Principal Vulnerability Engineer

🔒 Confidential Employer
Posted 7 May 2026
LOCATION
Remote
TYPE
Full-time
LEVEL
Director
SALARY
£110,000 / year
CATEGORY
Technology
This employer holds a UK Home Office sponsor license — sponsorship for this specific role is at the employer’s discretion

SKILLS

Vulnerability Research 0-day Discovery Patch Diffing Python Burp Suite Ghidra/IDA Debuggers LLM-powered workflows

FULL DESCRIPTION

Principal Vulnerability Engineer

Company: [Employer hidden — view at passion-project.co.uk]

Location: Remote, UK

Salary: £100,000-£110,000 per annum

Type: Permanent - Full time

Experience Level: Director

Job Description

Principal Vulnerability Engineer | High-Growth Cybersecurity Scale-Up | Fully Remote (UK)

  • Remote – UK Based
  • Up to £110,000 + benefits
  • Permanent – Full time

Got a track record of 0-day discoveries, public CVEs, and a reputation for finding bugs that actually move the needle?

Join a research-driven, venture-backed cybersecurity scale-up trusted by Fortune 500 enterprises and critical infrastructure providers. Recognised by Gartner, $29M funded, and scaling fast worldwide.

As a Principal Vulnerability Engineer, you’ll own the full vulnerability lifecycle – from discovery, through detection, to deployment – building production-grade tooling and pioneering LLM-powered offensive security workflows.

What you’ll be doing:

  • Leading deep research across 0-days and n-days, with patch diffing across source-available and binary-only targets
  • Designing tooling for automated vulnerability discovery, exploit validation, and detection signature generation
  • Architecting production-grade, LLM-powered research workflows
  • Focusing on the vulnerabilities that matter – RCEs, auth bypasses, the bugs that change a client’s risk posture overnight

What they’re looking for:

  • 5+ years of mixed vulnerability research and software engineering experience
  • A demonstrable track record of original 0-day discovery – public advisories, CVEs, or equivalent
  • Deep n-day research and patch diffing chops
  • Confidence across both web and binary vulnerability classes
  • Production-grade software engineering experience, ideally in Python
  • Mastery of Burp Suite, Ghidra/IDA, debuggers, fuzzers
  • Hands-on experience using LLMs in research workflows
Sign up free — access 45,000+ UK sponsor-licensed jobs