Advance Search

Browse Jobs

Vulnerability Research (VR) Security Analyst

Posted 24 days ago

  • Birmingham, West Midlands
  • Any
  • External
  • Expired - 2 months ago
U.K. Telecommunication Laboratory (UKTL)
Led by the Department forScience, Innovation and Technology,the UK Telecoms Lab (UKTL), announced in October 2022, will give the UK the cutting-edge technology to keep our telecommunications networks safe, accelerate the roll-out of 5G, and grow our brilliant telecoms sector by bringing in new entrants to diversify the supply chain market.
Successful candidates will have a unique experience working on or supporting the latest ground-breaking cyber security and networking technologies on a national and international scale. This opportunity will allow those involved to have first-hand exposure to the latest technologies via the research and development that we are undertaking to secure our telecommunications networks, in order to keep the UK the safest place to live and do business online.
As a trusted and independent national capability, the UKTL will interact at the intersection of standards bodies, such as 3GPP, the National Cyber Security Centre and the wider UK intelligence community, academia, Ofcom, as well as Communications Service Providers and telecommunication equipment vendors.
This role will be part of a small team of Vulnerability Research (VR) Security Analysts, tackling some of the most interesting cyber problems with a meaningful and tangible impact on the national security of the UK. You will be instrumental in standing up an industry-leading security facility.
The focus of the VR Security Analyst will be to conduct in-depth VR activities, explore boundaries of technology and its development, test hypotheses, and conduct deep dives into the vulnerabilities of telecoms equipment. You will also develop bespoke leading-edge security testing tools to support these activities.
Successful Applicants must be able to commute to the UKTL offices in Birmingham at least twice a week
We strive to offer a great work life balance - if you are looking for full time, part time or flexible options, we will try to make this work where business possible. This will be dependent on the kind of role you do and part of the business you work in.
Examples of technical skills, knowledge, and experience, including:
An interest and aptitude for vulnerability research (either from a professional background or by demonstrating an aptitude).
A passion for understanding how things work, testing them, pushing them to their limits, and finding security issues in them.
Understanding of hardware and software development lifecycles and their impact on security practices.
Applied knowledge of cryptographic algorithms / standards and knowledge of data structures and distributed systems.
Understanding of network protocols and how software works from assembly through to interpreted languages, and everything in between.
Fa miliarity with vulnerabilities such as memory corruption bugs (stack/heap/integer overflows, format strings), and techniques attackers can use to bypass common security protections (e.g. NX, stack canaries, heap protection, ASLR, etc.)
Knowledge and experience of embedded systems and operating systems, and hardware techniques for prototyping and debugging these.
Knowledge of Linux OS internals. Ability to self-learn any language, given appropriate resources to study and practice.
Practical knowledge of common white-hat exploitation toolsets and techniques for common flaws in low-level software, as well as web platforms (e.g. SQL injection, XSS, CSRF, SSRF, upload/download abuse, RCE).
Reverse engineering experience (e.g. IDA Pro, Ghidra).
We actively recruit citizens of all backgrounds, but the nature of our work in this specific area means that nationality, residency and security requirements are more tightly defined than others. To work in this role, you will need to have an SC clearance with no restrictions, or you must have the ability to obtain an SC clearance.
#J-18808-Ljbffr
Apply