Engineer the Quantum RevolutionYour expertise can help us shape the future of quantum computing at Oxford Ionics.

View Open Roles

Senior Vulnerability Research (VR) Security Analyst

National Physical Laboratory
Birmingham
2 months ago
Create job alert

UKTL is building leading edge Telecoms testing facilities to keep our telecommunications networks safe, accelerate the roll-out of new technologies, and grow our world leading telecoms sector to maintain resiliency and security.

Read more about UKTLhere!

Successful candidates will join a state-of-the-art facility and support the team conducting testing and research on the latest technologies and innovations in the industry. You will work alongside infrastructure and Cybersecurity professionals to ensure that the UK’s world-class Telecoms infrastructure grows in a resilient and secure manner, underpinning growth in other industry sectors.

As a trusted and independent national capability, UKTL interacts with standards bodies, academia, government departments, communications service providers, and equipment vendors.

Successful applicants must be able to commute to the UKTL offices in Birmingham, with the possibility of hybrid working.

We strive to offer a great work-life balance. If you are looking for full-time, part-time, or flexible options, we will try to accommodate where possible, depending on the role and business needs.

Key qualifications and interests include:

  1. Interest and aptitude for vulnerability research, demonstrated through professional background or aptitude.
  2. A passion for understanding how systems work, testing them, and finding security issues.
  3. Understanding of hardware and software development lifecycles and their impact on security practices.
  4. Applied knowledge of cryptographic algorithms (encryption, authentication, signatures, etc.).
  5. Knowledge of data structures, distributed systems, virtualization, and containerization technologies.
  6. Understanding of network protocols and software development from assembly to interpreted languages.
  7. Familiarity with vulnerabilities such as memory corruption bugs and techniques to bypass security protections.
  8. Knowledge and experience with embedded systems, operating systems, and hardware debugging techniques.
  9. Knowledge of Linux OS internals and ability to self-learn programming languages.
  10. Practical experience with white-hat exploitation tools and techniques for software and web platform vulnerabilities.
  11. Reverse engineering experience (e.g., IDA Pro, Ghidra).

Please note: Applications will be reviewed, and interviews conducted throughout the advert's duration. The closing date may be moved forward. We encourage interested applicants to apply promptly.

We actively recruit individuals of all backgrounds, but due to the nature of the work, nationality, residency, and security requirements are more tightly defined. To work in this role, you must have a DV clearance with no restrictions or be able to obtain one.


#J-18808-Ljbffr

Related Jobs

View all jobs

Vulnerability Analyst Interview

Principal Security Analyst (MSSP)

Principal Security Analyst (MSSP)

Principal Security Analyst (MSSP)

Principal Security Analyst (MSSP)

Principal Security Analyst (MSSP)

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Pre-Employment Checks for Cyber Security Jobs: DBS, References & Right-to-Work and more Explained

The cyber security sector in the UK stands at the forefront of protecting national infrastructure, business operations, and personal data from increasingly sophisticated cyber threats. As organisations across all sectors recognise cyber security as a critical business function, employers are implementing the most rigorous pre-employment screening processes in the technology industry to ensure they recruit professionals capable of defending against advanced persistent threats and maintaining the highest standards of security and trustworthiness. Whether you're a penetration tester, security analyst, incident response specialist, or chief information security officer, understanding the comprehensive vetting requirements is essential for successfully advancing your career in this security-critical field. This detailed guide explores the extensive background checks and screening processes you'll encounter when applying for cyber security positions in the UK, from fundamental eligibility verification to the most stringent security clearance requirements and specialised threat intelligence assessments.

Why Now Is the Perfect Time to Launch Your Career in Cyber Security: The UK's Digital Defence Revolution

The United Kingdom faces an unprecedented cyber security challenge that presents an extraordinary career opportunity. With cyber attacks increasing by 300% year-on-year and the average cost of a data breach reaching £4.24 million, Britain urgently needs skilled cyber security professionals to defend its digital infrastructure, protect citizens' data, and maintain national security in an increasingly connected world. If you've been considering a career change or seeking to future-proof your professional trajectory, cyber security represents one of the most secure, well-compensated, and socially impactful career choices available. The convergence of escalating threats, skills shortage, government investment, and regulatory requirements has created a perfect storm of opportunity that shows no signs of abating.

Automate Your Cyber Security Jobs Search: Using ChatGPT, RSS & Alerts to Save Hours Each Week

Cyber roles drop across consultancies, MSSPs, hyperscalers, banks, gov & start-ups every day—often buried in ATS portals or duplicated across boards. The fix is simple: put discovery on autopilot with keyword-rich alerts, RSS feeds & a reusable ChatGPT workflow that triages listings, ranks fit, & tailors your CV in minutes. This copy-paste playbook is built for www.cybersecurityjobs.tech readers. It’s UK-centric, practical, & designed to save you hours each week. What You’ll Have Working In 30 Minutes A role & keyword map spanning SecOps/Detection, DFIR, AppSec, Cloud Security, GRC, Red Team, Threat Intel, IAM/PAM, OT/ICS & Vulnerability Management. Shareable Boolean search strings for Google & job boards to cut noise fast. Always-on alerts & RSS feeds delivering fresh roles to your inbox/reader. A ChatGPT “Cyber Job Scout” prompt that deduplicates, scores fit & outputs tailored actions. A simple pipeline tracker so deadlines & follow-ups never slip.