Infrastructure Security Engineer

Modal Modal · Data AI · New York, NY · Engineering

Modal is an AI infrastructure company that provides GPU access, fast container startups, and native storage for training models, running batch jobs, and serving low-latency inference. They are seeking an Infrastructure Security Engineer to design and secure their core systems, focusing on building security into their multi-tenant, cloud-native platform. The role involves securing isolation mechanisms, container orchestration, identity and access management, secrets management, and cloud environments, working closely with engineering teams to ensure resilience and trustworthiness.

What you'd actually do

  1. Design and improve isolation mechanisms for multi-tenant workloads (containers, sandboxing, execution environments)
  2. Secure and harden containerized workloads and orchestration systems (e.g., Kubernetes or similar)
  3. Design and improve authentication and authorization systems across services
  4. Build and maintain systems for securely managing secrets, tokens, and credentials
  5. Secure cloud environments across providers (AWS, GCP, etc.) with a focus on consistency and portability

Skills

Required

  • Experience securing cloud-native infrastructure and distributed systems in production
  • Background in infrastructure, backend, or security engineering
  • Experience working in multi-tenant or high-scale environments
  • Strong understanding of containerization and orchestration systems (e.g., Kubernetes or similar)
  • Experience designing or securing isolation mechanisms in multi-tenant systems
  • Solid understanding of authentication, authorization, and service identity models
  • Experience with secrets management and secure handling of credentials
  • Strong foundation in networking concepts (segmentation, service communication, access boundaries)

Nice to have

  • Experience with sandboxing or runtime isolation technologies (e.g., gVisor, Firecracker, seccomp, or similar)
  • Familiarity with kernel-level or low-level isolation primitives
  • Experience securing Kubernetes or similar orchestration systems in production
  • Background in developer infrastructure, compute platforms, or multi-tenant systems

What the JD emphasized

  • multi-tenant
  • production
  • cloud-native
  • container isolation
  • orchestration systems
  • multi-tenant systems
  • secrets management
  • secure handling of credentials
  • networking concepts