15h Left: Principal Security Engineer

Virgin Media Ltd
London
1 day ago
Create job alert

We are seeking a Principal Security Engineer to leadand drive security engineering efforts across our cloud andapplication environments. This strategic, hands-on role requiresexpertise in cloud security, secure development practices, and theimplementation of advanced security controls. You will serve as aleader within the Consumer Security Engineering team, drivingsecurity initiatives across cloud platforms, microservicearchitectures, digital products, application security, andenterprise security. You will define and build comprehensivesecurity strategies in collaboration with developers, DevSecOpsengineers, ensuring that security is seamlessly integrated into ourCI/CD pipelines and all layers of infrastructure. Additionally, youwill supervise security tool management and ensure cyber resiliencyfor consumer applications. A deep understanding of Google CloudSecurity, Application Security, API security, and customer securitysystems is crucial. Key Responsibilities: 1. Design and ImplementSecurity Strategy: Develop and implement the security strategy forcloud platforms, microservice-based applications, and CI/CDenvironments, with a focus on both application and enterprisesecurity. 2. Ownership of Consumer Security Capabilities: Own theconsumer security capabilities and tools (WAFs, GCP SecurityControls, Customer Identity Protection, IAM, Encryption etc.) byestablishing a clear operating model that ensures all teams areengaged and actively adopting industry-standard security designs.3. Enforce Security Best Practices: Build and enforce security bestpractices across Google Cloud Platform (GCP) environments, ensuringrobust identity and access management (IAM), network security, andencryption, in compliance with industry standards. 4. IntegrateApplication Security: Drive the integration of application securitypractices, including secure coding and vulnerability management,throughout the software development lifecycle for all the projects.5. Drive Security Tool Implementation: Lead the evaluation,selection, and implementation of enterprise security tools andtechnologies that align with organizational business and securityrequirements, while owning and operating these tools effectively.6. Maintain Cyber Resiliency and Recovery: Develop and implementstrategies to maintain cyber resiliency and recovery for consumerorganisation, ensuring the organisation can withstand and recoverfrom security incidents. 7. Build Reusable Security Controls:Create and promote reusable security controls that can be appliedacross multiple projects and platforms to enhance securityefficiency. 8. Security Metrics Delivery and Improvements: Develop,deliver, and continuously enhance security metrics to evaluate theeffectiveness of security initiatives, drive accountability, andinform data-driven decision-making across the organization. Themust haves In order to be considered, you must have the followingexperience; - Proven experience as a Principal Security Engineer orsimilar role, with hands-on experience in security architecture,engineering, and operations. - Expertise in Google Cloud Platform(GCP) security, with knowledge of AWS and/or Azure securitypractices as a plus. - Strong background in DevSecOps, withexperience in integrating security into CI/CD pipelines using toolslike Jenkins, GitLab, or similar. - Experience implementing andmanaging SAST/DAST tools and processes to secure applicationdevelopment. - Deep understanding of application security,including secure coding practices, OWASP Top 10, and API securitystandards. - Knowledge of Customer Identity and Access Management(CIAM) solutions and API security frameworks. - Knowledge of one ormore programming languages with the ability to review and implementsecure code. - Strong understanding of security automation,orchestration, and continuous monitoring tools (e.g., SIEM, SOAR).Next steps If we feel like a place where you can belong, we'd loveto learn more about you as a person and your experience to date.Once you've submitted an application the next steps of the process,if successful, are likely to include an initial introductory callfollowed by two technical rounds. When you apply, you'll be askedabout any adjustments you might need to support the recruitmentprocess. Let us know, and we'll be sure to discuss it with you.Please note: Applications will be reviewed, and interviewsconducted throughout the duration of this advert, therefore we maybring the closing date forward. We encourage all interestedapplicants to apply as soon as possible. If you’re offered a jobwith us, it will be conditional, based on the passing of backgroundchecks. All roles require a criminal record check and some rolesneed a financial probity check. Your recruiter can provide you withmore information if needed. Thanks for your patience and forshowing an interest in joining the Virgin Media O2 family.#J-18808-Ljbffr

Related Jobs

View all jobs

▷ 15h Left! Information Security Engineer

▷ [15h Left] Network and Security Engineer - Engage inhybrid working flexibility (Previous Relevant Experince...

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.

Cyber Security Jobs in the Public Sector: Protecting the UK’s Digital Future

Cyber threats have grown exponentially in recent years, targeting both private businesses and government institutions. As technology becomes ever more embedded in daily life—managing everything from national security to healthcare records—the risk of cyber attacks also increases. In the UK public sector, where vital services and sensitive citizen data are at stake, cyber security has become a top priority. For professionals looking for a meaningful career at the intersection of technology, national security, and public service, cyber security jobs in the UK public sector present an exciting and fulfilling path. In this blog post, we’ll delve into why cyber security is so critical to government agencies, the most in-demand roles, the skills and qualifications required, and how to navigate the application process. By the end, you’ll have a clearer sense of how you can leverage your technical expertise to protect the nation’s digital infrastructure.