Senior Vulnerability Researcher

Senior Vulnerability Researcher

Full-Time 60000 - 80000 € / year (est.) Home office (partial)
National Physical Laboratory (NPL)

At a Glance

  • Tasks: Lead advanced vulnerability research in telecom systems and mentor fellow researchers.
  • Company: Join UKTL, a cutting-edge telecom security research facility.
  • Benefits: Enjoy flexible working options, enhanced pension, and a supportive work environment.
  • Other info: Work in a world-class lab that encourages experimentation and innovation.
  • Why this job: Make a real impact on national infrastructure while pushing technical boundaries.
  • Qualifications: Proven experience in vulnerability research and strong telecom technology expertise.

The predicted salary is between 60000 - 80000 € per year.

Step into a senior position at the forefront of telecom security research. In this role, you won’t just explore vulnerabilities—you’ll define how they are discovered, understood, and mitigated across complex telecom ecosystems. You will lead high-impact research initiatives, guide technical direction, and mentor others while continuing to push the boundaries of your own expertise.

  • Lead Vulnerability Research – take ownership of advanced vulnerability research across carrier-grade telecom systems. You’ll drive investigations into complex, real-world technologies, uncovering deep and previously unknown security weaknesses. Your work will directly influence the resilience of critical national infrastructure.
  • Set Technical Direction & Strategy - shape the vision for vulnerability research within the organisation. Define priorities, methodologies, and tooling approaches, ensuring research efforts remain innovative, relevant, and impactful. You will provide technical leadership across multiple domains, guiding teams through ambiguous and complex problem spaces.
  • Innovate & Build at Scale - design and develop advanced research tooling and environments. Whether creating bespoke fuzzers, software-defined radio solutions, or entirely new frameworks, you’ll enable large-scale experimentation and discovery. You’ll lead by example—prototyping, iterating, and pushing technical boundaries.
  • Mentor & Elevate the Team - support and develop other researchers by sharing knowledge, reviewing work, and fostering a culture of curiosity and technical excellence. You’ll help build capability across the team, raising standards and accelerating collective impact.
  • Deepen Expertise & Drive Insight - apply structured research methodologies to understand complex systems—how they behave, where they fail, and how they can be secured. You’ll connect insights across domains (hardware, software, and networks) to solve real-world security challenges.
  • Work, Build & Experiment in a World-Class Lab - operate within a cutting-edge research environment where experimentation is encouraged. You’ll have the freedom to deconstruct systems, explore their limits, and rebuild them more securely—at scale. Alongside this, you’ll design and evolve the infrastructure that underpins advanced telecom security research.

Successful Applicants must be able to commute to the UKTL offices in Birmingham at least twice a week. We strive to offer a great work life balance - if you are looking for full time, part time or flexible options, we will try to make this work where business possible. This will be dependent on the kind of role you do and part of the business you work in.

You are a highly experienced and deeply technical security researcher, driven by curiosity and a passion for understanding how complex systems work—and how they break. You thrive in ambiguity, lead with confidence, and have a track record of delivering meaningful research outcomes.

Your Skills & Experience

  • Proven experience leading or contributing to advanced vulnerability research initiatives across multiple roles or organisations.
  • Strong expertise across telecom technologies such as 4G/5G, fibre broadband, and OpenRAN.
  • Deep understanding of hardware and software development lifecycles, and how they introduce security risks.
  • Practical knowledge of cryptographic systems, including encryption, authentication, and digital signatures.
  • Solid grasp of data structures, distributed systems, virtualisation, and containerisation.
  • Expert-level understanding of network protocols and software internals, from low-level assembly to high-level languages.
  • Experience with embedded systems, OS internals, and hardware debugging techniques.
  • Strong knowledge of Linux internals, with the ability to quickly adopt new programming languages.
  • Demonstrated experience identifying and exploiting memory corruption vulnerabilities, including bypassing modern protections (ASLR, stack canaries, etc.).
  • Proficiency in reverse engineering, using tools such as IDA Pro, Ghidra, or equivalent.
  • Skilled in using debugging tools (e.g., GDB) and advanced exploitation techniques.
  • Experience building custom tools, research platforms, or test environments to support vulnerability discovery.

Note: Applications will be reviewed, and interviews conducted throughout the duration of this advert; closing date may be moved forward. We encourage all interested applicants to apply as soon as practical.

We actively recruit citizens from all backgrounds; however, due to the sensitive nature of the work in this area, nationality, residency, and security requirements are more tightly defined than in other roles. To work in this position, you will need to meet the necessary security standards. The role requires DV clearance with no restrictions, though you are able to start in post with SC clearance while your DV clearance is in progress. You are welcome to apply without already holding the required clearance, but you will not be able to start in post until the appropriate level—SC—has been successfully granted.

Read more about UKTL here.

About Us

UKTL is building leading edge Telecoms testing facilities to keep our telecommunications networks safe, accelerate the roll-out of new technologies, and grow our world leading telecoms sector to maintain resiliency and security. Successful candidates will join a state-of-the-art facility and be supporting the team conducting testing and research on the latest technologies and innovations in the industry. You will work alongside our infrastructure and Cybersecurity professionals to ensure that the UK’s world class Telecoms infrastructure grows in a resilient and secure manner underpinning growth in other industry sectors.

