At a Glance
- Tasks: Lead vulnerability research and develop cutting-edge security tools in a fast-paced environment.
- Company: Join a high-growth cybersecurity scale-up trusted by Fortune 500 companies.
- Benefits: Competitive salary up to £110,000, fully remote work, and great benefits.
- Other info: Dynamic team with opportunities for professional growth and innovation.
- Why this job: Make a real impact in cybersecurity by discovering critical vulnerabilities.
- Qualifications: 5+ years in vulnerability research and software engineering with a track record of 0-day discoveries.
The predicted salary is between 110000 - 110000 £ per year.
Got a track record of 0-day discoveries, public CVEs, and a reputation for finding bugs that actually move the needle? Join a research-driven, venture-backed cybersecurity scale-up trusted by Fortune 500 enterprises and critical infrastructure providers. Recognised by Gartner, $29M funded, and scaling fast worldwide.
As a Principal Vulnerability Engineer, you'll own the full vulnerability lifecycle – from discovery, through detection, to deployment – building production-grade tooling and pioneering LLM-powered offensive security workflows.
What you'll be doing:
- Leading deep research across 0-days and n-days, with patch diffing across source-available and binary-only targets
- Designing tooling for automated vulnerability discovery, exploit validation, and detection signature generation
- Architecting production-grade, LLM-powered research workflows
- Focusing on the vulnerabilities that matter – RCEs, auth bypasses, the bugs that change a client's risk posture overnight
What they're looking for:
- 5+ years of mixed vulnerability research and software engineering experience
- A demonstrable track record of original 0-day discovery – public advisories, CVEs, or equivalent
- Deep n-day research and patch diffing chops
- Confidence across both web and binary vulnerability classes
- Production-grade software engineering experience, ideally in Python
- Mastery of Burp Suite, Ghidra/IDA, debuggers, fuzzers
- Hands-on experience using LLMs in research workflows
Principal Vulnerability Engineer in London employer: Xact Placements Limited
Contact Detail:
Xact Placements Limited Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Principal Vulnerability Engineer in London
✨Tip Number 1
Network like a pro! Reach out to folks in the cybersecurity space, especially those who work at companies you're interested in. A friendly chat can open doors and give you insider info that could help you stand out.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repo showcasing your vulnerability research projects. This is your chance to demonstrate your expertise in 0-days and n-days, and it’ll make you memorable to hiring managers.
✨Tip Number 3
Prepare for technical interviews by brushing up on your knowledge of tools like Burp Suite and Ghidra. Practice explaining your past projects and how you tackled complex vulnerabilities – this will show you know your stuff!
✨Tip Number 4
Don’t forget to apply through our website! We’re always on the lookout for talented individuals like you. Plus, it’s a great way to ensure your application gets the attention it deserves.
We think you need these skills to ace Principal Vulnerability Engineer in London
Some tips for your application 🫡
Show Off Your Experience: When you're writing your application, make sure to highlight your 5+ years of experience in vulnerability research and software engineering. We want to see those impressive 0-day discoveries and public CVEs you've worked on, so don't hold back!
Tailor Your Application: Make your application stand out by tailoring it to the role. Use keywords from the job description, like 'automated vulnerability discovery' and 'production-grade tooling'. This shows us you understand what we're looking for and how you fit into our team.
Be Clear and Concise: Keep your application clear and to the point. We appreciate a well-structured application that gets straight to the facts. Avoid fluff and focus on your skills and achievements that are relevant to the Principal Vulnerability Engineer role.
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It helps us keep track of applications and ensures you’re considered for this exciting opportunity in our fast-growing cybersecurity scale-up!
How to prepare for a job interview at Xact Placements Limited
✨Know Your Stuff
Make sure you brush up on your knowledge of 0-days, n-days, and the tools mentioned in the job description. Be ready to discuss your past experiences with vulnerability research and how you've contributed to significant discoveries. This is your chance to showcase your expertise!
✨Showcase Your Projects
Prepare to talk about specific projects where you've designed tooling for automated vulnerability discovery or worked on LLM-powered workflows. Bring examples that highlight your production-grade software engineering skills, especially in Python. Real-world applications will impress them!
✨Understand Their Needs
Research the company and understand their focus on vulnerabilities that matter, like RCEs and auth bypasses. Tailor your answers to show how your skills can directly impact their risk posture. This shows you're not just a fit for the role, but also genuinely interested in their mission.
✨Ask Smart Questions
Prepare insightful questions about their current challenges in vulnerability management or their approach to using LLMs in research workflows. This demonstrates your enthusiasm for the role and helps you gauge if the company aligns with your career goals.