measurable outcomes.
✨Be a Team Player
Since the role involves guiding and mentoring team members, think of examples where you've successfully collaborated with others or trained junior researchers. Highlight your communication skills and how you’ve interacted with both technical and non-technical staff in previous roles.
✨Understand Their Mission
Research L3Harris and their commitment to national security. Be prepared to discuss how your values align with theirs and how you can contribute to their mission. Showing that you understand their goals will set you apart and demonstrate your genuine interest in the position.