Jobs
My ads
My job alerts
Sign in
Find a job Career Tips Companies
Find

Vulnerability researcher (uktl)

Solihull
National Physical Laboratory
Posted: 16 February
Offer description

What You’ll Be Doing

* Deep Dive into Telecom Systems – You’ll have the freedom and time to investigate our carrier‑grade telecom infrastructure, uncovering vulnerabilities that others might miss. Your work will be thorough, precise, and impactful.
* Work Within Flexible Frameworks – Rather than rigid tasks, you’ll operate within broad themes and scopes—giving you the autonomy to shift focus as new insights emerge and opportunities arise.
* Prototype Your Own Tools – You’ll build and experiment with custom tooling—like novel fuzzers or software radio interfaces—often using obscure frameworks and languages to push the boundaries of what’s possible.
* Learn Continuously – You’ll dissect systems to understand how they fail and what it takes to secure them. Every project is a chance to grow your expertise and contribute to long‑term security advancements.
* Successful Applicants must be able to commute to the UKTL offices in Birmingham at least twice a week.
* We strive to offer a great work life balance – if you are looking for full time, part time or flexible options, we will try to make this work where business possible. This will be dependent on the kind of role you do and part of the business you work in.


About You

* You’re curious, driven, and passionate about uncovering how things work—and how they break. You thrive in complex technical environments and enjoy pushing boundaries to discover vulnerabilities others overlook.
* You comprehend what protocols are doing beneath the surface and can break down how systems communicate.
* You apply structured research methodologies to explore novel technologies and uncover hidden risks.
* You bring applied knowledge of cryptographic algorithms—encryption, authentication, signatures—and know how they can be misused.
* You’re comfortable with data structures, distributed systems, and modern infrastructure like virtualisation and containerisation.
* You understand network protocols and how software works—from low‑level assembly to high‑level interpreted languages.
* You’re familiar with memory corruption bugs and know how attackers bypass protections like ASLR, stack canaries, and heap guards.
* You know your way around Linux internals and can pick up any programming language when given the right resources.
* You’ve used ethical exploitation tools and techniques across both low‑level software and web platforms.
* You’ve got reverse engineering experience and are confident using tools like IDA Pro, Ghidra, or even just source code analysis.

Please note: Applications will be reviewed, and interviews conducted throughout the duration of this advert therefore we may at any time bring the closing date forward. We encourage all interested applicants to apply as soon as practical.

We actively recruit citizens of all backgrounds, but the nature of our work in this specific area means that nationality, residency and security requirements are more tightly defined than others. To work in this role, you will need to have a DV clearance with no restrictions, or you must have the ability to obtain a DV clearance.


J-18808-Ljbffr

Apply
Create E-mail Alert
Job alert activated
Saved
Save
See more jobs
Similar jobs
jobs Solihull
jobs West Midlands
jobs England
Home > Jobs > Vulnerability Researcher (UKTL)

About Jobijoba

  • Career Advice
  • Company Reviews

Search for jobs

  • Jobs by Job Title
  • Jobs by Industry
  • Jobs by Company
  • Jobs by Location
  • Jobs by Keywords

Contact / Partnership

  • Contact
  • Publish your job offers on Jobijoba

Legal notice - Terms of Service - Privacy Policy - Manage my cookies - Accessibility: Not compliant

© 2026 Jobijoba - All Rights Reserved

Apply
Create E-mail Alert
Job alert activated
Saved
Save