At a Glance
- Tasks: Conduct in-depth technical investigations and develop prototypes to tackle emerging cyber threats.
- Company: Join Raytheon UK, a leader in advanced systems and services with a collaborative culture.
- Benefits: Enjoy a competitive salary, flexible working, 25 days holiday, and a contributory pension scheme.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technology and innovative teams.
- Qualifications: Experience in hardware analysis, programming skills, and a methodical approach to problem-solving.
- Other info: Hybrid working model with excellent career growth opportunities in a dynamic environment.
The predicted salary is between 36000 - 60000 £ per year.
Raytheon UK's Cyber Research Group (CRG) is seeking a technically proficient and analytically minded Vulnerability Researcher with experience in hardware analysis to support advanced research and development activities. As Vulnerability Researcher, you will conduct in-depth technical investigations, developing prototypes, and contributing to the discovery and analysis of emerging threats and vulnerabilities. This role will be based in our Gloucester office or customer site on a hybrid basis (average of 2 days per week). You must be eligible for or already hold eDV clearance.
Key Responsibilities
- Hardware teardowns, characterisations and reverse engineering.
- Extract and recover data from flash memory including NAND, eMMC and SPI.
- Conduct side channel attacks such as timing attacks, voltage glitching and power analysis.
- Design and implement hardware/software rapid prototypes to explore novel cyber capabilities and concepts.
- Analyse network protocols and system behaviours to identify potential security weaknesses.
- Collaborate with multidisciplinary teams to deliver technical solutions and research outcomes.
- Document findings and methodologies in a clear and structured manner for internal and external stakeholders.
Essential Skills and Experience
- Hardware development and prototyping, including PCB design and microcontroller programming.
- Experience extracting data from flash storage ICs.
- Familiarity with logic analysers and oscilloscopes.
- Advanced soldering and desoldering experience.
- Basic understanding of side channel attack techniques (experience not required).
- Proficiency in at least one programming language such as C, C++, or Python.
- Good working knowledge of Linux-based systems, including command-line tools and system configuration.
- Demonstrated analytical and problem-solving capabilities, with a methodical and inquisitive approach to technical challenges.
- Eligible for or hold active eDV clearance.
Desirable Experience
- Reverse engineering using tools such as IDA Pro, Ghidra, or Binary Ninja.
- Vulnerability research, including exploit development and mitigation bypass techniques.
- Embedded software development for platforms such as ARM Cortex, AVR, or MIPS.
- Experience with Radio Frequency (RF) systems, Software Defined Radios (SDRs), 2G/4G/5G, including tools like GNU Radio, Osmocom, srsRAN or USRP.
- Network engineering experience either home lab or professional.
Benefits and Work Culture
- Competitive salary
- 37hr working week, with an early finish Friday - start your weekend early!
- Informal and formal flexible working possible - please enquire or highlight any requests to our Talent Acquisition team to explore the flexible working possibilities.
- 25 days holiday (increasing by up to 2 days with service), plus public holidays, opportunity to buy / sell / roll over up to 5 days, and up to 5 days volunteering annually.
- Contributory Pension Scheme (up to 10.5% company contribution)
- Company bonus scheme (discretionary).
- 6 times salary 'Life Assurance' with pension.
- Flexible Benefits scheme with extensive salary sacrifice schemes, including Health Cashplan, Dental, and Cycle to Work amongst others.
- Enhanced sick pay.
- Enhanced family friendly policies including enhanced maternity, paternity & shared parental leave.
Vulnerability Researcher in London employer: Raytheon Systems
Contact Detail:
Raytheon Systems Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Vulnerability Researcher in London
✨Tip Number 1
Get your networking game on! Connect with folks in the industry, especially those at Raytheon or similar companies. Attend meetups, webinars, or even online forums to chat about vulnerability research and hardware analysis.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your projects, especially any hardware teardowns or prototypes you've worked on. This will give you an edge and demonstrate your hands-on experience.
✨Tip Number 3
Practice makes perfect! Brush up on your programming skills in C, C++, or Python. Consider working on small projects or contributing to open-source initiatives to keep your skills sharp and relevant.
✨Tip Number 4
Apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you're genuinely interested in joining the team at Raytheon.
We think you need these skills to ace Vulnerability Researcher in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience in hardware analysis and vulnerability research. We want to see how your skills match the job description, so don’t be shy about showcasing relevant projects or tools you've used!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about vulnerability research and how your background makes you a perfect fit for our team. Keep it concise but impactful!
Showcase Your Technical Skills: When filling out your application, be specific about your technical skills. Mention any programming languages you're proficient in, as well as your experience with hardware development and reverse engineering tools. We love detail!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you’re keen on joining our team at Raytheon UK!
How to prepare for a job interview at Raytheon Systems
✨Know Your Hardware Inside Out
Make sure you brush up on your hardware analysis skills. Be prepared to discuss your experience with hardware teardowns, PCB design, and any relevant projects you've worked on. This will show that you’re not just familiar with the concepts but have practical experience too.
✨Demonstrate Your Analytical Skills
During the interview, be ready to showcase your problem-solving capabilities. Think of specific examples where you identified vulnerabilities or developed prototypes. Use the STAR method (Situation, Task, Action, Result) to structure your answers clearly.
✨Familiarise Yourself with Side Channel Attacks
Even if you don’t have direct experience, understanding the basics of side channel attack techniques can set you apart. Research common methods like timing attacks and voltage glitching, and be prepared to discuss how they might apply to the role.
✨Show Off Your Programming Skills
Since proficiency in programming languages like C, C++, or Python is essential, be ready to talk about your coding experience. Bring examples of past projects or challenges you've tackled using these languages, and if possible, demonstrate your knowledge of Linux-based systems.