Operational Cyber Researcher - Gloucester - National Security West
Role details
Job location
Tech stack
Job description
We are looking for Junior Researchers & Vulnerability Researchers who are passionate about security research and want to develop deep technical expertise in vulnerability discovery, reverse engineering, and low-level software analysis. Whether your experience comes from university projects, CTFs, personal research, or early industry experience, you will benefit from training, mentorship and support from experienced researchers across the team., * Technical delivery: support and conduct research tasks, varying from vulnerability research and reverse engineering to IoT device teardowns.
- Collaboration: work closely with experienced researchers and contribute to team deliveries in the form of proof-of-concept solutions, research reports, or tooling.
- Adaptability: operate across a range of tools, languages, and platforms. Learn new tooling quickly or help develop bespoke tools where needed.
- Customer focus: understand the mission-critical needs of our customers and help deliver in line with those requirements.
Requirements
-
Strong interest in vulnerability research or security research, that can be demonstrated, for example, through university coursework, CTF participation, personal research projects, or reading & experimenting with current published research.
-
Low-level programming skills, especially C/C++ (or Rust), with evidence you can:
- write, debug, and test low-level code,
- reason about memory and behaviour,
- work confidently with pointers/structs/buffers.
- Comfortable working with, reviewing, and building large codebases, including understanding unfamiliar systems from scratch.
- Clear technical communication to both technical and non-technical audiences.
Nice to have
- Experience using software reverse engineering tools (e.g. Ghidra, IDA Pro).
- Knowledge of exploitation techniques and mitigations.
- Familiarity with common computing topics: Linux usage, networking fundamentals, scripting.
- Scripting and tooling languages such as Python or Bash.
- Understanding of assembly, e.g. ARMv7, ARMv8, MIPS, or x86/x64.
- Awareness of Android, iOS, or Linux internals.
- Exposure to fuzzing or user-mode emulation.
- Knowledge of current cryptography practices, such as public/private key systems.
- Mobile application development or reverse engineering experience (Android, iOS)., Please be aware that this role is subject to security restrictions. We do not expect you to have a security clearance before applying, but you will need to be eligible to work in the UK, and be able to successfully achieve an eDV UK security clearance. For more details see https://www.gov.uk/government/publications/united-kingdom-security-vetting-clearance-levels/edv-guidance-pack-for-applicants. Our recruiters are happy to explain the process.
Benefits & conditions
- By joining the Operational Cyber Group, you will be addressing the most critical cyber needs of governments and businesses across the globe, with a meaningful and tangible impact on UK National Security.
- Work-life balance is important to us: we can offer a variety of hours to suit individual needs, such as part-time or flexible working, along with a minimum of 25 days of holiday per year.
- Our flexible benefits package includes private medical and dental insurance, a competitive pension scheme, cycle to work scheme, childcare vouchers, discount cards and more.
- We are a supportive, inclusive and friendly team, committed to helping each other learn and succeed. We have a number of Diversity and Support groups which cover everything from gender diversity to mental health and wellbeing.
- With clear career progression pathways, mentorship, as well as ongoing training throughout your career, you can feel confident that your aptitude will be rewarded.