Vulnerability Researcher

Vulnerability Researcher

Full-Time 36000 - 60000 Β£ / year (est.) No home office possible
Go Premium
R

At a Glance

  • Tasks: Conduct in-depth hardware analysis and develop prototypes to tackle emerging cyber threats.
  • Company: Join Raytheon UK, a leader in advanced systems and services.
  • Benefits: Enjoy a competitive salary, flexible working, and generous holiday allowance.
  • Why this job: Make a real impact in cybersecurity while working with cutting-edge technology.
  • Qualifications: Experience in hardware development and proficiency in programming languages like C or Python.
  • Other info: Collaborative environment with excellent career growth and opportunities for innovation.

The predicted salary is between 36000 - 60000 Β£ per year.

Raytheon UK's Cyber Research Group (CRG) is seeking a technically proficient and analytically minded Vulnerability Researcher with experience in hardware analysis to support advanced research and development activities.

As Vulnerability Researcher, you will conduct in-depth technical investigations, developing prototypes, and contributing to the discovery and analysis of emerging threats and vulnerabilities. This role will be based in our Gloucester office or customer site on a hybrid basis (average of 2 days per week). You must be eligible for or already hold eDV clearance.

Responsibilities

  • Hardware teardowns, characterisations and reverse engineering.
  • Extract and recover data from flash memory including NAND, eMMC and SPI.
  • Conduct side channel attacks such as timing attacks, voltage glitching and power analysis.
  • Design and implement hardware/software rapid prototypes to explore novel cyber capabilities and concepts.
  • Analyse network protocols and system behaviours to identify potential security weaknesses.
  • Collaborate with multidisciplinary teams to deliver technical solutions and research outcomes.
  • Document findings and methodologies in a clear and structured manner for internal and external stakeholders.

Essential Skills and Experience

  • Hardware development and prototyping, including PCB design and microcontroller programming.
  • Experience extracting data from flash storage ICs.
  • Familiarity with logic analysers and oscilloscopes.
  • Advanced soldering and desoldering experience.
  • Basic understanding of side channel attack techniques (experience not required).
  • Proficiency in at least one programming language such as C, C++, or Python.
  • Good working knowledge of Linux-based systems, including command-line tools and system configuration.
  • Demonstrated analytical and problem-solving capabilities, with a methodical and inquisitive approach to technical challenges.
  • Eligible for or hold active eDV clearance.

Desirable Experience

  • Reverse engineering using tools such as IDA Pro, Ghidra, or Binary Ninja.
  • Vulnerability research, including exploit development and mitigation bypass techniques.
  • Embedded software development for platforms such as ARM Cortex, AVR, or MIPS.
  • Experience with Radio Frequency (RF) systems, Software Defined Radios (SDRs), 2G/4G/5G, including tools like GNU Radio, Osmocom, srsRAN or USRP.
  • Network engineering experience either home lab or professional.

Benefits and Work Culture

  • Competitive salary.
  • 37hr working week, with an early finish Friday - start your weekend early!
  • Informal and formal flexible working possible - please enquire or highlight any requests to our Talent Acquisition team to explore the flexible working possibilities.
  • 25 days holiday (increasing by up to 2 days with service), plus public holidays, opportunity to buy/sell/roll over up to 5 days, and up to 5 days volunteering annually.
  • Contributory Pension Scheme (up to 10.5% company contribution).
  • Company bonus scheme (discretionary).
  • 6 times salary 'Life Assurance' with pension.
  • Flexible Benefits scheme with extensive salary sacrifice schemes, including Health Cashplan, Dental, and Cycle to Work amongst others.
  • Enhanced sick pay.
  • Enhanced family friendly policies including enhanced maternity, paternity & shared parental leave.

RTX Raytheon UK is a landed company and part of the wider RTX organisation. Headquartered in Arlington, Virginia, USA, but with over 180,000 employees globally across every continent, RTX provides advanced systems and services for commercial, military and government customers worldwide and comprises three industry-leading businesses - Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Supporting over 35,000 jobs across 13 UK sites, RTX is helping to drive prosperity. Each year our work contributes over Β£2.7bn to the UK economy and offers a wealth of opportunities to 4,000 suppliers across England, Scotland, Wales and Northern Ireland. We're investing in all corners of the country, supporting 29,040 jobs in England, 3,040 in Northern Ireland, 1,900 in Scotland and 1,600 in Wales.

