Description Senior Principal Security Engineer Do you have a passion for building rapid prototypes and develop compelling visualizations that explain how complex systems work considering security threat scenarios? We are looking for a Senior Principal Software Engineer who has Security Research expertise, with the right mix of software development experience, security research knowhow, and passion for solving complex security-oriented problems by conducting exploratory development to answer, “what if” and “how does this work” type of questions in large and complex systems. We value self-initiated software engineers and/or security researchers who have a passion to learn, build and iteratively deploy production quality software. Work You’ll Do Your responsibilities include contributing towards the design and the implementation of prototypes and visualizations that help answer executive questions related to complex systems and helping inform how certain complex systems work in practice, considering security needs and threat scenarios. Collaboration with other senior members of the Chief Technology Office as well as other teams within the Software Assurance organization is a must. What You’ll Bring Bachelor or master’s degree in Computer Science, Software Engineering, Security Research or related disciplines 12 years of programming experience using languages such as Java, C/C++, Java and/or Python 6 years of security research experience Solid conceptual knowledge (e.g., data structures, programming languages design, distributed systems etc.) and practical skills for writing efficient code Passion for software development and problem solving, along with a can-do attitude for solving technical challenges Experience using common security assessment tools and techniques in one or more the following categories: Mobile Application Assessment (iOS / Android) Reverse Engineering (e.g. IDA Pro/Ghidra/Frida) Fuzzing (e.g. Jazzer/AFL/Peach) Web Application assessment (e.g. BurpSuite Proxy, ZAP, REST API testing) Knowledge of common vulnerabilities in different types of software and programming languages, including: How to test for/exploit them Real world mitigations that can be applied Familiarity with vulnerability classification frameworks (e.g. OWASP Top 10) Excellence in rapid prototyping and developing compelling visualizations Effective and precise communicator at the executive level Eligibility to work in UK without sponsorship is essential Nice to Have Experience working in a large cloud or Internet software company Experience working with geographically distributed teams Experience leading teams What We'll Give You A team of very skilled and diverse personnel across the globe Ability to work in a hybrid environment Exposure to mind blowing large-scale cutting-edge systems The resources of a large, global operation while still having the small, start-up feel of a smaller team day to day Develop new skills and competencies working with our vast cloud product offerings Ongoing extensive training and skills development to further your career aspirations Incredible benefits and company perks An organization filled with smart, enthusiastic, and motivated colleagues The opportunity to impact and improve our systems and delight our customers Career Level - IC5 Responsibilities Responsible for expert planning, design and build of security systems, applications, environments and architectures; oversees the implementation of security systems, applications, environments and architectures and ensures compliance with information security standards and corporate security policies and procedures. Evaluates existing and proposed technical architectures for security risk, provides expert technical advice to support the design and development of secure architectures and recommends security controls to mitigate those risks. Evaluations of internal security architecture may include design assessment, risk assessment, and threat modeling. Provides expert technical advice and direction to support the design and development of secure architectures. Maintain expert proficiency in emerging trends in information security. Determine the best practices for the large-scale Big Data infrastructure used by some Oracle LOBs, including tooling, data architecture, and content. May lead incident management teams and provide expert level incident management expertise. Coordinates incidents with other business units and may act as incident commander of multiple serious incidents. Leads development of new methods, playbooks and provide thought-leadership related to incident management throughout Oracle. May provide leadership in an incident management team, bringing expert-level skills to respond to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may act as Incident Commander on multiple serious incidents. Leads development of new methods, and playbooks, as well as highly sophisticated scripts, applications, and tools. Trains and mentors other staff, and may supervise incident management teams. Brings expert-level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required, but no computer programming/scripting knowledge is required. Leads development of highly sophisticated scripts, applications, and tools, and trains others in their use. Focus on operational and strategic level tasks, and provide counsel and guidance to the junior level security operations engineers in the department.