At a Glance
- Tasks: Lead the design and delivery of cutting-edge DDoS protection systems in a collaborative environment.
- Company: Join OCI’s innovative Edge Security team focused on cloud-scale solutions.
- Benefits: Enjoy competitive pay, flexible work options, and opportunities for professional growth.
- Why this job: Make a real impact by protecting customer trust with advanced security technologies.
- Qualifications: 7-10 years in backend systems, strong Linux networking, and DevOps experience required.
- Other info: Dynamic role with mentorship opportunities and a focus on operational excellence.
The predicted salary is between 36000 - 60000 £ per year.
Join OCI’s Edge Security team as a Principal Engineer to architect and deliver cloud-scale DDoS protection. You’ll lead design for high-performance detection and mitigation systems, drive automation and operational excellence, and set the technical direction for customer-facing DDoS capabilities across OCI’s global edge.
This role requires deep expertise in Linux networking data path and kernel-level networking (such as XDP, eBPF, DPDK, iptables, nftables), in addition to strong systems and DevOps engineering experience.
Basic qualifications- 7–10 years building production backend systems, including 3–5 years in high-scale and/or low-latency environments.
- Deep expertise in Linux networking data path and kernel-level networking (e.g., XDP, eBPF, dpdk, iptables, nftables) for traffic processing, filtering, and observability.
- Proficiency in one or more: Java/Python/C++/Rust/Go (strong preference for Java for control-plane/services).
- Deep systems design expertise: concurrency, memory management, performance tuning, API design, consistency models, and distributed systems fundamentals.
- Proven DevOps leadership at scale: CI/CD, automated testing, canarying, rollout/rollback, configuration management.
- Strong IaC experience (e.g., Terraform) and solid cloud infrastructure fundamentals.
- Domain experience in DDoS or network security services and common attack/defense patterns.
- Advanced networking knowledge: TCP/IP, IPv4/IPv6, BGP, routing policy; DNS fundamentals.
- Demonstrated operational excellence and observability practices (metrics, tracing, alerting).
- Expertise with anycast routing, global traffic steering, and multi-region service readiness.
- Experience with SDN, programmable data planes, or hardware mitigation platforms.
- Building high-rate telemetry/streaming pipelines for near-real-time detection (packet/flow analytics).
- Background in resilience engineering, chaos testing, disaster recovery, and capacity planning at hyperscale.
- Containerization/orchestration (e.g., Kubernetes) and secure service-to-service communication (mTLS, policy enforcement).
- Familiarity with zero trust, segmentation, and modern security architectures; exposure to compliance frameworks and audit preparation.
- Deliver core DDoS detection/mitigation that protects OCI’s Tier 0 availability and customer trust.
- Launch customer-facing DDoS offerings with self-service policy, visibility, and strong defaults.
- Raise engineering quality, automation, and compliance maturity across the stack; mentor and grow the team’s technical bar.
- Security and privacy by design with auditable controls and policy adherence from day one.
- Data-driven delivery with clear KPIs, SLOs, and stage gates from prototype to GA.
- Collaborative, inclusive culture emphasizing design docs, code reviews, and knowledge sharing.
- Lead architecture and delivery of low-latency backend services for DDoS detection, classification, and mitigation.
- Define and evolve scalable data/control planes (policy, signaling, telemetry, orchestration) with strong fault isolation, resiliency, and compliance-by-design.
- Own traffic engineering strategy (anycast, BGP policy, routing integration) and partner with networking, DNS, and edge platform teams.
- Set operational standards: SLOs/SLAs, on-call health, incident response (including incident commander duties), runbooks, and post-incident learning.
- Drive automation at scale: CI/CD strategy, test frameworks, progressive delivery (canary/blue-green), and infrastructure-as-code.
- Establish robust observability (metrics, logs, traces) and capacity/scale models for high-throughput, highly available services.
- Lead threat modeling, architecture reviews, and audit readiness for Tier 0 services; ensure security and privacy are embedded through the lifecycle.
- Mentor engineers, influence cross-org roadmaps, and collaborate with Product, SRE, and Network Engineering from concept to GA.
Principal Software Engineer (DevOps) in Doncaster employer: Oracle
Contact Detail:
Oracle Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Principal Software Engineer (DevOps) in Doncaster
✨Tip Number 1
Network with industry professionals! Attend meetups, webinars, or conferences related to DevOps and cloud security. This is a great way to get your name out there and learn about job openings that might not be advertised.
✨Tip Number 2
Showcase your expertise! Create a portfolio or GitHub repository highlighting your projects, especially those involving Linux networking and DDoS mitigation. This gives potential employers a clear view of your skills and experience.
✨Tip Number 3
Prepare for technical interviews by brushing up on key concepts like TCP/IP, BGP, and infrastructure as code. Practice coding challenges in Java or Python to demonstrate your proficiency in the languages mentioned in the job description.
✨Tip Number 4
Apply through our website! We love seeing candidates who are genuinely interested in joining our team. Tailor your application to highlight your relevant experience in DDoS protection and operational excellence.
We think you need these skills to ace Principal Software Engineer (DevOps) in Doncaster
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Principal Software Engineer role. Highlight your experience with Linux networking, DevOps practices, and any relevant projects that showcase your skills in DDoS protection and cloud-scale systems.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about DDoS protection and how your background aligns with our needs. Don’t forget to mention specific technologies you’ve worked with, like Java or Terraform.
Showcase Your Achievements: When detailing your experience, focus on achievements rather than just responsibilities. Quantify your impact where possible—like improvements in system performance or successful project completions—to really grab our attention.
Apply Through Our Website: We encourage you to apply through our website for the best chance of being noticed. It’s the easiest way for us to keep track of your application and ensure it gets to the right people!
How to prepare for a job interview at Oracle
✨Know Your Tech Inside Out
Make sure you’re well-versed in Linux networking and kernel-level concepts like XDP, eBPF, and DPDK. Brush up on your knowledge of TCP/IP and BGP as well, since these are crucial for the role. Being able to discuss these topics confidently will show that you’re the right fit for the team.
✨Showcase Your DevOps Experience
Prepare to talk about your experience with CI/CD, automated testing, and infrastructure as code, especially with tools like Terraform. Have specific examples ready that demonstrate how you've driven operational excellence and automation in previous roles. This will highlight your leadership capabilities in a DevOps environment.
✨Demonstrate Problem-Solving Skills
Be ready to tackle hypothetical scenarios related to DDoS attacks or network security challenges during the interview. Think through your approach to threat modelling and incident response, as this will showcase your analytical skills and ability to think on your feet.
✨Cultural Fit Matters
Research the company’s culture and values, especially their emphasis on collaboration and knowledge sharing. Be prepared to discuss how you’ve contributed to a positive team environment in the past. This will help you connect with the interviewers and show that you align with their ways of working.