At a Glance
- Tasks: Architect and deliver cloud-scale DDoS protection with cutting-edge technologies.
- Company: Join OCI's innovative Edge Security team with a collaborative culture.
- Benefits: Competitive salary, health benefits, remote work, and opportunities for professional growth.
- Why this job: Make a real impact on global security while working with advanced tech.
- Qualifications: 7-10 years in backend systems, strong Linux networking, and DevOps experience required.
- Other info: Dynamic environment with excellent career growth and mentorship opportunities.
The predicted salary is between 48000 - 72000 Β£ per year.
Join OCI's Edge Security team as a Principal Engineer to architect and deliver cloud-scale DDoS protection. You'll lead design for high-performance detection and mitigation systems, drive automation and operational excellence, and set the technical direction for customer-facing DDoS capabilities across OCI's global edge.
This role requires deep expertise in Linux networking data path and kernel-level networking (such as XDP, eBPF, DPDK, iptables, nftables), in addition to strong systems and DevOps engineering experience.
Basic qualifications:- 7β10 years building production backend systems, including 3β5 years in high-scale and/or low-latency environments.
- Deep expertise in Linux networking data path and kernel-level networking (e.g., XDP, eBPF, DPDK, iptables, nftables) for traffic processing, filtering, and observability.
- Proficiency in one or more: Java/Python/C++/Rust/Go (strong preference for Java for control-plane/services).
- Deep systems design expertise: concurrency, memory management, performance tuning, API design, consistency models, and distributed systems fundamentals.
- Proven DevOps leadership at scale: CI/CD, automated testing, canarying, rollout/rollback, configuration management.
- Strong IaC experience (e.g., Terraform) and solid cloud infrastructure fundamentals.
- Domain experience in DDoS or network security services and common attack/defense patterns.
- Advanced networking knowledge: TCP/IP, IPv4/IPv6, BGP, routing policy; DNS fundamentals.
- Demonstrated operational excellence and observability practices (metrics, tracing, alerting).
- Expertise with anycast routing, global traffic steering, and multi-region service readiness.
- Experience with SDN, programmable data planes, or hardware mitigation platforms.
- Building high-rate telemetry/streaming pipelines for near-real-time detection (packet/flow analytics).
- Background in resilience engineering, chaos testing, disaster recovery, and capacity planning at hyperscale.
- Containerization/orchestration (e.g., Kubernetes) and secure service-to-service communication (mTLS, policy enforcement).
- Familiarity with zero trust, segmentation, and modern security architectures; exposure to compliance frameworks and audit preparation.
- Deliver core DDoS detection/mitigation that protects OCI's Tier 0 availability and customer trust.
- Launch customer-facing DDoS offerings with self-service policy, visibility, and strong defaults.
- Raise engineering quality, automation, and compliance maturity across the stack; mentor and grow the team's technical bar.
- Security and privacy by design with auditable controls and policy adherence from day one.
- Data-driven delivery with clear KPIs, SLOs, and stage gates from prototype to GA.
- Collaborative, inclusive culture emphasizing design docs, code reviews, and knowledge sharing.
- Lead architecture and delivery of low-latency backend services for DDoS detection, classification, and mitigation.
- Define and evolve scalable data/control planes (policy, signaling, telemetry, orchestration) with strong fault isolation, resiliency, and compliance-by-design.
- Own traffic engineering strategy (anycast, BGP policy, routing integration) and partner with networking, DNS, and edge platform teams.
- Set operational standards: SLOs/SLAs, on-call health, incident response (including incident commander duties), runbooks, and post-incident learning.
- Drive automation at scale: CI/CD strategy, test frameworks, progressive delivery (canary/blue-green), and infrastructure-as-code.
- Establish robust observability (metrics, logs, traces) and capacity/scale models for high-throughput, highly available services.
- Lead threat modeling, architecture reviews, and audit readiness for Tier 0 services; ensure security and privacy are embedded through the lifecycle.
- Mentor engineers, influence cross-org roadmaps, and collaborate with Product, SRE, and Network Engineering from concept to GA.
Principal Software Engineer (DevOps) in Shrewsbury employer: Oracle
Contact Detail:
Oracle Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Principal Software Engineer (DevOps) in Shrewsbury
β¨Tip Number 1
Network with industry professionals! Attend meetups, webinars, or conferences related to DevOps and cloud security. This is a great way for us to get our name out there and learn about potential job openings before theyβre even advertised.
β¨Tip Number 2
Showcase your skills through projects! Build a portfolio that highlights your expertise in Linux networking and DevOps practices. We can use platforms like GitHub to share our work and demonstrate our capabilities to potential employers.
β¨Tip Number 3
Prepare for technical interviews by practising coding challenges and system design questions. We should focus on areas like concurrency, API design, and performance tuning, as these are crucial for the Principal Software Engineer role.
β¨Tip Number 4
Apply directly through our website! Itβs often the best way to ensure your application gets seen by the right people. Plus, we can tailor our applications to highlight how our skills align with the specific needs of the role.
We think you need these skills to ace Principal Software Engineer (DevOps) in Shrewsbury
Some tips for your application π«‘
Tailor Your CV: Make sure your CV reflects the skills and experiences that match the job description. Highlight your expertise in Linux networking, DevOps practices, and any relevant programming languages like Java or Python. We want to see how you fit into our team!
Craft a Compelling Cover Letter: Use your cover letter to tell us why you're passionate about DDoS protection and cloud security. Share specific examples of your past work that align with the role, and donβt forget to mention how you can contribute to our mission at OCI.
Showcase Your Projects: If you've worked on projects related to DDoS mitigation or high-performance systems, make sure to include them! We love seeing real-world applications of your skills, especially if they demonstrate your ability to drive automation and operational excellence.
Apply Through Our Website: We encourage you to apply directly through our website for the best chance of getting noticed. Itβs the easiest way for us to keep track of your application and ensure it reaches the right people. Donβt miss out!
How to prepare for a job interview at Oracle
β¨Know Your Tech Inside Out
Make sure youβre well-versed in the key technologies mentioned in the job description, like Linux networking, eBPF, and Java. Brush up on your knowledge of DDoS protection mechanisms and be ready to discuss how you've applied these in past projects.
β¨Showcase Your Leadership Skills
As a Principal Engineer, you'll need to demonstrate your ability to lead and mentor. Prepare examples of how you've driven automation and operational excellence in previous roles, and be ready to discuss your approach to team collaboration and knowledge sharing.
β¨Prepare for Technical Deep Dives
Expect technical questions that dive deep into systems design, performance tuning, and API design. Practice explaining complex concepts clearly and concisely, as you may need to walk the interviewers through your thought process during problem-solving scenarios.
β¨Understand the Company Culture
Research OCI's Edge Security team and their approach to security and privacy by design. Be prepared to discuss how you align with their collaborative culture and how you can contribute to their goals, especially around metrics, SLOs, and compliance.