UKTL is building leading edge Telecoms testing facilities to keep our telecommunications networks safe, accelerate the roll-out of new technologies, and grow our world leading telecoms sector to maintain resiliency and security.
Read more about UKTL here!
Successful candidates will join a state-of-the-art facility and be supporting the team conducting testing and research on the latest technologies and innovations in the industry. You will work alongside our infrastructure and Cybersecurity professionals to ensure that the UK’s world class Telecoms infrastructure grows in a resilient and secure manner underpinning growth in other industry sectors.
As a trusted and independent national capability, UKTL interacts with standards bodies, Academia, and Government Departments as well as Communications Service Providers and equipment vendors.
Successful Applicants must be able to commute to the UKTL offices in Birmingham with the possibility of hybrid working.
We strive to offer a great work life balance - if you are looking for full time, part time or flexible options, we will try to make this work where business possible. This will be dependent on the kind of role you do and part of the business you work in.
Key Responsibilities and Requirements:
1. An interest and aptitude for vulnerability research (either from a professional background or by demonstrating an aptitude).
2. A passion for understanding how things work, testing them, pushing them to their limits, and finding security issues in them.
3. An appreciation of hardware and software development lifecycles and their impact on security practices.
4. Knowledge of cryptographic algorithms (encryption, authentication, signatures, etc).
5. Knowledge of data structures, distributed systems, virtualisation and containerisation technologies.
6. An understanding of network protocols and how software works - either assembly or interpreted languages, or anything in between.
7. Familiarity with or a strong demonstrable interest in vulnerabilities such as memory corruption bugs (stack/heap/integer overflows, format strings), and an interest in techniques attackers can use to bypass common security protections (e.g. NX, stack canaries, heap protection, ASLR, etc.).
8. Knowledge and experience of embedded systems and operating systems, and hardware techniques for prototyping and debugging these.
9. An appreciation of Linux OS internals.
10. Ability to self-learn any language, given appropriate resources to study and practice.
11. Practical knowledge of common white-hat exploitation toolsets and techniques for common flaws in low-level software, as well as web platforms (e.g. SQL injection, XSS, CSRF, SSRF, upload/download abuse, RCE).
12. Reverse engineering experience (e.g. IDA Pro, Ghidra).
Please note: Applications will be reviewed, and interviews conducted throughout the duration of this advert therefore we may at any time bring the closing date forward. We encourage all interested applicants to apply as soon as practical.
We actively recruit citizens of all backgrounds, but the nature of our work in this specific area means that nationality, residency and security requirements are more tightly defined than others. To work in this role, you will need to have a DV clearance with no restrictions, or you must have the ability to obtain a DV clearance.
#J-18808-Ljbffr