Vulnerability Researcher - Software & Hardware in Gloucester
Vulnerability Researcher - Software & Hardware

Vulnerability Researcher - Software & Hardware in Gloucester

Gloucester Full-Time 48000 - 72000 Β£ / year (est.) No home office possible
S

At a Glance

  • Tasks: Dive into hands-on vulnerability research across software and hardware systems.
  • Company: Join a leading cyber research team in Gloucester with a focus on innovation.
  • Benefits: Enjoy a Β£60,000 salary, bonuses, flexible benefits, and 25 days holiday.
  • Why this job: Explore and experiment with cutting-edge technology while making a real impact.
  • Qualifications: Experience in security research, embedded development, and proficiency in programming.
  • Other info: Work in a dynamic environment with excellent long-term technical growth opportunities.

The predicted salary is between 48000 - 72000 Β£ per year.

Vulnerability Researcher – Software & Hardware (Cyber Research | Hands-On Testing | Exploratory Engineering)

Location: Gloucester, UK – MUST be local or willing to commute

Salary: Β£60,000 base salary + Bonus + benefits + long-term technical progression

Full-time, permanent | 37 hours per week | Hybrid (3 days per week on site)

Location & Eligibility – Please Read Carefully

  • This role is based in Gloucester and requires regular on-site work (3 days per week).
  • Applicants must already be based locally or willing to commute reliably.
  • Applicants must have valid UK work eligibility. Visa sponsorship is not available.

Security Clearance

Due to the nature of the work, candidates must be eligible for UK Security Check (SC) clearance. This typically requires British citizenship and continuous UK residency for the past 5 years.

Overview

We are recruiting a Vulnerability Researcher to join a specialist research team working across both software and hardware security in a secure engineering environment. This is a practical, exploratory research role. You will spend your time testing, breaking, probing, and experimenting with real systems, from embedded devices and firmware to software behaviour and protocols. This is not a compliance, audit, or checkbox-driven role. The focus is on curiosity-led investigation, rapid experimentation, and understanding how and why systems fail.

If you enjoy labs, tools, teardown benches, firmware dumps, half-working prototypes, and following technical rabbit holes until something interesting breaks, this is a genuinely fun role doing serious work.

Key Responsibilities

  • Conduct hands-on vulnerability research across software and hardware systems
  • Perform hardware teardowns, characterisation, and reverse engineering
  • Extract and analyse data from flash memory technologies (NAND, eMMC, SPI)
  • Explore side-channel and fault-injection techniques (timing, voltage glitching, power analysis)
  • Write and modify software or scripts to support testing, analysis, and experimentation
  • Build rapid hardware and software prototypes to explore new attack techniques or concepts
  • Analyse firmware, system behaviour, and network protocols to identify security weaknesses
  • Use lab equipment such as logic analysers and oscilloscopes during investigations
  • Clearly document findings, methodologies, and outcomes for internal stakeholders

Required Experience

  • Practical experience in security research, systems testing, embedded development, or low-level engineering
  • Comfort working across both software and hardware
  • Experience working with embedded devices or extracting data from flash storage
  • Strong hands-on skills, including soldering, desoldering, and lab equipment usage
  • Proficiency in at least one programming language (C, C++, or Python)
  • Good working knowledge of Linux systems and command-line tools
  • A genuinely inquisitive, experimental mindset, you enjoy testing, exploring, and breaking systems

Desirable Experience

  • Reverse engineering using tools such as Ghidra, IDA Pro, or Binary Ninja
  • Firmware analysis or exploit development
  • Embedded software development (ARM Cortex, AVR, MIPS, etc.)
  • Exposure to side-channel or fault-injection techniques (professional or hobbyist)
  • RF, SDR, or mobile communications experience (2G / 4G / 5G)
  • Network protocol analysis or home-lab experimentation

What’s On Offer

  • Β£60,000 base salary
  • Discretionary bonus scheme
  • Excellent pension (up to 10.5% employer contribution)
  • 37-hour working week with early finish Fridays
  • 25 days holiday + public holidays (buy/sell options available)
  • Flexible benefits including healthcare, dental, and cycle-to-work schemes
  • A genuinely interesting, hands-on research environment
  • Long-term technical growth working on real-world, high-impact systems

