Security Engineer

Fireworks AI · Data AI · San Mateo, CA · Engineering

Security Engineer role focused on designing, implementing, and operating security controls for AI infrastructure, AI platforms, and internal systems. Responsibilities include protecting customer data and models, performing security reviews of cloud-native architectures, embedding security into CI/CD pipelines, developing in-house security tooling, managing vulnerability programs, and operating security operations. Requires experience with Python/Go, cloud-native architectures (GCP), Kubernetes, and security tooling.

What you'd actually do

  1. Design and build security-focused software and platform capabilities to protect customer data, models, and services across our multi-cloud infrastructure, including encryption, identity and access management, secure API gateways, secure model execution, and sandboxing strategies.
  2. Perform security reviews of cloud-native architectures—including Kubernetes clusters, multi-cloud workloads, and distributed data stores—and build integrated systems for continuous security monitoring, anomaly detection, and automated response.
  3. Embed security into CI/CD pipelines using a DevSecOps approach, implementing automated scanning, policy enforcement, and secure-by-default build and deployment workflows.
  4. Apply a build-over-buy philosophy by designing and developing in-house security tooling and automation where it provides better control, scalability, and integration than off-the-shelf solutions.
  5. Build and operate a comprehensive vulnerability management program, partnering with various teams to remediate risks across applications, containers, cloud infrastructure, and dependencies.

Skills

Required

  • Python
  • Go
  • designing production-grade systems
  • cloud-native architectures (GCP)
  • network segregation
  • authentication
  • authorization
  • encryption
  • data protection
  • intrusion detection
  • cloud-specific security benchmarks
  • Kubernetes
  • Docker
  • containerized production environments
  • Linux environments
  • system administration
  • debugging
  • automation via command-line tooling
  • modern identity and access controls (SAML, OAuth, OIDC, SSO, RBAC/ABAC)

Nice to have

  • designing secure multi-cloud deployments
  • zero-trust architectures
  • operating and securing large-scale Kubernetes platforms
  • control plane security
  • node hardening
  • multi-tenant isolation
  • operating and securing large-scale multi-cloud platforms
  • AWS
  • GCP
  • Azure
  • Oracle Cloud
  • GPU as service cloud providers
  • infrastructure-as-code (Terraform)
  • Python
  • modular policy-as-code frameworks
  • data protection techniques
  • encryption at rest/in transit
  • tokenization
  • key management
  • confidential computing
  • integrating security into microservice architectures
  • service meshes
  • distributed systems
  • securing LLM/ML platforms
  • model inference infrastructure
  • GPU clusters
  • data labeling pipelines
  • detection engineering pipelines
  • cloud audit logs
  • network telemetry
  • application signals
  • building large-scale IAM and PAM platforms
  • least-privilege
  • workload identity
  • just-in-time access
  • container image vulnerability remediation
  • security
  • SBOM generation
  • software supply chain security
  • building, implementing and operating security automation platforms
  • incident response
  • security operations
  • compliance tooling and frameworks
  • Vanta
  • SOC 2
  • ISO 27001
  • ISO 42001
  • PCI-DSS

What the JD emphasized

  • security controls across AI infrastructure
  • security posture
  • confidentiality, integrity, and availability of data, models, and infrastructure is paramount
  • designing and embedding security across layers of our technology stack
  • security-focused software and platform capabilities
  • secure API gateways
  • secure model execution
  • sandboxing strategies
  • continuous security monitoring
  • automated response
  • DevSecOps approach
  • automated scanning
  • policy enforcement
  • secure-by-default build and deployment workflows
  • in-house security tooling and automation
  • vulnerability management program
  • remediate risks
  • security operations
  • detection engineering
  • incident response
  • post-incident reviews
  • red/blue team exercises
  • tabletop simulations
  • post-incident root cause analysis
  • compliance and regulatory controls
  • SOC 2
  • ISO 27001
  • ISO 42001
  • HIPAA
  • PCI-DSS
  • GDPR
  • security engineering
  • cloud-native systems
  • secure multi-cloud deployments
  • zero-trust architectures
  • securing large-scale Kubernetes platforms
  • control plane security
  • node hardening
  • multi-tenant isolation
  • securing large-scale multi-cloud platforms
  • GPU as service cloud providers
  • policy-as-code frameworks
  • data protection techniques
  • encryption at rest/in transit
  • tokenization
  • key management
  • confidential computing
  • securing LLM/ML platforms
  • model inference infrastructure
  • GPU clusters
  • data labeling pipelines
  • detection engineering pipelines
  • cloud audit logs
  • network telemetry
  • application signals
  • large-scale IAM and PAM platforms
  • least-privilege
  • workload identity
  • just-in-time access
  • container image vulnerability remediation
  • software supply chain security
  • security automation platforms
  • incident response
  • security operations
  • compliance tooling and frameworks
  • Vanta
  • low-latency inference
  • scalable model serving