Principal Vulnerability Researcher in Gloucester
Principal Vulnerability Researcher

Principal Vulnerability Researcher in Gloucester

Gloucester Full-Time 43200 - 72000 £ / year (est.) Home office (partial)
Raytheon U.K.

At a Glance

  • Tasks: Conduct in-depth research to identify security vulnerabilities and develop innovative solutions.
  • Company: Join Raytheon UK's Cyber Research Group, a leader in cybersecurity innovation.
  • Benefits: Enjoy flexible working, generous holiday, and a strong pension scheme.
  • Why this job: Make a real impact in cybersecurity while working with cutting-edge technology.
  • Qualifications: Proficiency in programming and experience in reverse engineering required.
  • Other info: Collaborative environment with opportunities for professional growth and development.

The predicted salary is between 43200 - 72000 £ per year.

Raytheon UK's Cyber Research Group (CRG) is seeking a highly skilled and analytically driven Principal Vulnerability Researcher to support advanced research and development initiatives. As Principal Vulnerability Researcher, you will conduct in-depth technical investigations across hardware and software systems to identify security vulnerabilities, develop bespoke tools, and contribute to the discovery and analysis of emerging threats. This role requires a strong technical foundation, problem-solving ability, and the capacity to work collaboratively within multidisciplinary teams. You will be based at our Gloucester site, working in a hybrid capacity. You must be eligible and willing to gain SC and enhanced DV clearance.

Key Responsibilities

  • Perform hardware and software teardowns, characterisation, and reverse engineering
  • Conduct detailed analysis of platforms to identify security weaknesses, bugs, and potential exploits
  • Examine network protocols and system behaviours to uncover vulnerabilities
  • Collaborate with cross-functional teams to deliver innovative technical solutions and research outcomes
  • Produce clear, structured documentation of findings, methodologies, and recommendations for both internal and external stakeholders
  • Lead teams of researchers and report to customers
  • Assist with business development activities and winning new work

Required Experience

  • Proficiency in at least one programming language (C, C++, Python)
  • Familiarity with assembly language (reading or writing)
  • Experience in reverse engineering using tools such as IDA Pro, Ghidra, or Binary Ninja
  • Strong knowledge of Linux-based systems, including command-line tools and system configuration
  • Demonstrated analytical and problem-solving skills, with a methodical and inquisitive approach to technical challenges
  • Solid understanding of network protocols
  • Ability to rapidly learn and adapt to new technologies and domains

Desirable Experience

  • Proven track record of identifying, analysing, and reporting vulnerabilities in complex systems
  • Experience using or developing fuzzers
  • Practical experience emulating hardware platforms with QEMU or similar tools to support security research and analysis
  • Embedded software development for platforms such as ARM Cortex, AVR, or MIPS
  • Familiarity with Radio Frequency (RF) systems and Software Defined Radios (SDRs), including 2G/4G/5G technologies and tools such as GNU Radio, Osmocom, srsRAN, or USRP
  • Network engineering experience (professional or home lab)
  • Hardware development and prototyping, including PCB design and microcontroller programming

Benefits and Work Culture

  • 37hr working week with early finish Fridays - start your weekend early!
  • An informal, flexible working culture that is output focused
  • 25 days holiday + statutory public holidays, plus opportunity to buy and sell up to 5 days and up to 5 paid days volunteering
  • 10.5% company pension contribution with 6% employee contribution
  • Annual company bonus scheme (discretionary)
  • Private Medical Insurance (grade dependent)
  • 6 times salary Life Assurance with pension
  • Flexible Benefits scheme with extensive salary sacrifice schemes, including Health Cashplan, Dental, and Cycle to Work, amongst others
  • Enhanced sick pay
  • Enhanced family friendly policies including enhanced maternity, paternity & shared parental leave

Principal Vulnerability Researcher in Gloucester employer: Raytheon U.K.

Raytheon UK is an exceptional employer, offering a dynamic and collaborative work environment at our Gloucester site, where innovation thrives. With a strong focus on employee growth, we provide extensive benefits including a flexible working culture, generous holiday allowances, and a robust pension scheme, ensuring that our team members are well-supported both personally and professionally. Join us to be part of cutting-edge research in cybersecurity while enjoying a healthy work-life balance and opportunities for meaningful contributions to national security.
Raytheon U.K.

Contact Detail:

Raytheon U.K. Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Principal Vulnerability Researcher in Gloucester

✨Tip Number 1

Network like a pro! Reach out to folks in the industry, attend meetups, and connect with current employees at Raytheon UK. You never know who might give you the inside scoop on job openings or even refer you directly!

✨Tip Number 2

Show off your skills! Create a portfolio showcasing your projects, especially those related to vulnerability research. This can be a game-changer during interviews, as it gives us a tangible look at what you can do.

✨Tip Number 3

Prepare for technical interviews by brushing up on your programming languages and reverse engineering tools. Practice common problems and scenarios that might come up, so you can impress the interviewers with your analytical skills.

✨Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in joining our team at Raytheon UK.

We think you need these skills to ace Principal Vulnerability Researcher in Gloucester

Analytical Skills
Problem-Solving Ability
Technical Investigations
Reverse Engineering
Programming (C, C++, Python)
Assembly Language Proficiency
Linux-based Systems Knowledge
Network Protocols Understanding
Documentation Skills
Collaboration with Cross-Functional Teams
Fuzzing Techniques
Hardware Emulation (QEMU)
Embedded Software Development
Radio Frequency (RF) Systems Familiarity
Network Engineering Experience

Some tips for your application 🫡

Tailor Your Application: Make sure to customise your CV and cover letter to highlight your experience with vulnerability research and reverse engineering. We want to see how your skills align with the role, so don’t hold back on showcasing your relevant projects!

Show Off Your Technical Skills: Since this role is all about technical prowess, be sure to mention your proficiency in programming languages like C, C++, or Python. If you've worked with tools like IDA Pro or Ghidra, let us know – we love seeing that hands-on experience!

Be Clear and Concise: When documenting your findings or methodologies, clarity is key. We appreciate structured documentation that’s easy to follow, so keep it straightforward and to the point. This will help us understand your thought process better!

Apply Through Our Website: We encourage you to submit your application through our website. It’s the best way for us to receive your details and ensures you’re considered for the role. Plus, it’s super easy – just a few clicks and you’re done!

How to prepare for a job interview at Raytheon U.K.

✨Know Your Tech Inside Out

As a Principal Vulnerability Researcher, you’ll need to demonstrate your technical prowess. Brush up on your programming languages like C, C++, and Python, and be ready to discuss your experience with reverse engineering tools like IDA Pro or Ghidra. Make sure you can explain complex concepts in a way that shows your depth of understanding.

✨Showcase Your Problem-Solving Skills

Prepare to tackle hypothetical scenarios during the interview. Think about how you would approach identifying vulnerabilities in a system. Use examples from your past experiences to illustrate your analytical skills and methodical approach to problem-solving. This will help the interviewers see your thought process in action.

✨Collaborate and Communicate

Since this role involves working with cross-functional teams, be ready to discuss your collaborative experiences. Share examples of how you’ve worked with others to deliver innovative solutions. Highlight your ability to produce clear documentation, as this is crucial for both internal and external stakeholders.

✨Stay Current with Emerging Threats

Research the latest trends in cybersecurity and emerging threats before your interview. Being knowledgeable about current vulnerabilities and security challenges will show your passion for the field. It also demonstrates your commitment to continuous learning, which is essential for a role that requires rapid adaptation to new technologies.

Principal Vulnerability Researcher in Gloucester
Raytheon U.K.
Location: Gloucester

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>