Research Computing Lead

University of Glasgow
Glasgow
1 month ago
Applications closed

Related Jobs

View all jobs

Senior Security Engineer, ReSec Red Team

Security Software Engineer

Junior Cyber Security Engineer

Junior Cyber Security Engineer

Junior Cyber Security Engineer

Firewall Engineer

Job Purpose

The CoSE IT Research Computing Lead is responsible for leading the operational support for research computing systems in the College of Science and Engineering (CoSE), ensuring the highest standards of performance, scalability, and security. The role holder will lead a team and will possess a broad range of expertise in research computing technologies and collaborate with IT professionals and academics to enhance research and teaching through continuous improvement and innovation.

Main Duties and Responsibilities

  1. Lead and manage a team of IT Systems Engineers to ensure a secure high-quality College Research Computing function that meets technological advancements, College needs, and University policies.
  2. Plan and organise workload priorities for the Team, determining individual and/or team objectives.
  3. Work with the Principal Engineer(s) to agree a planned 18-month road map for evolving the services offered ensuring measures are in place to support the timely and budget-friendly delivery for cutting-edge research support.
  4. Introduce and support new systems and applications to inform innovative working practices, enabling complex research to be conducted and to deliver increased efficiencies and/or value.
  5. Work with College Service Resilience Team and University’s Chief Information Security Officer to secure research computing systems and data, developing and implementing recovery protocols as needed.
  6. Keep abreast of technological advancements within the field, provide expert guidance on operational practices and emerging threats/opportunities, helping shape the function's strategic direction.
  7. Work with the Principal Engineer(s) to manage multiple complex Research Computing/Cluster-based projects, ensuring timely and budget-friendly delivery for cutting-edge research support.
  8. Conduct analysis, present results and make recommendations through briefings, presentations or written reports to CoSE IT Leadership and College Leadership to inform decision making.
  9. Ensure service accessibility and compliance with relevant legislation, addressing recommendations from audits or compliance bodies, and manage staff effectively to support service delivery.
  10. Serve as a catalyst for change, leading College and University IT initiatives, promoting collaborative approaches, and championing the implementation of collective strategies like Research Computing as a Service.
  11. Any other duties and projects, appropriate to the grade, required by the Line Manager or Head of College IT.

Knowledge, Qualifications, Skills and Experience

Qualifications

Essential

A1 Ability to demonstrate the competencies required to undertake the duties associated with this level of post having acquired the necessary knowledge and skills in a similar or number of different roles. Or: Scottish Credit and Qualification Framework level 9, (Ordinary Degree, Scottish Vocational Qualification level 4), or equivalent (including professional accreditation with relevant formal training), and experience of personal development in a similar or related role(s).

Desirable

B1 Relevant professional certifications from recognised technical bodies, e.g. CompTIA Linux+ or RHCP.

Knowledge, Skills, and Experience

Essential

  1. Substantial experience in a technical or people management role in IT Infrastructure supporting research computing technology (i.e. applications, software engineering, storage, advanced instrumentations, visualisation, data analytics and management systems).
  2. Awareness of the computing requirements of researchers with a high-level of ability and broad range of data processing needs.
  3. Knowledge of scientific computing packages, their installation and operation, e.g. LAPACK, OpenMPI, CUDA.
  4. Proficient in utilising scripting languages, such as Windows PowerShell/Linux shell script.
  5. Ability to demonstrate knowledge of the architecture of several cluster design and the advantages of each.
  6. Have a deep understanding of the hardware and software components in a cluster e.g. the queueing system (Slurm, SGE, PBS etc).
  7. Excellent technical knowledge across a range of IT areas with specialist in depth knowledge of Linux/Unix enterprise server and storage technology.
  8. Highly effective communication and interpersonal skills, demonstrating creative and innovative thinking which will contribute to a world class research environment.
  9. Sound knowledge of cutting-edge technologies which will ensure our research platforms stay current and appropriate.
  10. Expert technical problem-solving skills gained over a substantial period of working at higher levels of complexity and influence.
  11. Proficient in organising and maintaining computing resources, managing multiple systems concurrently and in a timely manner to adhere to deadlines.
  12. Excellent analytical skills with confidence to challenge and continually improve, diving into the detail as necessary to understand issues (people, process, and technology).
  13. Ability to build and maintain broad network of business relationships with a good knowledge of customer behaviours, needs and expectations building an environment of trust/integrity.
  14. Proven people management skills.
  15. Be able to set clear technical requirements to achieve goals, delegate tasks, provide feedback, and be able to lead and motivate a team of professionals.
  16. Experience of working collaboratively with senior technical and non-technical colleagues with the ability to influence and negotiate at all levels including colleagues who are not part of the direct team.
  17. Experience of making informed decisions under pressure by balancing requirements with technical risk.
  18. Experience in identifying emerging technological influences/disruptors and informing the senior stakeholders of the impact of these in technical/architectural roadmaps and strategic plans.

Desirable

  1. Prior experience of working in a University or Higher Education environment.
  2. Proven experience in driving sustainable behaviour and culture change through processes or methodologies.
  3. Delivery of projects using Agile tools and techniques.
  4. Experience of informing the strategic aims of the function by contributing to the strategic planning round documentation/process.
  5. Experience in managing the full lifecycle of research computing services from initial concept through operational leading to its eventual decommissioning.
  6. Have a good understanding of IT security and resilience, including risk assessment, vulnerability management, major incident response, and backup/recovery strategies and disaster recovery.

Terms and Conditions

Salary will be Grade 7, £40,497 - £45,413 per annum.

This post is full time (35 hours per week) and open ended (permanent).

The University of Glasgow has a responsibility to ensure that all employees are eligible to live and work in the UK. If you require a Skilled Worker visa to work in the UK, you will be required to meet the eligibility requirements of the visa route to be assigned a Certificate of Sponsorship.

Please note that this post may be eligible to be sponsored under the Skilled Worker visa route if tradeable points can be used under the Skilled Worker visa rules. For more information please visit:https://www.gov.uk/skilled-worker-visa.

Closing Date: 31 March 2025 at 23:45

#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.