At a Glance
- Tasks: Conduct in-depth hardware analysis and develop prototypes to tackle emerging cyber threats.
- Company: Join Raytheon UK, a leader in advanced systems and services.
- Benefits: Enjoy a competitive salary, flexible working, and generous holiday allowance.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technology.
- Qualifications: Experience in hardware development and proficiency in programming languages like C or Python.
- Other info: Collaborative environment with excellent career growth and opportunities for innovation.
The predicted salary is between 36000 - 60000 Β£ per year.
Raytheon UK's Cyber Research Group (CRG) is seeking a technically proficient and analytically minded Vulnerability Researcher with experience in hardware analysis to support advanced research and development activities.
As Vulnerability Researcher, you will conduct in-depth technical investigations, developing prototypes, and contributing to the discovery and analysis of emerging threats and vulnerabilities. This role will be based in our Gloucester office or customer site on a hybrid basis (average of 2 days per week). You must be eligible for or already hold eDV clearance.
Responsibilities
- Hardware teardowns, characterisations and reverse engineering.
- Extract and recover data from flash memory including NAND, eMMC and SPI.
- Conduct side channel attacks such as timing attacks, voltage glitching and power analysis.
- Design and implement hardware/software rapid prototypes to explore novel cyber capabilities and concepts.
- Analyse network protocols and system behaviours to identify potential security weaknesses.
- Collaborate with multidisciplinary teams to deliver technical solutions and research outcomes.
- Document findings and methodologies in a clear and structured manner for internal and external stakeholders.
Essential Skills and Experience
- Hardware development and prototyping, including PCB design and microcontroller programming.
- Experience extracting data from flash storage ICs.
- Familiarity with logic analysers and oscilloscopes.
- Advanced soldering and desoldering experience.
- Basic understanding of side channel attack techniques (experience not required).
- Proficiency in at least one programming language such as C, C++, or Python.
- Good working knowledge of Linux-based systems, including command-line tools and system configuration.
- Demonstrated analytical and problem-solving capabilities, with a methodical and inquisitive approach to technical challenges.
- Eligible for or hold active eDV clearance.
Desirable Experience
- Reverse engineering using tools such as IDA Pro, Ghidra, or Binary Ninja.
- Vulnerability research, including exploit development and mitigation bypass techniques.
- Embedded software development for platforms such as ARM Cortex, AVR, or MIPS.
- Experience with Radio Frequency (RF) systems, Software Defined Radios (SDRs), 2G/4G/5G, including tools like GNU Radio, Osmocom, srsRAN or USRP.
- Network engineering experience either home lab or professional.
Benefits and Work Culture
- Competitive salary.
- 37hr working week, with an early finish Friday - start your weekend early!
- Informal and formal flexible working possible - please enquire or highlight any requests to our Talent Acquisition team to explore the flexible working possibilities.
- 25 days holiday (increasing by up to 2 days with service), plus public holidays, opportunity to buy/sell/roll over up to 5 days, and up to 5 days volunteering annually.
- Contributory Pension Scheme (up to 10.5% company contribution).
- Company bonus scheme (discretionary).
- 6 times salary 'Life Assurance' with pension.
- Flexible Benefits scheme with extensive salary sacrifice schemes, including Health Cashplan, Dental, and Cycle to Work amongst others.
- Enhanced sick pay.
- Enhanced family friendly policies including enhanced maternity, paternity & shared parental leave.
RTX Raytheon UK is a landed company and part of the wider RTX organisation. Headquartered in Arlington, Virginia, USA, but with over 180,000 employees globally across every continent, RTX provides advanced systems and services for commercial, military and government customers worldwide and comprises three industry-leading businesses - Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Supporting over 35,000 jobs across 13 UK sites, RTX is helping to drive prosperity. Each year our work contributes over Β£2.7bn to the UK economy and offers a wealth of opportunities to 4,000 suppliers across England, Scotland, Wales and Northern Ireland. We're investing in all corners of the country, supporting 29,040 jobs in England, 3,040 in Northern Ireland, 1,900 in Scotland and 1,600 in Wales.
Vulnerability Researcher employer: Raytheon U.K.
Contact Detail:
Raytheon U.K. Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Vulnerability Researcher
β¨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups or webinars, and donβt be shy about sliding into DMs on LinkedIn. The more connections we make, the better our chances of landing that dream role.
β¨Tip Number 2
Show off your skills! Create a portfolio showcasing your hardware analysis projects or any prototypes you've developed. This gives us a tangible way to demonstrate our expertise and passion for vulnerability research.
β¨Tip Number 3
Prepare for interviews by brushing up on common technical questions related to hardware teardowns and reverse engineering. We should also be ready to discuss our problem-solving approach and how we tackle technical challenges.
β¨Tip Number 4
Apply through our website! Itβs the best way to ensure your application gets noticed. Plus, it shows weβre genuinely interested in being part of the team at Raytheon UK.
We think you need these skills to ace Vulnerability Researcher
Some tips for your application π«‘
Tailor Your CV: Make sure your CV is tailored to the Vulnerability Researcher role. Highlight your hardware analysis experience and any relevant projects you've worked on. We want to see how your skills match what we're looking for!
Showcase Your Skills: In your application, don't just list your skillsβshow us how you've used them! Whether it's through specific projects or experiences, we love seeing practical examples of your hardware development and prototyping expertise.
Be Clear and Concise: When writing your application, clarity is key! Use straightforward language and structure your thoughts logically. We appreciate a well-organised document that makes it easy for us to see your qualifications.
Apply Through Our Website: We encourage you to apply directly through our website. Itβs the best way to ensure your application gets to us quickly and efficiently. Plus, you'll find all the details you need about the role there!
How to prepare for a job interview at Raytheon U.K.
β¨Know Your Hardware Inside Out
Make sure you brush up on your hardware analysis skills. Be prepared to discuss your experience with hardware teardowns, PCB design, and any relevant projects you've worked on. This will show that you're not just familiar with the concepts but have practical experience too.
β¨Demonstrate Your Analytical Skills
During the interview, be ready to showcase your problem-solving capabilities. You might be asked to tackle a technical challenge on the spot, so practice explaining your thought process clearly and methodically. This will highlight your analytical mindset, which is crucial for a Vulnerability Researcher.
β¨Familiarise Yourself with Side Channel Attacks
Even if you don't have direct experience with side channel attacks, understanding the basic techniques can set you apart. Research common methods like timing attacks and voltage glitching, and be prepared to discuss how they relate to vulnerability research.
β¨Show Off Your Programming Skills
Since proficiency in programming languages like C, C++, or Python is essential, be ready to talk about your coding experience. Bring examples of past projects or prototypes you've developed, and if possible, demonstrate your knowledge of Linux-based systems and command-line tools.