Advanced Cyber Security Research Scientist

  • Location

    Nuneaton, Warwickshire

  • Sector:


  • Job disciplines:


  • Salary:


  • Contact:

    Chiara Caterisano

  • Contact email:

  • Salary high:


  • Salary low:


  • Job ref:


  • Published:

    11 months ago

  • Expiry date:


  • Consultant:


Our Client is a world-class, independent engineering consultancy operating in multiple locations
around the world who supports vehicle manufacturers and their supply chain with cutting-edge
engineering and testing expertise. Based in the Midlands, they are now looking for an Advanced Cyber Security Research Scientist.

Main Purpose of Job

  • Research and consultancy in cyber security analysis including systemic security testing
  • Research and consultancy in automotive digital forensics

Key Functions

  • Developing research proposals which will make a significant impact on the field
  • Undertaking research to build capability and develop new consultancy offerings
  • Making presentations at national and international conferences
  • Close liaison with partner universities and mentoring of PhD students
  • Integrating know-how from research in to new training and consultancy offerings
  • Executing structured attacks on cyber physical systems within a white-hat laboratory
  • Executing attacks in the lab, the workshop and on the proving ground
  • Code analysis (reverse engineering binary code)
  • Supporting team growth through coaching and training
  • Developing and delivering training for internal/external delivery
  • Winning and delivering consultancy projects in automotive digital forensics

You will be/have

  • Good first degree (minimum 2:1) in electrical/electronic engineering, IT system, computer sciences or other relevant related discipline
  • Relevant PhD
  • Experience in some combination of: Commercial-off-the-shelf embedded operating systems (embedded Windows, Linux, QNX, Android, IOS..); WiFi and Ethernet networks: monitoring and attacking; Bluetooth, NFC or other wireless networks: monitoring and attacking; USB subsystems and manipulation; Commonplace tools such as SDR; Threat modelling; Attack trees; Frameworks such as Metasploit; Software attacks such as SQL injection
  • The candidate must have strong experience in orchestrating structured attacks and recording data in a systematic way.
Linkedin_tracking _code