UKTL is building leading edge Telecoms testing facilities to keep our telecommunications networks safe, accelerate the roll-out of new technologies, and grow our world leading telecoms sector to maintain resiliency and security.
Read more about UKTLhere!
Successful candidates will join a state-of-the-art facility and support the team conducting testing and research on the latest technologies and innovations in the industry. You will work alongside infrastructure and Cybersecurity professionals to ensure that the UK’s world-class Telecoms infrastructure grows in a resilient and secure manner, underpinning growth in other industry sectors.
As a trusted and independent national capability, UKTL interacts with standards bodies, academia, government departments, communications service providers, and equipment vendors.
Successful applicants must be able to commute to the UKTL offices in Birmingham, with the possibility of hybrid working.
We strive to offer a great work-life balance. If you are looking for full-time, part-time, or flexible options, we will try to accommodate this where feasible. This depends on the role and the part of the business you work in.
Candidate Requirements:
1. An interest and aptitude for vulnerability research, whether from a professional background or demonstrated aptitude.
2. A passion for understanding how things work, testing them, pushing their limits, and identifying security issues.
3. An understanding of hardware and software development lifecycles and their impact on security practices.
4. Applied knowledge of cryptographic algorithms (encryption, authentication, signatures, etc.).
5. Knowledge of data structures, distributed systems, virtualization, and containerization technologies.
6. An understanding of network protocols and software development from assembly to interpreted languages.
7. Familiarity with vulnerabilities such as memory corruption bugs, and techniques attackers use to bypass protections like NX, stack canaries, ASLR, etc.
8. Knowledge and experience with embedded systems, operating systems, and hardware techniques for prototyping and debugging.
9. Knowledge of Linux OS internals.
10. Ability to self-learn programming languages with appropriate resources.
11. Practical knowledge of white-hat exploitation tools and techniques for low-level software and web platforms (e.g., SQL injection, XSS, CSRF, RCE).
12. Reverse engineering experience (e.g., IDA Pro, Ghidra).
#J-18808-Ljbffr