Vulnerability Researcher in London

Vulnerability Researcher in London

London Full-Time 36000 - 60000 £ / year (est.) Home office (partial)
Go Premium
R

At a Glance

  • Tasks: Conduct in-depth technical investigations and develop prototypes to tackle emerging cyber threats.
  • Company: Join Raytheon UK, a leader in advanced systems and services with a collaborative culture.
  • Benefits: Enjoy a competitive salary, flexible working, 25 days holiday, and a contributory pension scheme.
  • Why this job: Make a real impact in cybersecurity while working with cutting-edge technology and innovative teams.
  • Qualifications: Experience in hardware analysis, programming skills, and a methodical approach to problem-solving.
  • Other info: Hybrid working model with excellent career growth opportunities in a dynamic environment.

The predicted salary is between 36000 - 60000 £ per year.

Raytheon UK's Cyber Research Group (CRG) is seeking a technically proficient and analytically minded Vulnerability Researcher with experience in hardware analysis to support advanced research and development activities. As Vulnerability Researcher, you will conduct in-depth technical investigations, developing prototypes, and contributing to the discovery and analysis of emerging threats and vulnerabilities. This role will be based in our Gloucester office or customer site on a hybrid basis (average of 2 days per week). You must be eligible for or already hold eDV clearance.

Key Responsibilities

  • Hardware teardowns, characterisations and reverse engineering.
  • Extract and recover data from flash memory including NAND, eMMC and SPI.
  • Conduct side channel attacks such as timing attacks, voltage glitching and power analysis.
  • Design and implement hardware/software rapid prototypes to explore novel cyber capabilities and concepts.
  • Analyse network protocols and system behaviours to identify potential security weaknesses.
  • Collaborate with multidisciplinary teams to deliver technical solutions and research outcomes.
  • Document findings and methodologies in a clear and structured manner for internal and external stakeholders.

Essential Skills and Experience

  • Hardware development and prototyping, including PCB design and microcontroller programming.
  • Experience extracting data from flash storage ICs.
  • Familiarity with logic analysers and oscilloscopes.
  • Advanced soldering and desoldering experience.
  • Basic understanding of side channel attack techniques (experience not required).
  • Proficiency in at least one programming language such as C, C++, or Python.
  • Good working knowledge of Linux-based systems, including command-line tools and system configuration.
  • Demonstrated analytical and problem-solving capabilities, with a methodical and inquisitive approach to technical challenges.
  • Eligible for or hold active eDV clearance.

Desirable Experience

  • Reverse engineering using tools such as IDA Pro, Ghidra, or Binary Ninja.
  • Vulnerability research, including exploit development and mitigation bypass techniques.
  • Embedded software development for platforms such as ARM Cortex, AVR, or MIPS.
  • Experience with Radio Frequency (RF) systems, Software Defined Radios (SDRs), 2G/4G/5G, including tools like GNU Radio, Osmocom, srsRAN or USRP.
  • Network engineering experience either home lab or professional.

Benefits and Work Culture

  • Competitive salary
  • 37hr working week, with an early finish Friday - start your weekend early!
  • Informal and formal flexible working possible - please enquire or highlight any requests to our Talent Acquisition team to explore the flexible working possibilities.
  • 25 days holiday (increasing by up to 2 days with service), plus public holidays, opportunity to buy / sell / roll over up to 5 days, and up to 5 days volunteering annually.
  • Contributory Pension Scheme (up to 10.5% company contribution)
  • Company bonus scheme (discretionary).
  • 6 times salary 'Life Assurance' with pension.
  • Flexible Benefits scheme with extensive salary sacrifice schemes, including Health Cashplan, Dental, and Cycle to Work amongst others.
  • Enhanced sick pay.
  • Enhanced family friendly policies including enhanced maternity, paternity & shared parental leave.

Vulnerability Researcher in London employer: Raytheon Systems

Raytheon UK is an exceptional employer, offering a dynamic work environment in Gloucester that fosters innovation and collaboration. With a competitive salary, flexible working options, and a strong commitment to employee growth through extensive benefits and professional development opportunities, we empower our Vulnerability Researchers to thrive in their careers while contributing to cutting-edge cyber research. Join us to be part of a global leader dedicated to making a meaningful impact in the security landscape.
R

Contact Detail:

Raytheon Systems Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Vulnerability Researcher in London

✨Tip Number 1

Get your networking game on! Connect with folks in the industry, especially those at Raytheon or similar companies. Attend meetups, webinars, or even online forums to chat about vulnerability research and hardware analysis.

✨Tip Number 2

Show off your skills! Create a portfolio showcasing your projects, especially any hardware teardowns or prototypes you've worked on. This will give you an edge and demonstrate your hands-on experience.

✨Tip Number 3

Practice makes perfect! Brush up on your programming skills in C, C++, or Python. Consider working on small projects or contributing to open-source initiatives to keep your skills sharp and relevant.

✨Tip Number 4

Apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you're genuinely interested in joining the team at Raytheon.

We think you need these skills to ace Vulnerability Researcher in London

Hardware Analysis
Reverse Engineering
Data Extraction from Flash Memory
Side Channel Attack Techniques
Hardware/Software Prototyping
Network Protocol Analysis
Collaboration with Multidisciplinary Teams
Documentation Skills
PCB Design
Microcontroller Programming
Logic Analysers and Oscilloscopes Familiarity
Soldering and Desoldering Skills
Proficiency in C, C++, or Python
Linux System Knowledge
Analytical and Problem-Solving Skills

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights your experience in hardware analysis and vulnerability research. We want to see how your skills match the job description, so don’t be shy about showcasing relevant projects or tools you've used!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about vulnerability research and how your background makes you a perfect fit for our team. Keep it concise but impactful!

Showcase Your Technical Skills: When filling out your application, be specific about your technical skills. Mention any programming languages you're proficient in, as well as your experience with hardware development and reverse engineering tools. We love detail!

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you’re keen on joining our team at Raytheon UK!

How to prepare for a job interview at Raytheon Systems

✨Know Your Hardware Inside Out

Make sure you brush up on your hardware analysis skills. Be prepared to discuss your experience with hardware teardowns, PCB design, and any relevant projects you've worked on. This will show that you’re not just familiar with the concepts but have practical experience too.

✨Demonstrate Your Analytical Skills

During the interview, be ready to showcase your problem-solving capabilities. Think of specific examples where you identified vulnerabilities or developed prototypes. Use the STAR method (Situation, Task, Action, Result) to structure your answers clearly.

✨Familiarise Yourself with Side Channel Attacks

Even if you don’t have direct experience, understanding the basics of side channel attack techniques can set you apart. Research common methods like timing attacks and voltage glitching, and be prepared to discuss how they might apply to the role.

✨Show Off Your Programming Skills

Since proficiency in programming languages like C, C++, or Python is essential, be ready to talk about your coding experience. Bring examples of past projects or challenges you've tackled using these languages, and if possible, demonstrate your knowledge of Linux-based systems.

Vulnerability Researcher in London
Raytheon Systems
Location: London
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

R
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>