At a Glance
- Tasks: Conduct cutting-edge research in cybersecurity and vulnerability analysis.
- Company: Join BAE Systems Digital Intelligence, a leader in cyber defence.
- Benefits: Flexible working hours, 25+ days holiday, and a supportive team culture.
- Other info: Enjoy ongoing training, mentorship, and clear career progression opportunities.
- Why this job: Make a real impact on national security while developing your technical skills.
- Qualifications: Passion for security research and low-level programming skills required.
The predicted salary is between 40000 - 50000 € per year.
BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.
The Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverse engineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest technical challenges. Our people provide mission-changing capability for our customers across a wide variety of platforms and technologies.
We are looking for Researchers & Vulnerability Researchers who are passionate about security research and want to develop deep technical expertise in vulnerability discovery, reverse engineering, and low-level software analysis. Whether your experience comes from CTFs, personal research, or early industry experience, you will benefit from training, mentorship and support from experienced researchers across the team.
Role Description
- Technical delivery: support and conduct research tasks, varying from vulnerability research and reverse engineering to IoT device teardowns.
- Collaboration: work closely with experienced researchers and contribute to team deliveries in the form of proof-of-concept solutions, research reports, or tooling.
- Adaptability: operate across a range of tools, languages, and platforms. Learn new tooling quickly or help develop bespoke tools where needed.
- Customer focus: understand the mission-critical needs of our customers and help deliver in line with those requirements.
What we are looking for
- Must-have: Strong interest in vulnerability research or security research, that can be demonstrated, for example, through university coursework, CTF participation, personal research projects, or reading & experimenting with current published research.
- Low-level programming skills, especially C/C++ (or Rust), with evidence you can: write, debug, and test low-level code, reason about memory and behaviour, work confidently with pointers/structs/buffers.
- Comfortable working with, reviewing, and building large codebases, including understanding unfamiliar systems from scratch.
- Clear technical communication to both technical and non-technical audiences.
Nice to have
- Experience using software reverse engineering tools (e.g. Ghidra, IDA Pro).
- Knowledge of exploitation techniques and mitigations.
- Familiarity with common computing topics: Linux usage, networking fundamentals, scripting.
- Scripting and tooling languages such as Python or Bash.
- Understanding of assembly, e.g. ARMv7, ARMv8, MIPS, or x86/x64.
- Awareness of Android, iOS, or Linux internals.
- Exposure to fuzzing or user-mode emulation.
- Knowledge of current cryptography practices, such as public/private key systems.
- Mobile application development or reverse engineering experience (Android, iOS).
Why join us?
- Benefit from our team’s training budget: this can be used for specialist courses, major cybersecurity conferences such as Black Hat, and more.
- By joining the Operational Cyber Group, you will be addressing the most critical cyber needs of governments and businesses across the globe, with a meaningful and tangible impact on UK National Security.
- Work-life balance is important to us: we can offer a variety of hours to suit individual needs, such as part-time or flexible working, along with a minimum of 25 days of holiday per year.
- Our flexible benefits package includes private medical and dental insurance, a competitive pension scheme, cycle to work scheme, childcare vouchers, discount cards and more.
- We are a supportive, inclusive and friendly team, committed to helping each other learn and succeed.
- We have a number of Diversity and Support groups which cover everything from gender diversity to mental health and wellbeing.
- With clear career progression pathways, mentorship, as well as ongoing training throughout your career, you can feel confident that your aptitude will be rewarded.
Please be aware that this role is subject to security restrictions. We do not expect you to have a security clearance before applying, but you will need to be eligible to work in the UK, and be able to successfully achieve an eDV UK security clearance.
Our recruiters are happy to explain the process.
Why BAE Systems Digital Intelligence?
BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. This is a place where you’ll be able to make a real difference. You’ll be part of an inclusive culture that values diversity of thought, rewards integrity, and merit, and where you’ll be empowered to fulfil your potential.
We welcome people from all backgrounds and want to make sure that our recruitment processes are as inclusive as possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments.
Life at BAE Systems Digital Intelligence
We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems office or client site, some or all of the time, and work might be going on at different times of the day. By embracing technology, we can interact, collaborate and create together, even when we’re working remotely from one another. Hybrid Working allows for increased flexibility in when and where we work, helping us to balance our work and personal life more effectively, and enhance well-being.
Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds – the best and brightest minds – can work together to achieve excellence and realise individual and organisational potential.
Division overview: Government
At BAE Systems Digital Intelligence, we pride ourselves in being a leader in the cyber defence industry, and Government contracts are an area we have many decades of experience in. Government and key infrastructure networks are critical targets to defend as the effects of these networks being breached can be devastating. As a member of the Government business unit, you will defend the connected world and ensure the protection of nations. We all have a role to play in defending our clients, and this is yours.
OC Cyber Researcher in London employer: Pardon Our Interruption
BAE Systems Digital Intelligence is an exceptional employer, offering a collaborative and inclusive work culture that values diversity and fosters professional growth. With a strong focus on employee development through training budgets for specialist courses and conferences, as well as flexible working arrangements to support work-life balance, you will have the opportunity to make a meaningful impact on national security while being part of a supportive team in locations like Gloucester, Manchester, and London.
StudySmarter Expert Advice🤫
We think this is how you could land OC Cyber Researcher in London
✨Tip Number 1
Network like a pro! Attend industry meetups, conferences, or even online webinars. Chat with folks in the field, share your passion for cyber research, and don’t be shy about asking for advice or insights.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your projects, whether it's CTFs, personal research, or any cool tools you've developed. This gives potential employers a taste of what you can do and sets you apart from the crowd.
✨Tip Number 3
Practice your interview skills! Mock interviews can help you articulate your thoughts clearly, especially when discussing technical topics. Get a friend to quiz you on common questions or even record yourself to see how you come across.
✨Tip Number 4
Apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you're genuinely interested in joining our team at BAE Systems Digital Intelligence.
We think you need these skills to ace OC Cyber Researcher in London
Some tips for your application 🫡
Show Your Passion:Let us see your enthusiasm for vulnerability research! Whether it's through coursework, CTFs, or personal projects, make sure to highlight your experiences that demonstrate your interest in security research.
Tailor Your Application:Don’t just send a generic application. We want to see how your skills and experiences align with the role of an Operational Cyber Researcher. Use keywords from the job description to show you understand what we’re looking for.
Be Clear and Concise:When writing your application, clarity is key. Make sure your technical communication is easy to understand for both technical and non-technical audiences. This will showcase your ability to convey complex ideas effectively.
Apply Through Our Website:We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands and shows us you’re serious about joining our team!
How to prepare for a job interview at Pardon Our Interruption
✨Show Your Passion for Cybersecurity
Make sure to express your genuine interest in vulnerability research and security. Share specific examples from your university coursework, CTF participation, or personal projects that highlight your enthusiasm and commitment to the field.
✨Demonstrate Technical Skills
Be prepared to discuss your low-level programming skills, especially in C/C++ or Rust. Bring along examples of code you've written or debugged, and be ready to explain your thought process when working with pointers, structs, and buffers.
✨Familiarise Yourself with Tools
If you have experience with software reverse engineering tools like Ghidra or IDA Pro, mention it! If not, take some time to learn about them before the interview. Showing that you're adaptable and willing to learn new tools will impress the interviewers.
✨Communicate Clearly
Practice explaining complex technical concepts in simple terms. You might be asked to communicate your findings to both technical and non-technical audiences, so being able to articulate your ideas clearly is crucial for success.