£75000 - £80000 per annum + Competitive Package
almost 2 years ago
This role requires some with DV Clearance or someone that is eligible and happy to go through the vetting process
This is an exciting opportunity to be a part of the largest telecommunications equipment manufacturer in the world. They develop world-leading enterprise, carrier and consumer devices and sell to 45 of the top 50 operators world-wide including leading UK providers. Products range from the latest Android smart phones and dongles through to large core network telecommunications solutions.
You will be joining an established Cyber Security Evaluation Centre in a historic market town based in Oxfordshire with a team of highly-skilled security analysts seeking to improve the overall security of Huawei core telecommunications products.
Experience with Linux
Static Code Analysis
Including understanding exploit mitigations, etc
Understanding of Network Protocols (IP, TCP, UDP, DHCP, DNS, etc)
About the Job:
Working in, or leading small multi-discipline teams you will set about the evaluation of core telecommunications products.
Ethical hacking & Vulnerability research
Source Code analysis
Security Design analysis
Development of bespoke cyber security evaluation capabilities
You will help develop its capability by further up-skilling our most senior security analysts. You will take a lead in security research - in static analysis, semantic analysis, dynamic analysis, reverse engineering, symbolic execution - the list is long! You will be given the opportunity to take real ownership of the work you wish to specialise in. We are looking for someone with a minimum experience of working with C++ and someone who has the ability to find new 0-day software vulnerabilities using techniques such as coding and variant analysis.
What we expect:
We expect a vulnerability researcher - someone who has 'been there, done that'. We expect this individual to support the learning and development of our teams. Proficiency in telecommunications is highly desirable, but experience in a non-Windows environment is a must. Active vulnerability research and exploitation activities are focussed within the telecommunications core - the LTE network, the mobile core, the super-fast broadband network, the backhaul and many other topologies. We have different architectures - SPARC, MIPS, ARM and a range of custom ASICs. There probably isn't a tool for what you want to do - we expect you to create one.