← Back to jobs

Exploit Developer

Cheltenham

Role Summary

As a Senior Exploit Developer at VulnCheck, you will reverse engineer software to analyze vulnerabilities and create original exploits for initial access vulnerabilities. You will work alongside a team of top domain experts, influencing how vulnerabilities are classified and remediated across the cybersecurity industry. This role is focused on high-impact projects that enhance vulnerability management for enterprise clients.

Benefits & Culture

This position offers 100% remote work, primarily targeting candidates in Cheltenham, UK. VulnCheck fosters a supportive environment that encourages intellectual curiosity and personal growth, providing opportunities for collaboration on cutting-edge threat intelligence initiatives. The company values innovation and offers a chance to shape industry standards, contributing to career advancement in a dynamic field.

Full Job Description

Company Overview VulnCheck delivers next-generation exploit and vulnerability intelligence solutions for enterprise, Government and product teams to prevent large-scale remote code execution events with better, faster exploit data, massive-scale real-time monitoring and predictively-built detection artifacts. VulnCheck’s 300M+ unique data from 400+ sources points help vulnerability management and response teams outpace adversaries - autonomously. VulnCheck is an RSAC Innovation Sandbox finalist and a Black Hat Startup Spotlight finalist.    Job Summary VulnCheck is looking for a Senior Exploit Developer with a background in reverse engineering & exploit development. This role is a Senior level position. Location This is a 100% remote role but we're primarily looking for candidates in Cheltenham, United Kingdom. Why Join VulnCheck? VulnCheck stands behind its mission to influence how organizations worldwide understand, assess, and remediate security vulnerabilities - and to deliver intelligence-based solutions that change the world.  You’ll be joining a collaborative, supportive environment that values intellectual curiosity, technical mastery, and personal growth. (And more - below)  Leverage your expertise: Work on cutting-edge threat intelligence initiatives that matter, alongside the top domain experts in the field. Shape the industry: Influence how vulnerabilities are classified, scored, mapped, and remediated at scale for enterprise customers and for the entire cybersecurity industry. Grow your impact: Collaborate with global partners, lead high-visibility projects, and drive standards across the security community. Innovate and explore: Conduct research and develop tools for automating and improving vulnerability enrichment and mapping. Key Responsibilities Reverse engineering software to discover the root cause analysis (RCA) of vulnerabilities. Authoring original software exploits for initial access vulnerabilities, when little or no publicly-available proof of concept code for exploiting such vulnerabilities exists. Implementing detections (such as Suricata & Snort signatures, YARA rules, etc.) for identifying such initial access vulnerabilities. Please mention the word **FLEXIBILITY** and tag RMTguMjA2Ljg5LjEyMQ== when applying to show you read the job post completely (#RMTguMjA2Ljg5LjEyMQ==). This is a beta feature to avoid spam applicants. Companies can search these words to find applicants that read this and see they're human.