Enable job alerts via email!
Generate a tailored resume in minutes
Land an interview and earn more. Learn more
The National Physical Laboratory is seeking a Vulnerability Research Security Analyst to support a state-of-the-art Telecom testing facility in Birmingham. Ideal candidates will possess a strong background in vulnerability research and security, relevant technical experience, and an ability to adapt to new technologies. The role offers flexibility with the possibility of hybrid working.
National Physical Laboratory
Birmingham
GBP 40,000 - 65,000
Be among the first applicants.
7 days ago
UKTL is building leading-edge Telecoms testing facilities to keep our telecommunications networks safe, accelerate the roll-out of new technologies, and grow our world-leading telecoms sector to maintain resiliency and security.
Successful candidates will join a state-of-the-art facility and support the team conducting testing and research on the latest technologies and innovations in the industry. You will work alongside infrastructure and Cybersecurity professionals to ensure that the UK’s world-class Telecoms infrastructure grows in a resilient and secure manner, underpinning growth in other industry sectors.
As a trusted and independent national capability, UKTL interacts with standards bodies, academia, government departments, communications service providers, and equipment vendors.
Successful applicants must be able to commute to the UKTL offices in Birmingham, with the possibility of hybrid working.
We strive to offer a great work-life balance. If you are looking for full-time, part-time, or flexible options, we will try to accommodate this where possible, depending on the role and the business area.
Ideal candidates will have experience in multiple VR roles and organizations, an interest and aptitude for vulnerability research, and a passion for understanding how things work, testing them, and finding security issues. A deep understanding of hardware and software development lifecycles, cryptographic algorithms, data structures, distributed systems, virtualization, network protocols, and security exploitation techniques is essential. Knowledge of embedded systems, Linux OS internals, reverse engineering tools, and web exploitation techniques is also required. Applicants must be able to self-learn new languages and tools as needed.
Note: Applications will be reviewed throughout the advert's duration, and the closing date may be brought forward. We encourage interested applicants to apply promptly. Due to the nature of the work, applicants must have or be able to obtain DV clearance with no restrictions.