At a Glance
- Tasks: Investigate and identify security vulnerabilities in hardware and software systems.
- Company: Join Raytheon UK, a leader in cyber research with a collaborative culture.
- Benefits: Enjoy flexible working, 25 days holiday, and a generous pension scheme.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
- Qualifications: Proficiency in programming languages and experience in reverse engineering required.
- Other info: Hybrid role with excellent career growth and a focus on innovation.
The predicted salary is between 54000 - 84000 £ per year.
Raytheon UK’s Cyber Research Group (CRG) is seeking a highly skilled and analytically driven Principal Vulnerability Researcher to support advanced research and development initiatives. As Principal Vulnerability Researcher, you will conduct in-depth technical investigations across hardware and software systems to identify security vulnerabilities, develop bespoke tools, and contribute to the discovery and analysis of emerging threats. This role requires a strong technical foundation, problem-solving ability, and the capacity to work collaboratively within multidisciplinary teams. You will be based at our Gloucester site, working in a hybrid capacity. You must be eligible and willing to gain SC and enhanced DV clearance.
Key Responsibilities
- Perform hardware and software teardowns, characterisation, and reverse engineering.
- Conduct detailed analysis of platforms to identify security weaknesses, bugs, and potential exploits.
- Examine network protocols and system behaviours to uncover vulnerabilities.
- Collaborate with cross-functional teams to deliver innovative technical solutions and research outcomes.
- Produce clear, structured documentation of findings, methodologies, and recommendations for both internal and external stakeholders.
- Lead teams of researchers and report to customers.
- Assist with business development activities and winning new work.
Required Skills And Experience
- Proficiency in at least one programming language (C, C++, Python).
- Familiarity with assembly language (reading or writing).
- Experience in reverse engineering using tools such as IDA Pro, Ghidra, or Binary Ninja.
- Strong knowledge of Linux-based systems, including command-line tools and system configuration.
- Demonstrated analytical and problem-solving skills, with a methodical and inquisitive approach to technical challenges.
- Solid understanding of network protocols.
- Ability to rapidly learn and adapt to new technologies and domains.
Desirable Experience
- Proven track record of identifying, analysing, and reporting vulnerabilities in complex systems.
- Experience using or developing fuzzers.
- Practical experience emulating hardware platforms with QEMU or similar tools to support security research and analysis.
- Embedded software development for platforms such as ARM Cortex, AVR, or MIPS.
- Familiarity with Radio Frequency (RF) systems and Software Defined Radios (SDRs), including 2G/4G/5G technologies and tools such as GNU Radio, Osmocom, srsRAN, or USRP.
- Network engineering experience (professional or home lab).
- Hardware development and prototyping, including PCB design and microcontroller programming.
Benefits And Work Culture
- 37hr working week with early finish Fridays – start your weekend early!
- An informal, flexible working culture that is output focused.
- 25 days holiday + statutory public holidays, plus opportunity to buy and sell up to 5 days and up to 5 paid days volunteering.
- 10.5% company pension contribution with 6% employee contribution.
- Annual company bonus scheme (discretionary).
- Private Medical Insurance (grade dependent).
- 6 times salary Life Assurance with pension.
- Flexible Benefits scheme with extensive salary sacrifice schemes, including Health Cashplan, Dental, and Cycle to Work, amongst others.
- Enhanced sick pay.
- Enhanced family friendly policies including enhanced maternity, paternity.
RTX Raytheon UK is a landed company and part of the wider RTX organisation. Headquartered in Arlington, Virginia, USA, but with over 180,000 employees globally across every continent, RTX provides advanced systems and services for commercial, military and government customers worldwide and comprises three industry-leading businesses – Collins Aerospace Systems, Pratt.
Principal Vulnerability Researcher employer: Raytheon UK
Contact Detail:
Raytheon UK Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Principal Vulnerability Researcher
✨Tip Number 1
Network like a pro! Attend industry meetups, conferences, or online webinars related to cybersecurity. Engaging with professionals in the field can lead to valuable connections and potential job opportunities.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your projects, research, or any tools you've developed. This gives potential employers a tangible look at what you can do and sets you apart from the crowd.
✨Tip Number 3
Prepare for interviews by brushing up on common technical questions and scenarios related to vulnerability research. Practising with friends or using mock interview platforms can help you feel more confident when it’s your turn to shine.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are proactive about their job search!
We think you need these skills to ace Principal Vulnerability Researcher
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Principal Vulnerability Researcher role. Highlight your experience with programming languages, reverse engineering, and any relevant projects that showcase your skills in identifying security vulnerabilities.
Craft a Compelling Cover Letter: Your cover letter should tell us why you're the perfect fit for this role. Share specific examples of your past work, especially those that demonstrate your analytical skills and ability to collaborate with teams on complex projects.
Showcase Your Technical Skills: Don’t forget to list your technical skills clearly. Mention your proficiency in tools like IDA Pro or Ghidra, and any experience you have with Linux systems. This will help us see how you can contribute to our Cyber Research Group.
Apply Through Our Website: We encourage you to apply through our website for a smoother application process. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates from us!
How to prepare for a job interview at Raytheon UK
✨Know Your Tech Inside Out
As a Principal Vulnerability Researcher, you’ll need to demonstrate your technical prowess. Brush up on your knowledge of programming languages like C, C++, and Python, and be ready to discuss your experience with reverse engineering tools such as IDA Pro or Ghidra. Show them you can dive deep into hardware and software systems!
✨Showcase Your Problem-Solving Skills
Prepare to tackle some technical challenges during the interview. Think of examples from your past work where you identified vulnerabilities or developed innovative solutions. Be ready to explain your thought process and how you approached those problems methodically.
✨Collaborate Like a Pro
This role involves working with cross-functional teams, so highlight your teamwork skills. Share experiences where you collaborated effectively with others to achieve a common goal. Emphasise your ability to communicate complex technical findings clearly to both technical and non-technical stakeholders.
✨Stay Current with Emerging Threats
The cybersecurity landscape is always evolving, so it’s crucial to stay updated on the latest threats and vulnerabilities. Mention any recent research or trends you've followed, and be prepared to discuss how you would approach identifying and mitigating these emerging risks in your role.