At a Glance
- Tasks: Conduct in-depth hardware analysis and develop prototypes to tackle emerging cyber threats.
- Company: Join Raytheon UK, a leader in defence and aerospace technology.
- Benefits: Enjoy a competitive salary, flexible working, and 25 days holiday plus more!
- Why this job: Make a real impact in cybersecurity while growing your skills in a collaborative environment.
- Qualifications: Experience in hardware development and proficiency in programming languages like C or Python.
- Other info: Hybrid working model with excellent career growth opportunities.
The predicted salary is between 36000 - 60000 £ per year.
Overview
Raytheon UK\’s Cyber Research Group (CRG) is seeking a technically proficient and analytically minded Vulnerability Researcher with experience in hardware analysis to support advanced research and development activities.
As Vulnerability Researcher, you will conduct in-depth technical investigations, developing prototypes, and contributing to the discovery and analysis of emerging threats and vulnerabilities.
This role will be based in our Gloucester office or customer site on a hybrid basis (average of 2 days per week). You must be eligible for or already hold eDV clearance.
Responsibilities
- Hardware teardowns, characterisations and reverse engineering.
- Extract and recover data from flash memory including NAND, eMMC and SPI.
- Conduct side channel attacks such as timing attacks, voltage glitching and power analysis.
- Design and implement hardware/software rapid prototypes to explore novel cyber capabilities and concepts.
- Analyse network protocols and system behaviours to identify potential security weaknesses.
- Collaborate with multidisciplinary teams to deliver technical solutions and research outcomes.
- Document findings and methodologies in a clear and structured manner for internal and external stakeholders.
Essential Skills and Experience
- Hardware development and prototyping, including PCB design and microcontroller programming.
- Experience extracting data from flash storage ICs.
- Familiarity with logic analysers and oscilloscopes.
- Advanced soldering and desoldering experience.
- Basic understanding of side channel attack techniques. (experience not required)
- Proficiency in at least one programming language such as C, C++, or Python.
- Good working knowledge of Linux-based systems, including command-line tools and system configuration.
- Demonstrated analytical and problem-solving capabilities, with a methodical and inquisitive approach to technical challenges.
- Eligible for or hold active eDV clearance
Desirable Experience
- Reverse engineering using tools such as IDA Pro, Ghidra, or Binary Ninja.
- Vulnerability research, including exploit development and mitigation bypass techniques.
- Embedded software development for platforms such as ARM Cortex, AVR, or MIPS.
- Experience with Radio Frequency (RF) systems, Software Defined Radios (SDRs), 2G/4G/5G, including tools like GNU Radio, Osmocom, srsRAN or USRP.
- Network engineering experience either home lab or professional.
Benefits and Work Culture
- Competitive salary
- 37hr working week, with an early finish Friday – start your weekend early!
- Informal and formal flexible working possible – please enquire or highlight any requests to our Talent Acquisition team to explore the flexible working possibilities.
- 25 days holiday (increasing by up to 2 days with service), plus public holidays, opportunity to buy / sell / roll over up to 5 days, and up to 5 days volunteering annually.
- Contributory Pension Scheme (up to 10.5% company contribution)
- Company bonus scheme (discretionary).
- 6 times salary \’Life Assurance\’ with pension.
- Flexible Benefits scheme with extensive salary sacrifice schemes, including Health Cashplan, Dental, and Cycle to Work amongst others.
- Enhanced sick pay.
- Enhanced family friendly policies including enhanced maternity, paternity & shared parental leave.
Raytheon UK is a leader in defence and aerospace technology. As an employer, we are dedicated to fuelling innovation, nurturing talent, and fostering a culture of excellence. Joining our team means being part of an organisation that shapes the future of national security whilst investing in your growth and personal development. We provide a collaborative environment, abundant opportunities for professional development, and a sense of purpose in what we do. We are building a community committed to safeguarding a safer and more connected world.
RTX – Raytheon UK is a landed company and part of the wider RTX organisation. Headquartered in Arlington, Virginia, USA, with over 180,000 employees globally across every continent, RTX provides advanced systems and services for commercial, military and government customers worldwide and comprises three industry-leading businesses – Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Supporting over 35,000 jobs across 13 UK sites, RTX contributes to the UK economy and partners with thousands of suppliers. RTX is investing across the country and creating opportunities in England, Scotland, Wales and Northern Ireland.
#LI-AS3
RTX adheres to the principles of equal employment. All qualified applications will be given careful consideration without regard to ethnicity, color, religion, gender, sexual orientation or identity, national origin, age, disability, protected veteran status or any other characteristic protected by law.
Privacy Policy and Terms: Please read the Policy and Terms on our site.
#J-18808-Ljbffr
Vulnerability Researcher employer: Raytheon Systems
Contact Detail:
Raytheon Systems Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Vulnerability Researcher
✨Tip Number 1
Network like a pro! Attend industry meetups, conferences, or online webinars related to cybersecurity and hardware analysis. You never know who you might bump into that could help you land that dream role.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your projects, especially those involving hardware teardowns or vulnerability research. This will give potential employers a taste of what you can do and set you apart from the crowd.
✨Tip Number 3
Don’t just apply – engage! When you find a job listing on our website, take the time to reach out to someone in the company. A quick message expressing your interest can make a huge difference and show your enthusiasm.
✨Tip Number 4
Prepare for the interview like it’s a mission! Research the company’s recent projects and challenges in the cybersecurity field. Being knowledgeable about their work will impress them and show you’re genuinely interested in contributing.
We think you need these skills to ace Vulnerability Researcher
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the skills and experiences that match the Vulnerability Researcher role. Highlight your hardware analysis experience and any relevant projects you've worked on. We want to see how you can contribute to our team!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about vulnerability research and how your background makes you a great fit for us. Be sure to mention any specific tools or techniques you're familiar with.
Showcase Your Technical Skills: In your application, don't shy away from detailing your technical skills. Whether it's PCB design, programming languages, or reverse engineering tools, we want to know what you bring to the table. Be specific and give examples where possible!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, you’ll find all the info you need about the role and our company culture there!
How to prepare for a job interview at Raytheon Systems
✨Know Your Hardware Inside Out
As a Vulnerability Researcher, you'll need to demonstrate your expertise in hardware analysis. Brush up on your knowledge of PCB design, microcontroller programming, and data extraction techniques from flash storage ICs. Be ready to discuss specific projects where you've applied these skills.
✨Showcase Your Analytical Skills
Prepare to highlight your analytical and problem-solving capabilities. Think of examples where you've tackled technical challenges methodically. This could involve discussing your experience with side channel attacks or how you've approached vulnerability research in the past.
✨Familiarise Yourself with Tools
Make sure you're comfortable discussing tools like IDA Pro, Ghidra, or Binary Ninja if you have experience with them. Even if you haven't used them extensively, showing that you understand their purpose and functionality can set you apart.
✨Communicate Clearly and Effectively
Since documentation is key in this role, practice explaining complex concepts in a clear and structured manner. You might be asked to present your findings or methodologies, so being able to articulate your thoughts will be crucial during the interview.