At a Glance
- Tasks: Join a cutting-edge team researching vulnerabilities in telecom technologies and enhancing security.
- Company: UKTL, a leader in telecoms testing with a focus on innovation and security.
- Benefits: Flexible working options, enhanced pension scheme, and above industry standard perks.
- Why this job: Make a real impact on the UK's telecom infrastructure while growing your skills in cybersecurity.
- Qualifications: Passion for vulnerability research and knowledge of software/hardware development lifecycles.
- Other info: Diverse and inclusive workplace with excellent career growth opportunities.
The predicted salary is between 36000 - 60000 Β£ per year.
- About the Role
- UKTL is building leading edge Telecoms testing facilities to keep our telecommunications networks safe, accelerate the roll-out of new technologies, and grow our world leading telecoms sector to maintain resiliency and security.
Read more about UKTL
here
Successful candidates will join a state-of-the-art facility and be supporting the team conducting testing and research on the latest technologies and innovations in the industry. You will work alongside our infrastructure and Cybersecurity professionals to ensure that the UK\βs world class Telecoms infrastructure grows in a resilient and secure manner underpinning growth in other industry sectors.
As a trusted and independent national capability, UKTL interacts with standards bodies, Academia, and Government Departments as well as Communications Service Providers and equipment vendors.
Successful Applicants must be able to commute to the UKTL offices in Birmingham at least twice a week
We strive to offer a great work life balance β if you are looking for full time, part time or flexible options, we will try to make this work where business possible. This will be dependent on the kind of role you do and part of the business you work in.
About You- An interest and aptitude for vulnerability research (either from a professional background or by demonstrating an aptitude).
β A passion for understanding how things work, testing them, pushing them to their limits, and finding security issues in them.
β An understanding of hardware and software development lifecycles and their impact on security practices.
β Applied knowledge of cryptographic algorithms (encryption, authentication, signatures, etc).
β Knowledge of data structures, distributed systems, virtualisation and containerisation technologies.
β An understanding of network protocols and how software works from assembly through to interpreted languages, and everything in between.
β Familiarity with vulnerabilities such as memory corruption bugs (stack/heap/integer overflows, format strings), and techniques attackers can use to bypass common security protections (e.g. NX, stack canaries, heap protection, ASLR, etc.)
β Knowledge and experience of embedded systems and operating systems, and hardware techniques for prototyping and debugging these.
β Knowledge of Linux OS internals. Ability to self-learn any language, given appropriate resources to study and practice.
β Practical knowledge of common white-hat exploitation toolsets and techniques for common flaws in low-level software, as well as web platforms (e.g. SQL injection, XSS, CSRF, SSRF, upload/download abuse, RCE).
β Reverse engineering experience (e.g. IDA Pro, Ghidra).
Please note: Applications will be reviewed, and interviews conducted throughout the duration of this advert therefore we may at any time bring the closing date forward. We encourage all interested applicants to apply as soon as practical.
*We actively recruit citizens of all backgrounds, but the nature of our work in this specific area means that nationality, residency and security requirements are more tightly defined than others. To work in this role, you will need to have a DV clearance with no restrictions, or you must have the ability to obtain a DV clearance.
About Us*
The National Physical Laboratory (NPL) is a world-leading centre of excellence that provides cutting-edge measurement science, engineering and technology to underpin prosperity and quality of life in the UK. Find out more about what it is like working here β The measure of us β Overview
NPL and DSIT have strong commitments to diversity and equality of opportunity, and welcome applications from candidates irrespective of their background, gender, race, sexual orientation, religion, or age, providing they meet the required criteria. Applications from women, disabled and black, Asian and minority ethnic candidates in particular are encouraged. All disabled candidates (as defined by the Equality Act 2010) who satisfy the minimum criteria for the role will be guaranteed an interview under the Disability Confident Scheme.
At NPL, we believe our success is a result of the diversity and talent of our people. We strive to nurture and respect individuals to ensure everyone feels valued by treating everyone on the basis of their own individual merits and abilities regardless of their own or perceived identity, as part of our commitment to diversity & inclusion, we ensure we\βre creating an environment where all our colleagues feel supported and welcome. More about this on our Diversity & Inclusion page.
We offer a wealth of above industry standard benefits, such as enhanced pension scheme, flexible working, and more that can be found here rewards, benefits and recognition. Our values are at the heart of what we do, and they shape the way we interact, develop our people and celebrate success. To ensure everyone has an equal chance, we\βre always willing to make reasonable adjustments to the recruitment process. If you would like to discuss, please contact us.
Vulnerability Researcher employer: National Physical Laboratory (NPL)
Contact Detail:
National Physical Laboratory (NPL) Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Vulnerability Researcher
β¨Tip Number 1
Network like a pro! Get out there and connect with folks in the telecoms and cybersecurity sectors. Attend meetups, webinars, or even local events. You never know who might have the inside scoop on job openings or can refer you directly to hiring managers.
β¨Tip Number 2
Show off your skills! Create a portfolio showcasing your vulnerability research projects or any relevant work you've done. This could be anything from personal projects to contributions to open-source software. Itβs a great way to demonstrate your passion and expertise.
β¨Tip Number 3
Prepare for interviews by brushing up on common vulnerability research topics. Be ready to discuss your understanding of cryptographic algorithms, network protocols, and exploitation techniques. Practising with mock interviews can help you feel more confident when itβs time to shine.
β¨Tip Number 4
Donβt forget to apply through our website! Weβre always on the lookout for passionate individuals who want to make a difference in the telecoms sector. Keep an eye on our job listings and get your application in early to increase your chances of landing that dream role.
We think you need these skills to ace Vulnerability Researcher
Some tips for your application π«‘
Show Your Passion: Let us see your enthusiasm for vulnerability research! Share any personal projects or experiences that highlight your interest in testing and pushing technologies to their limits. This will help us understand your drive and commitment.
Tailor Your Application: Make sure to customise your CV and cover letter to reflect the specific skills and experiences mentioned in the job description. We want to see how your background aligns with our needs, so donβt hold back on relevant details!
Be Clear and Concise: When writing your application, keep it straightforward and to the point. Use clear language and avoid jargon unless it's relevant. We appreciate a well-structured application thatβs easy to read and understand.
Apply Early!: Donβt wait until the last minute to submit your application. We review applications as they come in, so applying early gives you a better chance of standing out. Head over to our website and get your application in today!
How to prepare for a job interview at National Physical Laboratory (NPL)
β¨Know Your Stuff
Make sure you brush up on your knowledge of vulnerability research and the latest technologies in telecommunications. Familiarise yourself with common vulnerabilities and exploitation techniques, as well as cryptographic algorithms. This will show that you're not just interested but also knowledgeable about the field.
β¨Show Your Passion
During the interview, express your enthusiasm for understanding how things work and your eagerness to push systems to their limits. Share examples of past projects or experiences where you've tested systems or found security issues. This will help convey your genuine interest in the role.
β¨Ask Smart Questions
Prepare thoughtful questions about the company's approach to cybersecurity and how they stay ahead of emerging threats. This not only shows your interest in the role but also demonstrates your critical thinking skills and understanding of the industry.
β¨Be Ready to Discuss Tools and Techniques
Familiarise yourself with common white-hat exploitation tools and techniques, as well as reverse engineering tools like IDA Pro or Ghidra. Be prepared to discuss how you've used these tools in the past or how you would approach a specific vulnerability. This practical knowledge can set you apart from other candidates.