Vulnerability Researcher - Software & Hardware in Gloucester employer: Secure Consult

Join a dynamic team in Gloucester as a Vulnerability Researcher, where your curiosity and hands-on skills will thrive in a supportive and innovative environment. With a competitive salary of Β£60,000, excellent benefits including a generous pension scheme, and opportunities for long-term technical progression, this role offers a unique chance to engage in meaningful research that impacts real-world systems. Enjoy a flexible work culture with hybrid arrangements and a focus on exploration and experimentation, making it an ideal place for those passionate about cybersecurity.
S

Contact Detail:

Secure Consult Recruiting Team

StudySmarter Expert Advice 🀫

We think this is how you could land Vulnerability Researcher - Software & Hardware in Gloucester

✨Tip Number 1

Get your hands dirty! Dive into practical projects that showcase your skills in vulnerability research. Whether it's tinkering with embedded devices or experimenting with firmware, having real-world examples to discuss will make you stand out.

✨Tip Number 2

Network like a pro! Attend local meetups or online forums related to cybersecurity and hardware hacking. Engaging with the community can lead to valuable connections and insider tips on job openings, plus it shows your passion for the field.

✨Tip Number 3

Prepare for hands-on interviews! Since this role is all about practical skills, be ready to demonstrate your knowledge through live testing or problem-solving scenarios. Brush up on your lab equipment usage and coding skills to impress the interviewers.

✨Tip Number 4

Apply through our website! We love seeing candidates who are genuinely interested in joining our team. Tailor your application to highlight your curiosity-led approach and hands-on experience, and don’t forget to follow up after applying!

We think you need these skills to ace Vulnerability Researcher - Software & Hardware in Gloucester

Vulnerability Research
Hands-On Testing
Exploratory Engineering
Reverse Engineering
Data Extraction from Flash Memory
Side-Channel Techniques
Fault-Injection Techniques
Firmware Analysis
Network Protocol Analysis
Embedded Development
Soldering and Desoldering Skills
Proficiency in C, C++, or Python
Linux Systems Knowledge
Lab Equipment Usage
Documentation Skills

Some tips for your application 🫑

Show Your Curiosity: We want to see your inquisitive side! In your application, highlight any hands-on projects or experiments you've done that showcase your curiosity and problem-solving skills. This role is all about exploring and breaking systems, so let us know how you’ve done that in the past.

Tailor Your Experience: Make sure to tailor your application to reflect the specific skills and experiences mentioned in the job description. If you've worked with embedded devices or have experience in vulnerability research, shout about it! We love seeing relevant experience that aligns with what we’re looking for.

Be Clear and Concise: When writing your application, clarity is key. Use straightforward language and structure your thoughts logically. We appreciate a well-organised application that makes it easy for us to see your qualifications and enthusiasm for the role.

Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team at StudySmarter!

How to prepare for a job interview at Secure Consult

✨Know Your Stuff

Make sure you brush up on your knowledge of both software and hardware security. Familiarise yourself with common vulnerabilities, reverse engineering tools like Ghidra or IDA Pro, and be ready to discuss your hands-on experience with embedded devices. The more you know, the more confident you'll feel!

✨Show Your Curiosity

This role is all about exploration and experimentation, so be prepared to demonstrate your inquisitive mindset. Share examples of past projects where you tested, broke, or probed systems. Highlight your passion for digging deep into technical challenges and how you approach problem-solving.

✨Get Hands-On

Since this position involves practical work, it’s a good idea to bring along any relevant projects or prototypes you've worked on. If you’ve done any firmware analysis or built hardware prototypes, be ready to discuss them in detail. Showing your hands-on skills can really set you apart!

✨Ask Smart Questions

Prepare some insightful questions about the team, the projects they’re working on, and their approach to vulnerability research. This not only shows your interest in the role but also gives you a chance to assess if the company culture aligns with your values and work style.

Vulnerability Researcher - Software & Hardware in Gloucester
Secure Consult
Location: Gloucester

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

S
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>