At a Glance
- Tasks: Architect and deliver cloud-scale DDoS protection with cutting-edge technologies.
- Company: Join OCI's innovative Edge Security team with a collaborative culture.
- Benefits: Competitive salary, health benefits, remote work, and professional development opportunities.
- Why this job: Make a real impact on customer trust and security in a dynamic environment.
- Qualifications: 7-10 years in backend systems, strong Linux networking, and DevOps experience required.
- Other info: Mentorship opportunities and excellent career growth in a fast-paced tech landscape.
The predicted salary is between 54000 - 84000 £ per year.
Join OCI's Edge Security team as a Principal Engineer to architect and deliver cloud-scale DDoS protection. You'll lead design for high-performance detection and mitigation systems, drive automation and operational excellence, and set the technical direction for customer-facing DDoS capabilities across OCI's global edge.
This role requires deep expertise in Linux networking data path and kernel-level networking (such as XDP, eBPF, DPDK, iptables, nftables), in addition to strong systems and DevOps engineering experience.
Basic qualifications:- 7–10 years building production backend systems, including 3–5 years in high-scale and/or low-latency environments.
- Deep expertise in Linux networking data path and kernel-level networking (e.g., XDP, eBPF, DPDK, iptables, nftables) for traffic processing, filtering, and observability.
- Proficiency in one or more: Java/Python/C++/Rust/Go (strong preference for Java for control-plane/services).
- Deep systems design expertise: concurrency, memory management, performance tuning, API design, consistency models, and distributed systems fundamentals.
- Proven DevOps leadership at scale: CI/CD, automated testing, canarying, rollout/rollback, configuration management.
- Strong IaC experience (e.g., Terraform) and solid cloud infrastructure fundamentals.
- Domain experience in DDoS or network security services and common attack/defense patterns.
- Advanced networking knowledge: TCP/IP, IPv4/IPv6, BGP, routing policy; DNS fundamentals.
- Demonstrated operational excellence and observability practices (metrics, tracing, alerting).
- Expertise with anycast routing, global traffic steering, and multi-region service readiness.
- Experience with SDN, programmable data planes, or hardware mitigation platforms.
- Building high-rate telemetry/streaming pipelines for near-real-time detection (packet/flow analytics).
- Background in resilience engineering, chaos testing, disaster recovery, and capacity planning at hyperscale.
- Containerization/orchestration (e.g., Kubernetes) and secure service-to-service communication (mTLS, policy enforcement).
- Familiarity with zero trust, segmentation, and modern security architectures; exposure to compliance frameworks and audit preparation.
- Deliver core DDoS detection/mitigation that protects OCI's Tier 0 availability and customer trust.
- Launch customer-facing DDoS offerings with self-service policy, visibility, and strong defaults.
- Raise engineering quality, automation, and compliance maturity across the stack; mentor and grow the team's technical bar.
- Security and privacy by design with auditable controls and policy adherence from day one.
- Data-driven delivery with clear KPIs, SLOs, and stage gates from prototype to GA.
- Collaborative, inclusive culture emphasizing design docs, code reviews, and knowledge sharing.
- Lead architecture and delivery of low-latency backend services for DDoS detection, classification, and mitigation.
- Define and evolve scalable data/control planes (policy, signaling, telemetry, orchestration) with strong fault isolation, resiliency, and compliance-by-design.
- Own traffic engineering strategy (anycast, BGP policy, routing integration) and partner with networking, DNS, and edge platform teams.
- Set operational standards: SLOs/SLAs, on-call health, incident response (including incident commander duties), runbooks, and post-incident learning.
- Drive automation at scale: CI/CD strategy, test frameworks, progressive delivery (canary/blue-green), and infrastructure-as-code.
- Establish robust observability (metrics, logs, traces) and capacity/scale models for high-throughput, highly available services.
- Lead threat modeling, architecture reviews, and audit readiness for Tier 0 services; ensure security and privacy are embedded through the lifecycle.
- Mentor engineers, influence cross-org roadmaps, and collaborate with Product, SRE, and Network Engineering from concept to GA.
Principal Software Engineer (DevOps) in Lincoln employer: Oracle
Contact Detail:
Oracle Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Principal Software Engineer (DevOps) in Lincoln
✨Tip Number 1
Network with industry professionals! Attend meetups, webinars, or conferences related to DevOps and cloud security. This is a great way to get your name out there and learn about job openings that might not be advertised.
✨Tip Number 2
Showcase your skills through personal projects or contributions to open-source. Build something that demonstrates your expertise in Linux networking or DDoS mitigation. This can really set you apart when you’re chatting with potential employers.
✨Tip Number 3
Prepare for technical interviews by brushing up on your systems design and coding skills. Practice common interview questions related to concurrency, performance tuning, and API design. We recommend using platforms like LeetCode or HackerRank to sharpen your skills.
✨Tip Number 4
Don’t forget to apply through our website! We’ve got loads of opportunities that match your skills. Plus, it’s a great way to ensure your application gets seen by the right people. Let’s get you that Principal Software Engineer role!
We think you need these skills to ace Principal Software Engineer (DevOps) in Lincoln
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the skills and experiences that match the job description. Highlight your expertise in Linux networking, DevOps practices, and any relevant programming languages like Java or Python. We want to see how you fit into our team!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about DDoS protection and how your background aligns with our mission at OCI. Be sure to mention specific projects or achievements that showcase your capabilities.
Showcase Your Technical Skills: In your application, don't shy away from detailing your technical skills. Whether it's your experience with CI/CD, Terraform, or advanced networking knowledge, we want to know how you can contribute to our team’s success in delivering top-notch DDoS solutions.
Apply Through Our Website: We encourage you to apply directly through our website for the best chance of getting noticed. It helps us keep track of applications and ensures you’re considered for the role. Plus, it’s super easy to do!
How to prepare for a job interview at Oracle
✨Know Your Tech Inside Out
Make sure you brush up on your knowledge of Linux networking data paths and kernel-level networking. Be ready to discuss specific technologies like XDP, eBPF, and DPDK, as well as how they relate to DDoS protection. The more you can demonstrate your expertise, the better!
✨Showcase Your DevOps Experience
Prepare to talk about your experience with CI/CD, automated testing, and infrastructure-as-code tools like Terraform. Have examples ready that highlight your leadership in driving operational excellence and automation at scale. This will show that you can lead the charge in improving processes.
✨Demonstrate Problem-Solving Skills
Be ready to tackle hypothetical scenarios related to DDoS attacks or network security challenges. Think through your approach to threat modelling and incident response, and be prepared to explain your thought process clearly. This will showcase your analytical skills and readiness for real-world challenges.
✨Emphasise Collaboration and Mentorship
Since this role involves mentoring and collaborating with various teams, share examples of how you've successfully worked with others in the past. Highlight any experiences where you’ve raised the technical bar for your team or contributed to a collaborative culture. This will show you’re not just a tech whiz but also a team player.