Vulnerability Engineer - Remote

Vulnerability Engineer - Remote

Full-Time 85000 - 85000 € / year (est.) No home office possible
X

At a Glance

  • Tasks: Hunt critical vulnerabilities and build tools to enhance cybersecurity.
  • Company: Fast-growing cybersecurity scale-up trusted by Fortune 500 companies.
  • Benefits: Competitive salary of £85,000, remote work, and great benefits.
  • Other info: Join a dynamic team with opportunities for growth and innovation.
  • Why this job: Make a real impact in cybersecurity while working with cutting-edge technology.
  • Qualifications: 2+ years in vulnerability research and software engineering skills.

The predicted salary is between 85000 - 85000 € per year.

Are you the right candidate for this opportunity? Join a research-driven, venture-backed cybersecurity scale-up trusted by Fortune 500 enterprises and critical infrastructure providers. Recognised by Gartner, $29M funded, and scaling fast worldwide.

As a Vulnerability Engineer, you’ll sit at the intersection of vulnerability research and software engineering – finding bugs, building tools, and pushing the limits of LLM-powered offensive security workflows.

What you’ll be doing:

  • Hands-on research across 0-days and n-days, with patch diffing on source-available and binary-only targets
  • Building internal tooling for automated vulnerability discovery, exploit validation, and detection
  • Implementing production-grade, LLM-powered research workflows
  • Hunting the vulnerabilities that have real material impact – RCEs, auth bypasses, deserialisation bugs

What they’re looking for:

  • 2+ years of hands-on vulnerability research experience
  • Familiarity with n-day reproduction and patch diffing
  • Exposure to both web and binary vulnerability classes
  • Software engineering experience, ideally in Python
  • Comfort with Burp Suite, Ghidra/IDA, debuggers, fuzzers
  • Genuine interest in using LLMs to accelerate security workflows

Remote working/work at home options are available for this role.

Vulnerability Engineer - Remote employer: Xact Placements Limited

Join a dynamic and innovative cybersecurity scale-up that prioritises employee growth and development in a fully remote environment. With competitive salaries, a strong focus on research-driven projects, and the opportunity to work with cutting-edge technology, this company fosters a collaborative culture where your contributions directly impact the security landscape. Enjoy the flexibility of remote work while being part of a team recognised for its excellence and trusted by Fortune 500 companies.

X

Contact Detail:

Xact Placements Limited Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land Vulnerability Engineer - Remote

Tip Number 1

Network like a pro! Reach out to folks in the cybersecurity community on LinkedIn or Twitter. Join relevant groups and forums where you can share insights and learn from others. You never know who might have a lead on your dream job!

Tip Number 2

Show off your skills! Create a portfolio showcasing your vulnerability research projects or any tools you've built. This is your chance to demonstrate your hands-on experience and passion for the field, making you stand out to potential employers.

Tip Number 3

Prepare for those interviews! Brush up on common vulnerability engineering questions and be ready to discuss your past experiences. Practising with a friend or using mock interview platforms can help you feel more confident when it’s time to shine.

Tip Number 4

Don’t forget to apply through our website! We’ve got loads of exciting opportunities, and applying directly can sometimes give you an edge. Plus, it shows you’re genuinely interested in joining our team at StudySmarter!

We think you need these skills to ace Vulnerability Engineer - Remote

Vulnerability Research
Patch Diffing
Automated Vulnerability Discovery
Exploit Validation
LLM-Powered Workflows
RCEs (Remote Code Execution)
Auth Bypass

Some tips for your application 🫡

Tailor Your CV:Make sure your CV highlights your relevant experience in vulnerability research and software engineering. We want to see how your skills align with the role, so don’t be shy about showcasing your hands-on experience with tools like Burp Suite and Ghidra!

Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you’re passionate about cybersecurity and how your background makes you a perfect fit for our team. We love seeing genuine enthusiasm for the role and the industry.

Showcase Your Projects:If you've worked on any interesting projects or have personal work that demonstrates your skills, include them! We appreciate candidates who can show us their hands-on experience with vulnerability hunting and tool building.

Apply Through Our Website:We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it gives you a chance to explore more about what we do at StudySmarter!

How to prepare for a job interview at Xact Placements Limited

Know Your Vulnerabilities

Make sure you brush up on the latest vulnerabilities, especially RCEs and auth bypasses. Familiarise yourself with recent exploits and how they were discovered. This will show your passion for the field and your commitment to staying updated.

Showcase Your Tools

Be prepared to discuss your experience with tools like Burp Suite, Ghidra, and any debuggers or fuzzers you've used. Bring examples of how you've applied these tools in real scenarios, as this will demonstrate your hands-on experience and technical skills.

Demonstrate Your Research Skills

Since the role involves vulnerability research, be ready to talk about your approach to finding and validating vulnerabilities. Share specific examples of past projects where you successfully identified and addressed security issues.

Express Your Interest in LLMs

Given the emphasis on LLM-powered workflows, make sure to express your genuine interest in using machine learning to enhance security processes. Discuss any relevant experience or ideas you have about integrating LLMs into vulnerability research.