At a Glance
- Tasks: Hunt vulnerabilities, engineer automated tools, and innovate in offensive security.
- Company: Join a multi-award-winning organisation leading in pre-emptive exposure management.
- Benefits: Up to £85,000 salary, bonuses, shares, and fully remote work.
- Other info: Embrace diversity and grow in a dynamic, fast-paced environment.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
- Qualifications: 2+ years in vulnerability research, strong Python skills, and a passion for automation.
The predicted salary is between 75000 - 85000 £ per year.
Up to £85,000 (Dependent on Experience) + Bonus + Shares + Staff Benefits
Fully Remote (UK)
SECURE has strategically partnered with a multi-award-winning, platform-based organisation at the forefront of pre-emptive exposure management. As a market leader backed by significant venture funding, they are expanding their offensive security capabilities, specifically by scaling an elite vulnerability research & engineering function across the globe.
Role Overview:
Step in as a hybrid threat hunter & tooling engineer. You will own the lifecycle from discovery to detection, conducting 0-Day / N-Day research whilst engineering the Python & LLM-powered tooling that automates exploit validation across global attack surfaces. By targeting critical, high-impact weaknesses, you ensure their clients neutralise vulnerabilities before adversaries strike.
Who Should Apply:
- The Hybrid Threat Hunter: You have a solid foundation reproducing N-Days & diffing patches, but you don't just want to write a report and throw a PoC over the wall. You want to write the code that automates the detection.
- The Automation-Obsessed Researcher: You know your way around Ghidra, Burp & Python, and you are actively experimenting with how AI & LLMs can exponentially speed up your triage, code review & exploit validation.
Skills & Experience of Vulnerability Engineer would include:
- Vulnerability Research (2+ Years): Practical real-world experience reproducing N-Days & performing patch diffing. You have a solid foundation and are ready to go much deeper.
- Web & Binary Fundamentals: Fluidity across vulnerability classes. You understand what a deserialization bug looks like and you aren't afraid of dropping into a debugger.
- Software Engineering: Proven prior experience writing & maintaining code, with a heavy emphasis on Python.
- Offensive Tooling: Hands-on exposure to the core ecosystem: Burp Suite, Ghidra / IDA, debuggers & fuzzers.
- AI / LLM Experimentation: Genuine interest and practical experimentation using LLMs for code review, triage or analysis, with a clear-eyed view of where they excel and where they fall short.
- Start-Up / Scale-Up Execution: A proactive, ownership-driven mindset capable of navigating ambiguity and fast-changing priorities within a high-growth, early-stage environment.
Responsibilities of Vulnerability Cyber Engineer:
- Hunt: Conduct relentless security research across both 0-Days & N-Days, reverse-engineering patches & performing analysis via patch diffing on source-available & binary-only targets.
- Engineer: Build & maintain robust internal tooling for automated vulnerability discovery, exploit validation & scalable detection signature generation.
- Innovate: Implement production-grade LLM-powered workflows that push the boundaries of offensive security and exponentially accelerate research output.
- Target: Focus exclusively on critical, high-impact weaknesses that matter (e.g. remote code execution) rather than generating low-level informational noise (e.g. weak SSL ciphers).
- Evangelize: Present your original research to the global cyber security community at top-tier conferences, fully supported and sponsored by the business.
At SECURE, we value attitude and aptitude over certifications. If you possess the drive and relevant experience to deliver tangible results aligned with our clients' needs, reach out. We embrace DE&I and welcome applications from underrepresented groups, minorities, women in cybersecurity, neurodiverse individuals, LGBTQ+ community members, veterans, and those from diverse socioeconomic backgrounds.
VULNERABILITY CYBER ENGINEER employer: Secure Recruitment LTD
Contact Detail:
Secure Recruitment LTD Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land VULNERABILITY CYBER ENGINEER
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the cybersecurity scene. Attend meetups, webinars, or even online forums. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your vulnerability research projects or any cool tools you've built. This is your chance to demonstrate your expertise in Python, Ghidra, and all that jazz. A strong portfolio can really set you apart from the crowd.
✨Tip Number 3
Prepare for those interviews! Brush up on your technical knowledge and be ready to discuss your experience with N-Days and patch diffing. Practice common interview questions and think about how you can showcase your passion for offensive security and automation.
✨Tip Number 4
Don't forget to apply through our website! We love seeing applications directly from candidates who are excited about joining our team. Plus, it gives us a chance to see your enthusiasm for the role right from the start!
We think you need these skills to ace VULNERABILITY CYBER ENGINEER
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the skills and experience mentioned in the job description. Highlight your vulnerability research, Python coding, and any relevant tooling experience. We want to see how you fit into our world!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for vulnerability management and how your background aligns with our mission. Let us know why you're excited about this role and what you can bring to the table.
Showcase Your Projects: If you've worked on any relevant projects or have experience with tools like Ghidra or Burp, make sure to mention them. We love seeing practical examples of your work and how you've tackled challenges in the past.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures it gets into the right hands. Plus, it shows you're keen on joining our team!
How to prepare for a job interview at Secure Recruitment LTD
✨Know Your Tools Inside Out
Make sure you’re well-versed in the tools mentioned in the job description, like Ghidra, Burp Suite, and Python. Familiarise yourself with their functionalities and be ready to discuss how you've used them in your previous roles or projects.
✨Showcase Your Research Skills
Prepare to talk about your experience with vulnerability research, especially around N-Days and patch diffing. Bring examples of your work that demonstrate your ability to identify and exploit vulnerabilities, and be ready to explain your thought process.
✨Demonstrate Your Automation Passion
Since the role emphasises automation, think of specific instances where you’ve automated processes or built tooling. Be prepared to discuss how you’ve integrated AI or LLMs into your workflow and the impact it had on your research output.
✨Emphasise Your Problem-Solving Mindset
This position requires navigating ambiguity and fast-changing priorities. Share examples of how you’ve tackled complex problems in high-pressure situations, showcasing your proactive approach and ownership-driven mindset.