At a Glance
- Tasks: Investigate hardware and software systems to uncover security vulnerabilities and develop innovative tools.
- Company: Join Raytheon UK’s Cyber Research Group, a leader in cybersecurity innovation.
- Benefits: Enjoy flexible working, generous holiday, and a strong pension scheme.
- Other info: Dynamic work culture with opportunities for professional growth and development.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
- Qualifications: Proficient in programming languages and experienced in reverse engineering.
The predicted salary is between 50000 - 65000 £ per year.
Raytheon UK’s Cyber Research Group (CRG) is seeking a highly skilled Vulnerability Researcher to conduct in-depth technical investigations across hardware and software systems, identify security vulnerabilities, develop bespoke tools, and contribute to the discovery and analysis of emerging threats. Candidates must be based at our Gloucester site, work in a hybrid capacity, and be eligible to gain SC and enhanced DV clearance.
Key Responsibilities
- Perform hardware and software teardowns, characterisation, and reverse engineering.
- Conduct detailed analysis of platforms to identify security weaknesses, bugs, and potential exploits.
- Examine network protocols and system behaviours to uncover vulnerabilities.
- Produce clear, structured documentation of findings, methodologies, and recommendations for both internal and external stakeholders.
Required Skills And Experience
- Proficiency in at least one programming language (C, C++, Python).
- Familiarity with assembly language (reading or writing).
- Experience in reverse engineering using tools such as IDA Pro, Ghidra, or Binary Ninja.
- Strong knowledge of Linux-based systems, including command-line tools and system configuration.
- Demonstrated analytical and problem-solving skills, with a methodical and inquisitive approach to technical challenges.
- Solid understanding of network protocols.
- Ability to rapidly learn and adapt to new technologies and domains.
Desirable Experience
- Proven track record of identifying, analysing, and reporting vulnerabilities in complex systems.
- Experience using or developing fuzzers.
- Practical experience emulating hardware platforms with QEMU or similar tools to support security research and analysis.
- Embedded software development for platforms such as ARM Cortex, AVR, or MIPS.
- Familiarity with Radio Frequency (RF) systems and Software Defined Radios (SDRs), including 2G/4G/5G technologies and tools such as GNU Radio, Osmocom, srsRAN, or USRP.
- Network engineering experience (professional or home lab).
- Hardware development and prototyping, including PCB design and microcontroller programming.
Benefits And Work Culture
- 37-hour working week with early finish Fridays.
- An informal, flexible working culture that is output focused.
- 25 days holiday + statutory public holidays, with options to buy, sell up to 5 days, and up to 5 paid days volunteering.
- 10.5% company pension contribution with 6% employee contribution.
- Annual company bonus scheme (discretionary).
- Private Medical Insurance (grade dependent).
- Six times salary Life Assurance with pension.
- Flexible Benefits scheme with extensive salary sacrifice schemes, including Health Cashplan, Dental, and Cycle to Work.
- Enhanced sick pay.
- Enhanced family friendly policies including enhanced maternity, paternity.
Vulnerability Researcher employer: Raytheon UK
Contact Detail:
Raytheon UK Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Vulnerability Researcher
✨Tip Number 1
Network like a pro! Reach out to current or former employees at Raytheon UK on LinkedIn. A friendly chat can give you insider info and maybe even a referral, which can really boost your chances.
✨Tip Number 2
Show off your skills! If you’ve got a portfolio of projects or tools you’ve developed, make sure to highlight them in conversations. Demonstrating your hands-on experience with reverse engineering or vulnerability analysis can set you apart.
✨Tip Number 3
Prepare for the technical interview! Brush up on your programming languages and be ready to discuss your approach to identifying vulnerabilities. Practising common technical questions can help you feel more confident when it’s your turn to shine.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in joining the team at Raytheon UK.
We think you need these skills to ace Vulnerability Researcher
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Vulnerability Researcher role. Highlight your experience with programming languages, reverse engineering tools, and any relevant projects that showcase your skills. We want to see how you fit into our team!
Showcase Your Skills: In your cover letter, don’t just list your skills—show us how you've used them in real-world scenarios. Talk about specific vulnerabilities you've identified or tools you've developed. This helps us understand your practical experience and problem-solving abilities.
Be Clear and Concise: When writing your application, clarity is key! Use structured documentation to present your findings and methodologies. We appreciate a well-organised application that makes it easy for us to see your thought process and analytical skills.
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It’s straightforward and ensures your application goes directly to us. Plus, we love seeing candidates who take the initiative to follow our preferred process!
How to prepare for a job interview at Raytheon UK
✨Know Your Tech Inside Out
Make sure you brush up on your knowledge of programming languages like C, C++, and Python. Be ready to discuss your experience with reverse engineering tools such as IDA Pro or Ghidra, and don’t forget to mention any hands-on projects you've worked on that showcase your skills.
✨Show Off Your Analytical Skills
Prepare to demonstrate your analytical and problem-solving abilities. Think of specific examples where you've identified vulnerabilities or bugs in systems. Use the STAR method (Situation, Task, Action, Result) to structure your responses and make them impactful.
✨Familiarise Yourself with the Company’s Work
Research Raytheon UK’s Cyber Research Group and their recent projects or publications. Understanding their focus areas will help you tailor your answers and show genuine interest in the role. It also gives you a chance to ask insightful questions during the interview.
✨Practice Clear Communication
Since you'll need to produce structured documentation of your findings, practice explaining complex technical concepts in simple terms. This will not only help you in the interview but also demonstrate your ability to communicate effectively with both technical and non-technical stakeholders.