Vulnerability Researcher employer: Raytheon U.K.

Raytheon UK is an exceptional employer, offering a dynamic work environment in Gloucester where innovation meets collaboration. With a competitive salary, flexible working options, and a strong focus on employee growth through training and development, we empower our Vulnerability Researchers to tackle cutting-edge challenges in cybersecurity. Our commitment to work-life balance, enhanced family-friendly policies, and a comprehensive benefits package make Raytheon UK a rewarding place to build a meaningful career.
R

Contact Detail:

Raytheon U.K. Recruiting Team

StudySmarter Expert Advice 🀫

We think this is how you could land Vulnerability Researcher

✨Tip Number 1

Network like a pro! Reach out to folks in the industry, attend meetups or webinars, and don’t be shy about sliding into DMs on LinkedIn. The more connections we make, the better our chances of landing that dream role.

✨Tip Number 2

Show off your skills! Create a portfolio showcasing your hardware analysis projects or any prototypes you've developed. This gives us a tangible way to demonstrate our expertise and passion for vulnerability research.

✨Tip Number 3

Prepare for interviews by brushing up on common technical questions related to hardware teardowns and reverse engineering. We should also be ready to discuss our problem-solving approach and how we tackle technical challenges.

✨Tip Number 4

Apply through our website! It’s the best way to ensure your application gets noticed. Plus, it shows we’re genuinely interested in being part of the team at Raytheon UK.

We think you need these skills to ace Vulnerability Researcher

Hardware Analysis
Reverse Engineering
Data Extraction from Flash Memory
Side Channel Attack Techniques
Prototyping (Hardware/Software)
Network Protocol Analysis
Collaboration with Multidisciplinary Teams
Documentation Skills
PCB Design
Microcontroller Programming
Logic Analysers and Oscilloscopes Familiarity
Soldering and Desoldering Skills
Programming (C, C++, Python)
Linux System Knowledge
Analytical and Problem-Solving Skills

Some tips for your application 🫑

Tailor Your CV: Make sure your CV is tailored to the Vulnerability Researcher role. Highlight your hardware analysis experience and any relevant projects you've worked on. We want to see how your skills match what we're looking for!

Showcase Your Skills: In your application, don't just list your skillsβ€”show us how you've used them! Whether it's through specific projects or experiences, we love seeing practical examples of your hardware development and prototyping expertise.

Be Clear and Concise: When writing your application, clarity is key! Use straightforward language and structure your thoughts logically. We appreciate a well-organised document that makes it easy for us to see your qualifications.

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets to us quickly and efficiently. Plus, you'll find all the details you need about the role there!

How to prepare for a job interview at Raytheon U.K.

✨Know Your Hardware Inside Out

Make sure you brush up on your hardware analysis skills. Be prepared to discuss your experience with hardware teardowns, PCB design, and any relevant projects you've worked on. This will show that you're not just familiar with the concepts but have practical experience too.

✨Demonstrate Your Analytical Skills

During the interview, be ready to showcase your problem-solving capabilities. You might be asked to tackle a technical challenge on the spot, so practice explaining your thought process clearly and methodically. This will highlight your analytical mindset, which is crucial for a Vulnerability Researcher.

✨Familiarise Yourself with Side Channel Attacks

Even if you don't have direct experience with side channel attacks, understanding the basic techniques can set you apart. Research common methods like timing attacks and voltage glitching, and be prepared to discuss how they relate to vulnerability research.

✨Show Off Your Programming Skills

Since proficiency in programming languages like C, C++, or Python is essential, be ready to talk about your coding experience. Bring examples of past projects or prototypes you've developed, and if possible, demonstrate your knowledge of Linux-based systems and command-line tools.

Vulnerability Researcher
Raytheon U.K.
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

R
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>