At a Glance
- Tasks: Join an elite team to discover and validate high-impact vulnerabilities in cybersecurity.
- Company: Rapidly growing venture-backed cybersecurity company leading in Pre-Emptive Exposure Management.
- Benefits: Remote work, competitive salary, and opportunities for professional growth.
- Other info: Dynamic startup environment with opportunities to present research at global conferences.
- Why this job: Make a real impact in cybersecurity by working with cutting-edge technologies and AI.
- Qualifications: 2+ years in vulnerability research, strong Python skills, and passion for offensive security.
The predicted salary is between 60000 - 80000 β¬ per year.
A rapidly growing, venture-backed cybersecurity company at the forefront of Pre-Emptive Exposure Management is expanding its global Offensive Security and Vulnerability Research function. This is an opportunity to join an elite team focused on discovering, validating, and operationalising high-impact vulnerabilities before threat actors can exploit them.
The organisation combines advanced vulnerability research, offensive security engineering, AI-driven automation, and scalable detection tooling to secure enterprise environments worldwide.
As a Vulnerability Engineer, you will operate across the full offensive security lifecycle β from 0-day and n-day vulnerability research through to building automated tooling for exploit validation and detection engineering. This hybrid research and engineering role is ideal for someone passionate about reverse engineering, patch diffing, binary analysis, Python development, and the practical application of LLMs/AI in cybersecurity workflows.
You will focus on identifying and automating the detection of critical vulnerabilities such as Remote Code Execution (RCE), privilege escalation, authentication bypasses, and other high-severity attack vectors across large-scale attack surfaces.
Key Responsibilities- Conduct advanced vulnerability research across 0-day and n-day exposures
- Perform patch diffing, reverse engineering, and exploit analysis on source-available and binary-only targets
- Develop and maintain Python-based offensive security tooling
- Build automated workflows for exploit validation, vulnerability discovery, and detection signature generation
- Leverage AI/LLM-powered tooling to accelerate triage, code review, analysis, and research operations
- Research and validate high-impact vulnerabilities including RCE, deserialization flaws, authentication bypasses, and memory corruption issues
- Utilise industry-standard offensive tooling including Burp Suite, Ghidra, IDA Pro, debuggers, and fuzzers
- Collaborate with offensive security and engineering teams to improve detection and remediation capabilities
- Present original research findings to the global cybersecurity community at leading conferences and industry events
- 2+ years of hands-on experience in vulnerability research, exploit analysis, or offensive security engineering
- Strong understanding of n-day reproduction, patch diffing, and vulnerability validation
- Experience with reverse engineering, binary analysis, and debugging techniques
- Solid programming and software engineering skills with a strong focus on Python
- Practical knowledge of web and binary exploitation techniques
- Hands-on experience with tools such as Burp Suite, Ghidra, IDA Pro, fuzzers, and debuggers
- Understanding of common vulnerability classes including RCE, SSRF, deserialization, authentication bypass, and memory corruption
- Exposure to AI/LLM applications in cybersecurity, automation, or code analysis
- Ability to thrive in a fast-paced, high-growth, startup environment with strong ownership and execution mindset
- Experience developing offensive security automation platforms
- Knowledge of exploit development and detection engineering
- Familiarity with cloud, enterprise, or large-scale attack surfaces
- Contributions to the cybersecurity community through research, blogs, tooling, or conference presentations
Vulnerability Engineer β Offensive Security & Research in Manchester employer: LinkedIn
Join a rapidly growing venture-backed cybersecurity company that prioritises innovation and employee development in a dynamic remote work environment. As a Vulnerability Engineer, you will be part of an elite team dedicated to advancing offensive security practices while enjoying a culture that fosters collaboration, creativity, and continuous learning. With opportunities to present your research at leading conferences and access to cutting-edge tools and technologies, this role offers a meaningful and rewarding career path in the ever-evolving field of cybersecurity.
StudySmarter Expert Adviceπ€«
We think this is how you could land Vulnerability Engineer β Offensive Security & Research in Manchester
β¨Tip Number 1
Network like a pro! Get out there and connect with folks in the cybersecurity scene. Attend meetups, webinars, or conferences where you can chat with industry experts and potential employers. Remember, sometimes itβs not just what you know, but who you know!
β¨Tip Number 2
Show off your skills! Create a portfolio showcasing your vulnerability research projects, tools you've developed, or any contributions to the community. This gives you a chance to demonstrate your expertise and passion for offensive security beyond just your CV.
β¨Tip Number 3
Donβt be shy about reaching out directly! If you see a company youβre keen on, drop them a message on LinkedIn or via their website. Express your interest in their work and how you could contribute as a Vulnerability Engineer. It shows initiative and can set you apart from other candidates.
β¨Tip Number 4
Keep learning and stay updated! The cybersecurity field is always evolving, so make sure youβre keeping up with the latest trends, tools, and techniques. Join online courses or forums to enhance your skills and knowledge, which will make you a more attractive candidate.
We think you need these skills to ace Vulnerability Engineer β Offensive Security & Research in Manchester
Some tips for your application π«‘
Tailor Your CV:Make sure your CV reflects the skills and experiences that match the role of a Vulnerability Engineer. Highlight your hands-on experience with vulnerability research, Python development, and any relevant tools you've used. We want to see how you fit into our team!
Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you're passionate about offensive security and how your background aligns with our mission at StudySmarter. Be genuine and let your enthusiasm for the role come through.
Showcase Your Projects:If you've worked on any personal or professional projects related to vulnerability research or offensive security, make sure to mention them. We love seeing practical applications of your skills, so donβt hold back on sharing your achievements!
Apply Through Our Website:We encourage you to apply directly through our website. Itβs the best way for us to receive your application and ensures youβre considered for the role. Plus, it shows youβre keen on joining our awesome team!
How to prepare for a job interview at LinkedIn
β¨Know Your Tools Inside Out
Make sure youβre well-versed in the tools mentioned in the job description, like Burp Suite, Ghidra, and IDA Pro. Familiarity with these tools will not only help you answer technical questions but also demonstrate your hands-on experience.
β¨Showcase Your Research Skills
Prepare to discuss any previous vulnerability research or exploit analysis you've conducted. Bring examples of your work, especially if youβve presented findings at conferences or contributed to the cybersecurity community. This shows your passion and commitment to the field.
β¨Brush Up on Python Programming
Since Python is a key part of the role, be ready to talk about your programming experience. Consider preparing a small project or script that showcases your skills in developing offensive security tooling. This practical demonstration can set you apart from other candidates.
β¨Understand the Offensive Security Lifecycle
Familiarise yourself with the full offensive security lifecycle, from vulnerability discovery to exploit validation. Be prepared to discuss how you would approach identifying and automating the detection of critical vulnerabilities, as this aligns closely with the role's responsibilities.