National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Senior Vulnerability Research (VR) Security Analyst

National Physical Laboratory
Birmingham
3 weeks ago
Create job alert

UKTL is building leading edge Telecoms testing facilities to keep our telecommunications networks safe, accelerate the roll-out of new technologies, and grow our world leading telecoms sector to maintain resiliency and security.

Read more about UKTLhere!

Successful candidates will join a state-of-the-art facility and support the team conducting testing and research on the latest technologies and innovations in the industry. You will work alongside infrastructure and Cybersecurity professionals to ensure that the UK’s world-class Telecoms infrastructure grows in a resilient and secure manner, underpinning growth in other industry sectors.

As a trusted and independent national capability, UKTL interacts with standards bodies, academia, government departments, communications service providers, and equipment vendors.

Successful applicants must be able to commute to the UKTL offices in Birmingham, with the possibility of hybrid working.

We strive to offer a great work-life balance. If you are looking for full-time, part-time, or flexible options, we will try to accommodate where possible, depending on the role and business needs.

Key qualifications and interests include:

  1. Interest and aptitude for vulnerability research, demonstrated through professional background or aptitude.
  2. A passion for understanding how systems work, testing them, and finding security issues.
  3. Understanding of hardware and software development lifecycles and their impact on security practices.
  4. Applied knowledge of cryptographic algorithms (encryption, authentication, signatures, etc.).
  5. Knowledge of data structures, distributed systems, virtualization, and containerization technologies.
  6. Understanding of network protocols and software development from assembly to interpreted languages.
  7. Familiarity with vulnerabilities such as memory corruption bugs and techniques to bypass security protections.
  8. Knowledge and experience with embedded systems, operating systems, and hardware debugging techniques.
  9. Knowledge of Linux OS internals and ability to self-learn programming languages.
  10. Practical experience with white-hat exploitation tools and techniques for software and web platform vulnerabilities.
  11. Reverse engineering experience (e.g., IDA Pro, Ghidra).

Please note: Applications will be reviewed, and interviews conducted throughout the advert's duration. The closing date may be moved forward. We encourage interested applicants to apply promptly.

We actively recruit individuals of all backgrounds, but due to the nature of the work, nationality, residency, and security requirements are more tightly defined. To work in this role, you must have a DV clearance with no restrictions or be able to obtain one.


#J-18808-Ljbffr

Related Jobs

View all jobs

Senior Security Engineer, Red Team

Senior Security Engineer, Red Team London, United Kingdom

Senior Security Engineer, Red Team

Senior Security Engineer, Red Team

Vulnerability Analyst Interview

Threat and Vulnerability Analyst

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs Skills Radar 2026: Emerging Frameworks, Tools & Certifications to Learn Now

Cyber threats are evolving—and so must the people defending against them. As ransomware, AI-enhanced phishing, and supply chain attacks grow more advanced, UK employers are urgently hiring cyber security professionals with the right mix of strategic and hands-on skills. Welcome to the Cyber Security Jobs Skills Radar 2026, your go-to guide for the most in-demand tools, frameworks, certifications, and technologies shaping the UK's cyber workforce. Whether you're a SOC analyst, penetration tester, or cloud security architect, this annual radar is designed to help you stay ahead of the market.

How to Find Hidden Cyber Security Jobs in the UK Using Professional Bodies like BCS, CIISec & More

The demand for skilled cyber security professionals in the UK has never been higher. With threats increasing in sophistication and frequency, organisations are urgently hiring ethical hackers, threat analysts, GRC specialists, and security architects. But many of the most valuable roles—particularly in government, defence, and critical infrastructure—are never publicly advertised. Instead, these jobs are shared behind the scenes through trusted networks, private communities, and professional bodies. In this article, we explore how to uncover hidden cyber security jobs in the UK using organisations like the BCS (The Chartered Institute for IT), CIISec (The Chartered Institute of Information Security), ISACA, and ISC² UK Chapter. We’ll show you how to use membership directories, special interest groups, CPD events and informal networks to gain early access to roles most people never see.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.