Vulnerability Engineer - Offensive Security & Research

UNITY Systems
Liverpool, United Kingdom
2 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Intermediate

Job location

Remote
Liverpool, United Kingdom

Tech stack

Artificial Intelligence
Burp Suite
Static Program Analysis
Code Review
Software Debugging
Fuzz Testing
Intrusion Detection and Prevention
Python
Automation of Marketing
Red Team (Cyber Security)
Reverse Engineering
Software Engineering
Large Language Models
Software Security
Cyber Threat Analysis
IDA Pro
Software Coding
Security Orchestration, Automation & Response
Vulnerability Analysis

Job description

  • Conduct advanced vulnerability research across 0-day and n-day exposures
  • Perform patch diffing, reverse engineering, and exploit analysis on source-available and binary-only targets
  • Develop and maintain Python-based offensive security tooling
  • Build automated workflows for exploit validation, vulnerability discovery, and detection signature generation
  • Leverage AI/LLM-powered tooling to accelerate triage, code review, analysis, and research operations
  • Research and validate high-impact vulnerabilities including RCE, deserialization flaws, authentication bypasses, and memory corruption issues
  • Utilise industry-standard offensive tooling including Burp Suite, Ghidra, IDA Pro, debuggers, and fuzzers
  • Collaborate with offensive security and engineering teams to improve detection and remediation capabilities
  • Present original research findings to the global cybersecurity community at leading conferences and industry events

Requirements

  • 2+ years of hands-on experience in vulnerability research, exploit analysis, or offensive security engineering
  • Strong understanding of n-day reproduction, patch diffing, and vulnerability validation
  • Experience with reverse engineering, binary analysis, and debugging techniques
  • Solid programming and software engineering skills with a strong focus on Python
  • Practical knowledge of web and binary exploitation techniques
  • Hands-on experience with tools such as Burp Suite, Ghidra, IDA Pro, fuzzers, and debuggers
  • Understanding of common vulnerability classes including RCE, SSRF, deserialization, authentication bypass, and memory corruption
  • Exposure to AI/LLM applications in cybersecurity, automation, or code analysis
  • Ability to thrive in a fast-paced, high-growth, startup environment with strong ownership and execution mindset

Desirable Experience

  • Experience developing offensive security automation platforms
  • Knowledge of exploit development and detection engineering
  • Familiarity with cloud, enterprise, or large-scale attack surfaces
  • Contributions to the cybersecurity community through research, blogs, tooling, or conference presentations

Vulnerability Research, Offensive Security, Exploit Development, Reverse Engineering, Patch Diffing, Python, Ghidra, IDA Pro, Burp Suite, Binary Analysis, Detection Engineering, AI Security, LLM Security, Fuzzing, Red Team, Application Security, Threat Research, RCE, Security Automation, Cybersecurity Engineering

About the company

A rapidly growing, venture-backed cybersecurity company at the forefront of Pre-Emptive Exposure Management is expanding its global Offensive Security and Vulnerability Research function. This is an opportunity to join an elite team focused on discovering, validating, and operationalising high-impact vulnerabilities before threat actors can exploit them. The organisation combines advanced vulnerability research, offensive security engineering, AI-driven automation, and scalable detection tooling to secure enterprise environments worldwide.

Apply for this position