As a trusted and independent national capability, UKTL interacts with standards bodies, Academia, and Government Departments as well as Communications Service Providers and equipment vendors.

The National Physical Laboratory (NPL) is a world-leading centre of excellence that provides cutting-edge measurement science, engineering and technology to underpin prosperity and quality of life in the UK. Find out more about what it is like working here - The measure of us - Overview.

NPL and DSIT have strong commitments to diversity and equality of opportunity, and welcome applications from candidates irrespective of their background, gender, race, sexual orientation, religion, or age, providing they meet the required criteria. Applications from women, disabled and black, Asian and minority ethnic candidates in particular are encouraged. All disabled candidates (as defined by the Equality Act 2010) who satisfy the minimum criteria for the role will be guaranteed an interview under the Disability Confident Scheme.

At NPL, we believe our success is a result of the diversity and talent of our people. We strive to nurture and respect individuals to ensure everyone feels valued by treating everyone on the basis of their own individual merits and abilities regardless of their own or perceived identity. As part of our commitment to diversity & inclusion, we ensure we’re creating an environment where all our colleagues feel supported and welcome.

More about this on our Diversity & Inclusion page.

We offer a wealth of above industry standard benefits, such as enhanced pension scheme, flexible working, and more that can be found here rewards, benefits and recognition. Our values are at the heart of what we do, and they shape the way we interact, develop our people and celebrate success. To ensure everyone has an equal chance, we’re always willing to make reasonable adjustments to the recruitment process. If you would like to discuss, please contact us.

Senior Vulnerability Researcher employer: National Physical Laboratory (NPL)

UKTL is an exceptional employer, offering a dynamic work environment in Birmingham where innovation and experimentation are at the forefront of telecom security research. With a strong commitment to employee growth, flexible working options, and a culture that values diversity and inclusion, you will have the opportunity to lead impactful research initiatives while mentoring others in a state-of-the-art facility. Join us to be part of a team that not only shapes the future of telecommunications but also prioritises your professional development and work-life balance.

National Physical Laboratory (NPL)

Contact Detail:

National Physical Laboratory (NPL) Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land Senior Vulnerability Researcher

Tip Number 1

Network like a pro! Get out there and connect with folks in the telecom security space. Attend meetups, conferences, or even online webinars. The more people you know, the better your chances of landing that Senior Vulnerability Researcher role.

Tip Number 2

Show off your skills! Create a portfolio showcasing your past research projects, tools you've built, or any innovative solutions you've developed. This will give potential employers a taste of what you can bring to the table.

Tip Number 3

Prepare for those interviews! Brush up on your technical knowledge and be ready to discuss complex systems and vulnerabilities. Practice explaining your thought process clearly, as communication is key in this field.

Tip Number 4

Apply through our website! We love seeing passionate candidates who are eager to join our team. Don’t hesitate—submit your application and let us know why you’re the perfect fit for the role!

We think you need these skills to ace Senior Vulnerability Researcher

Vulnerability Research
Telecom Technologies (4G/5G, fibre broadband, OpenRAN)
Hardware and Software Development Lifecycles
Cryptographic Systems (encryption, authentication, digital signatures)
Data Structures
Distributed Systems
Virtualisation

Some tips for your application 🫡

Tailor Your Application:Make sure to customise your CV and cover letter to highlight your experience in vulnerability research, especially in telecom systems. We want to see how your skills align with the role, so don’t hold back on showcasing your relevant projects!

Show Your Passion:Let your enthusiasm for security research shine through! Share examples of how you've pushed boundaries in your previous roles or any personal projects that demonstrate your curiosity and technical prowess. We love seeing candidates who are genuinely excited about what they do.

Be Clear and Concise:When writing your application, keep it straightforward. Use clear language and avoid jargon unless it's necessary. We appreciate a well-structured application that makes it easy for us to see your qualifications and experience at a glance.

Apply Through Our Website:Don’t forget to submit your application through our website! It’s the best way for us to receive your details and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team at StudySmarter!

How to prepare for a job interview at National Physical Laboratory (NPL)

Know Your Stuff

Make sure you brush up on your knowledge of telecom technologies like 4G/5G and fibre broadband. Be ready to discuss specific vulnerabilities you've encountered in these areas, as well as how you approached solving them.

Showcase Your Leadership Skills

Since this role involves mentoring and guiding teams, prepare examples of how you've led research initiatives or supported colleagues in their development. Highlight your ability to navigate complex problem spaces and drive impactful outcomes.

Demonstrate Your Technical Prowess

Be prepared to dive deep into technical discussions. Familiarise yourself with tools like IDA Pro and Ghidra, and be ready to talk about your experience with memory corruption vulnerabilities and exploitation techniques.

Emphasise Your Curiosity

This role thrives on curiosity and innovation. Share instances where your inquisitive nature led to significant discoveries or improvements in your previous work. Show that you're not just a researcher but a passionate explorer of security challenges.