At a Glance
- Tasks: Dive into hands-on vulnerability research across software and hardware systems.
- Company: Join a leading cyber research team in Gloucester with a focus on innovation.
- Benefits: Enjoy a Β£60,000 salary, bonuses, flexible benefits, and 25 days holiday.
- Why this job: Explore and experiment with cutting-edge technology while making a real impact.
- Qualifications: Experience in security research, embedded development, and proficiency in programming.
- Other info: Work in a dynamic environment with excellent long-term technical growth opportunities.
The predicted salary is between 48000 - 72000 Β£ per year.
Vulnerability Researcher β Software & Hardware (Cyber Research | Hands-On Testing | Exploratory Engineering)
Location: Gloucester, UK β MUST be local or willing to commute
Salary: Β£60,000 base salary + Bonus + benefits + long-term technical progression
Full-time, permanent | 37 hours per week | Hybrid (3 days per week on site)
Location & Eligibility β Please Read Carefully
- This role is based in Gloucester and requires regular on-site work (3 days per week).
- Applicants must already be based locally or willing to commute reliably.
- Applicants must have valid UK work eligibility. Visa sponsorship is not available.
Security Clearance
Due to the nature of the work, candidates must be eligible for UK Security Check (SC) clearance. This typically requires British citizenship and continuous UK residency for the past 5 years.
Overview
We are recruiting a Vulnerability Researcher to join a specialist research team working across both software and hardware security in a secure engineering environment. This is a practical, exploratory research role. You will spend your time testing, breaking, probing, and experimenting with real systems, from embedded devices and firmware to software behaviour and protocols. This is not a compliance, audit, or checkbox-driven role. The focus is on curiosity-led investigation, rapid experimentation, and understanding how and why systems fail.
If you enjoy labs, tools, teardown benches, firmware dumps, half-working prototypes, and following technical rabbit holes until something interesting breaks, this is a genuinely fun role doing serious work.
Key Responsibilities
- Conduct hands-on vulnerability research across software and hardware systems
- Perform hardware teardowns, characterisation, and reverse engineering
- Extract and analyse data from flash memory technologies (NAND, eMMC, SPI)
- Explore side-channel and fault-injection techniques (timing, voltage glitching, power analysis)
- Write and modify software or scripts to support testing, analysis, and experimentation
- Build rapid hardware and software prototypes to explore new attack techniques or concepts
- Analyse firmware, system behaviour, and network protocols to identify security weaknesses
- Use lab equipment such as logic analysers and oscilloscopes during investigations
- Clearly document findings, methodologies, and outcomes for internal stakeholders
Required Experience
- Practical experience in security research, systems testing, embedded development, or low-level engineering
- Comfort working across both software and hardware
- Experience working with embedded devices or extracting data from flash storage
- Strong hands-on skills, including soldering, desoldering, and lab equipment usage
- Proficiency in at least one programming language (C, C++, or Python)
- Good working knowledge of Linux systems and command-line tools
- A genuinely inquisitive, experimental mindset, you enjoy testing, exploring, and breaking systems
Desirable Experience
- Reverse engineering using tools such as Ghidra, IDA Pro, or Binary Ninja
- Firmware analysis or exploit development
- Embedded software development (ARM Cortex, AVR, MIPS, etc.)
- Exposure to side-channel or fault-injection techniques (professional or hobbyist)
- RF, SDR, or mobile communications experience (2G / 4G / 5G)
- Network protocol analysis or home-lab experimentation
Whatβs On Offer
- Β£60,000 base salary
- Discretionary bonus scheme
- Excellent pension (up to 10.5% employer contribution)
- 37-hour working week with early finish Fridays
- 25 days holiday + public holidays (buy/sell options available)
- Flexible benefits including healthcare, dental, and cycle-to-work schemes
- A genuinely interesting, hands-on research environment
- Long-term technical growth working on real-world, high-impact systems
Vulnerability Researcher - Software & Hardware in Gloucester employer: Secure Consult
Contact Detail:
Secure Consult Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Vulnerability Researcher - Software & Hardware in Gloucester
β¨Tip Number 1
Get your hands dirty! Dive into practical projects that showcase your skills in vulnerability research. Whether it's tinkering with embedded devices or experimenting with firmware, having real-world examples to discuss will make you stand out.
β¨Tip Number 2
Network like a pro! Attend local meetups or online forums related to cybersecurity and hardware hacking. Engaging with the community can lead to valuable connections and insider tips on job openings, plus it shows your passion for the field.
β¨Tip Number 3
Prepare for hands-on interviews! Since this role is all about practical skills, be ready to demonstrate your knowledge through live testing or problem-solving scenarios. Brush up on your lab equipment usage and coding skills to impress the interviewers.
β¨Tip Number 4
Apply through our website! We love seeing candidates who are genuinely interested in joining our team. Tailor your application to highlight your curiosity-led approach and hands-on experience, and donβt forget to follow up after applying!
We think you need these skills to ace Vulnerability Researcher - Software & Hardware in Gloucester
Some tips for your application π«‘
Show Your Curiosity: We want to see your inquisitive side! In your application, highlight any hands-on projects or experiments you've done that showcase your curiosity and problem-solving skills. This role is all about exploring and breaking systems, so let us know how youβve done that in the past.
Tailor Your Experience: Make sure to tailor your application to reflect the specific skills and experiences mentioned in the job description. If you've worked with embedded devices or have experience in vulnerability research, shout about it! We love seeing relevant experience that aligns with what weβre looking for.
Be Clear and Concise: When writing your application, clarity is key. Use straightforward language and structure your thoughts logically. We appreciate a well-organised application that makes it easy for us to see your qualifications and enthusiasm for the role.
Apply Through Our Website: Donβt forget to apply through our website! Itβs the best way for us to receive your application and ensures youβre considered for the role. Plus, it shows youβre keen on joining our team at StudySmarter!
How to prepare for a job interview at Secure Consult
β¨Know Your Stuff
Make sure you brush up on your knowledge of both software and hardware security. Familiarise yourself with common vulnerabilities, reverse engineering tools like Ghidra or IDA Pro, and be ready to discuss your hands-on experience with embedded devices. The more you know, the more confident you'll feel!
β¨Show Your Curiosity
This role is all about exploration and experimentation, so be prepared to demonstrate your inquisitive mindset. Share examples of past projects where you tested, broke, or probed systems. Highlight your passion for digging deep into technical challenges and how you approach problem-solving.
β¨Get Hands-On
Since this position involves practical work, itβs a good idea to bring along any relevant projects or prototypes you've worked on. If youβve done any firmware analysis or built hardware prototypes, be ready to discuss them in detail. Showing your hands-on skills can really set you apart!
β¨Ask Smart Questions
Prepare some insightful questions about the team, the projects theyβre working on, and their approach to vulnerability research. This not only shows your interest in the role but also gives you a chance to assess if the company culture aligns with your values and work style.