National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Senior Security Software Engineer

JR United Kingdom
Exeter
4 days ago
Create job alert

Social network you want to login/join with:
Senior Security Software Engineer, exeter col-narrow-left
Client: Keysight Technologies
Location: exeter, United Kingdom
Job Category: Other
-
EU work permit required: Yes
col-narrow-right
Job Views: 7
Posted: 06.06.2025
Expiry Date: 21.07.2025
col-wide
Job Description: About the Role
Keysight is looking to hire a senior security software engineer to develop automated program analysis and fuzz testing capabilities for our security assessment products. The successful candidate will be key in designing and implementing novel and scalable tools for automated software composition analysis and vulnerability discovery in firmware binaries and code bases. If you enjoy regularly being challenged and working on novel ideas to solve cybersecurity problems, please apply to join our team.
About Keysight
Keysight is on the forefront of technology innovation, delivering breakthroughs and trusted insights in electronic design, simulation, prototyping, test, manufacturing, and optimization. Our ~15,000 employees create world-class solutions in communications, 5G, automotive, energy, quantum, aerospace, defense, and semiconductor markets for customers in over 100 countries. Learn more about what we do.
Our powerful, award-winning culture embraces a bold vision of where technology can take us and a passion for tackling challenging problems with industry-first solutions. Diversity, equity & inclusion are integral parts of our culture and drivers of innovation at Keysight. We believe that when people feel a sense of belonging, they can be more creative, innovative, and thrive at all points in their careers.
Responsibilities:
Designing solutions to enable automated software composition analysis and identification of vulnerabilities
Developing and maintaining software composition analysis tools
Performing research in embedded device firmware security and compose articles and papers for publication
Required Skills:
Master’s degree in computer science, Mathematics, or Cyber Security OR equivalent practical experience in a related field
Experience with writing automated source code analyzers
Experience with automating binary analysis tasks in Ghidra, IDA Pro, Binary Ninja, or Radare2
Experience with fuzz testing and CPU/system emulation frameworks
Sound knowledge of auditing C/C++ code
A willingness to learn new things and an ability to analyze and solve new problems with little instruction or guidance
Preferred Skills:
Familiarity with the Rust programming language
Experience with firmware reverse engineering
Experience with training or mentoring
Experience with SaaS development
Keysight is an Equal Opportunity Employer.

#J-18808-Ljbffr

Related Jobs

View all jobs

Senior Security Software Engineer

Senior Security Software Engineer

Senior Security Software Engineer

Senior Security Software Engineer

Senior Security Software Engineer

Senior Android Security Software Developer, Fraud

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.

Part-Time Study Routes That Lead to Cyber Security Jobs: Evening Courses, Bootcamps & Online Masters

The frequency and sophistication of cyber-attacks have exploded in recent years, making cyber security one of the UK’s most in-demand skill sets. From safeguarding NHS patient data to defending FTSE 100 financial systems, organisations across sectors require qualified professionals—penetration testers, security analysts, incident responders and security architects—to protect critical infrastructure. Yet many professionals cannot pause their careers to upskill full time. Fortunately, an ecosystem of part-time learning pathways—evening courses, intensive bootcamps and flexible online master’s programmes—enables you to learn cyber security while working. This comprehensive guide explores every route: foundational CPD, immersive bootcamps, accredited online MScs, plus funding options, planning strategies and a real-world case study. Whether you’re an IT support technician, a software developer or a compliance manager aiming to pivot into security, you’ll discover how to build expertise at your own pace.

The Ultimate Assessment-Centre Survival Guide for Cyber Security Jobs in the UK

Assessment centres for cyber security positions in the UK are designed to mirror real-world threat landscapes and test both your technical acumen and soft skills under pressure. Across multiple stages—psychometric assessments, penetration testing exercises, incident response group tasks, case studies, interviews and even informal networking breaks—employers assess your ability to identify vulnerabilities, collaborate in high-stakes scenarios and communicate effectively. This guide walks you through each component, equipping you to stand out and secure your next role in cyber defence.