Enable job alerts via email!

Vulnerability Researcher

iO Associates

England

On-site

GBP 45,000 - 70,000

Full time

Today
Be an early applicant

Job summary

A leading cyber security firm in the United Kingdom is looking for a Vulnerability Researcher to support advanced research and development initiatives. The ideal candidate should conduct thorough hardware analyses and collaborate with cross-functional teams. Skills in programming (C, C++, Python) and hardware prototyping are essential. Eligibility for DV clearance is mandatory. This role provides a challenging environment with opportunities for innovation.

Qualifications

  • Must be eligible for or hold DV clearance.
  • Experience in hardware analysis.
  • Good working knowledge of Linux-based systems.

Responsibilities

  • Conduct hardware teardowns and reverse engineering.
  • Extract data from flash memory.
  • Collaborate with multidisciplinary teams.
  • Document findings for stakeholders.

Skills

Hardware development and prototyping
Experience extracting data from flash storage ICs
Familiarity with logic analysers
Proficiency in C, C++, or Python
Analytical and problem-solving capabilities

Tools

IDA Pro
Ghidra
Binary Ninja
Job description
Vulnerability Researcher

Job Title: Vulnerability Researcher

Location: United Kingdom

Employment: Full-Time

Start Date: ASAP

Clearance: DV/eDV

Job Summary

Our Defence Cyber Research Group (CRG) is seeking a technically proficient and analytically minded Vulnerability Researcher with experience in hardware analysis to support advanced research and development activities.

As Vulnerability Researcher, you will conduct in-depth technical investigations, developing prototypes, and contributing to the discovery and analysis of emerging threats and vulnerabilities.

You must be eligible for or already hold DV clearance.

Key Responsibilities
  • Hardware teardowns, characterisations and reverse engineering.
  • Extract and recover data from flash memory including NAND, eMMC and SPI.
  • Conduct side channel attacks such as timing attacks, voltage glitching and power analysis.
  • Design and implement hardware/software rapid prototypes to explore novel cyber capabilities and concepts.
  • Analyse network protocols and system behaviours to identify potential security weaknesses.
  • Collaborate with multidisciplinary teams to deliver technical solutions and research outcomes.
  • Document findings and methodologies in a clear and structured manner for internal and external stakeholders.
Essential Skills and Experience
  • Hardware development and prototyping, including PCB design and micro-controller programming.
  • Experience extracting data from flash storage ICs.
  • Familiarity with logic analysers and oscilloscopes.
  • Advanced soldering and desoldering experience.
  • Basic understanding of side channel attack techniques. (experience not required)
  • Proficiency in at least one programming language such as C, C++, or Python.
  • Good working knowledge of Linux-based systems, including command-line tools and system configuration.
  • Demonstrated analytical and problem-solving capabilities, with a methodical and inquisitive approach to technical challenges.
  • Eligible for or hold active DV clearance.
Desirable Experience
  • Reverse engineering using tools such as IDA Pro, Ghidra, or Binary Ninja.
  • Vulnerability research, including exploit development and mitigation bypass techniques.
  • Embedded software development for platforms such as ARM Cortex, AVR, or MIPS.
  • Experience with Radio Frequency (RF) systems, Software Defined Radios (SDRs), 2G/4G/5G, including tools like GNU Radio, Osmocom, srsRAN or USRP.
  • Network engineering experience either home lab or professional.
Next Steps
  • If interested, send your most recent CV to: so that we can speak in more detail.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.