Vulnerability Engineer - Offensive Security & Research
UNITY Systems
Liverpool, United Kingdom
2 days ago
Role details
Contract type
Permanent contract Employment type
Full-time (> 32 hours) Working hours
Regular working hours Languages
English Experience level
IntermediateJob location
Remote
Liverpool, United Kingdom
Tech stack
Artificial Intelligence
Burp Suite
Static Program Analysis
Code Review
Software Debugging
Fuzz Testing
Intrusion Detection and Prevention
Python
Automation of Marketing
Red Team (Cyber Security)
Reverse Engineering
Software Engineering
Large Language Models
Software Security
Cyber Threat Analysis
IDA Pro
Software Coding
Security Orchestration, Automation & Response
Vulnerability Analysis
Job description
- Conduct advanced vulnerability research across 0-day and n-day exposures
- Perform patch diffing, reverse engineering, and exploit analysis on source-available and binary-only targets
- Develop and maintain Python-based offensive security tooling
- Build automated workflows for exploit validation, vulnerability discovery, and detection signature generation
- Leverage AI/LLM-powered tooling to accelerate triage, code review, analysis, and research operations
- Research and validate high-impact vulnerabilities including RCE, deserialization flaws, authentication bypasses, and memory corruption issues
- Utilise industry-standard offensive tooling including Burp Suite, Ghidra, IDA Pro, debuggers, and fuzzers
- Collaborate with offensive security and engineering teams to improve detection and remediation capabilities
- Present original research findings to the global cybersecurity community at leading conferences and industry events
Requirements
- 2+ years of hands-on experience in vulnerability research, exploit analysis, or offensive security engineering
- Strong understanding of n-day reproduction, patch diffing, and vulnerability validation
- Experience with reverse engineering, binary analysis, and debugging techniques
- Solid programming and software engineering skills with a strong focus on Python
- Practical knowledge of web and binary exploitation techniques
- Hands-on experience with tools such as Burp Suite, Ghidra, IDA Pro, fuzzers, and debuggers
- Understanding of common vulnerability classes including RCE, SSRF, deserialization, authentication bypass, and memory corruption
- Exposure to AI/LLM applications in cybersecurity, automation, or code analysis
- Ability to thrive in a fast-paced, high-growth, startup environment with strong ownership and execution mindset
Desirable Experience
- Experience developing offensive security automation platforms
- Knowledge of exploit development and detection engineering
- Familiarity with cloud, enterprise, or large-scale attack surfaces
- Contributions to the cybersecurity community through research, blogs, tooling, or conference presentations
Vulnerability Research, Offensive Security, Exploit Development, Reverse Engineering, Patch Diffing, Python, Ghidra, IDA Pro, Burp Suite, Binary Analysis, Detection Engineering, AI Security, LLM Security, Fuzzing, Red Team, Application Security, Threat Research, RCE, Security Automation, Cybersecurity Engineering
About the company
A rapidly growing, venture-backed cybersecurity company at the forefront of Pre-Emptive Exposure Management is expanding its global Offensive Security and Vulnerability Research function. This is an opportunity to join an elite team focused on discovering, validating, and operationalising high-impact vulnerabilities before threat actors can exploit them.
The organisation combines advanced vulnerability research, offensive security engineering, AI-driven automation, and scalable detection tooling to secure enterprise environments worldwide.