Principal Engineer, Software Supply Chain Security

GitLab GitLab · Enterprise · Canada +4 · Remote · Sec Engineering

Principal Engineer, Software Supply Chain Security at GitLab. This role focuses on owning the technical strategy for securing the software build and delivery process on GitLab's DevSecOps platform. Responsibilities include architectural leadership, hardening pipelines and infrastructure, SLSA Level 3 compliance, secrets management, and guiding technical decisions. The role also involves mentoring engineers and engaging with customers and external stakeholders.

What you'd actually do

  1. Lead the end-to-end software supply chain security architecture for GitLab’s CI/CD platform, including SLSA Level 3 implementation and CI infrastructure hardening.
  2. Drive cross-team technical strategy and decisions across our Software Supply Chain Security (SSCS) stage teams, aligning engineering work to SSCS strategic plans.
  3. Collaborate with infrastructure and CI/CD teams to design and land long-term initiatives for secure, scalable runner architecture, container isolation, and pipeline security at scale.
  4. Propose and validate technical implementations that support architectural changes to improve CI/CD scaling and performance on critical paths.
  5. Teach, mentor, and coach Staff Engineers and individual contributors, raising the bar on supply chain threat modeling, secrets management, artifact signing, and SBOM lifecycle practices.

Skills

Required

  • Deep expertise in software supply chain security, including threat modeling for supply chain attack vectors, SLSA implementation and attestation systems, and SBOM generation and lifecycle management.
  • Strong knowledge of artifact signing and verification using the Sigstore ecosystem, including Cosign, Fulcio, Rekor, and in-toto attestations.
  • Experience designing and hardening CI/CD security, such as runner isolation, pipeline security controls, and secrets management in large-scale environments.
  • Background in distributed systems and infrastructure, including building resilient CI/CD platforms that process high pipeline volumes and optimizing performance for critical paths.
  • Practical experience with container security and Kubernetes security, including admission controllers, policy controllers, workload isolation, and registry hardening.
  • Proficiency in Go or Rust in a production environment, combined with expert-level understanding of CI/CD workflows and DevSecOps best practices.
  • Experience operating as a Principal or Staff Engineer across multiple development teams, providing architectural leadership and partnering with Engineering Managers and senior leaders.
  • Demonstrated capacity to clearly communicate complex problems and solutions.

Nice to have

  • AI as a core productivity multiplier
  • incorporate AI into their daily workflows

What the JD emphasized

  • SLSA Level 3 compliance
  • secrets management
  • CI/CD security hardening
  • zero trust architecture
  • SLSA Level 3 implementation
  • secrets management
  • artifact signing
  • SBOM lifecycle practices
  • runner isolation
  • pipeline security controls
  • secrets management
  • container security
  • Kubernetes security
  • highly regulated industries