Security Engineer, Software Security

Saronic · Defense · Austin, TX · Software

Security Engineer focused on software and systems security to own the security of Saronic's software platforms, build systems, and deployment infrastructure from development through production. This role requires expertise in securing software at every stage of the lifecycle, from reproducible builds and dependency management through CI/CD pipeline security, runtime hardening, and secure deployment to vessel and cloud environments. The engineer will be the technical authority on how Saronic builds, ships, and runs secure software.

What you'd actually do

  1. Own the application security posture for Saronic's software platforms, including Rust-based services, system software, and supporting applications
  2. Lead secure code review, SAST, DAST, and fuzzing efforts, and define secure coding standards for Rust development including memory safety practices, safe FFI boundaries, and secure error handling
  3. Conduct threat modeling for software systems and translate findings into actionable security requirements integrated into design reviews and sprint planning
  4. Drive vulnerability management for software dependencies, including tracking, prioritization, and remediation of vulnerabilities in third-party crates and libraries
  5. Secure and harden NixOS configurations for vessel platforms and development infrastructure, leveraging Nix's reproducibility and declarative model for security enforcement

Skills

Required

  • 6+ years of hands-on experience in application security, product security, DevSecOps, or a closely related software security engineering role
  • Strong experience with Rust security including safe/unsafe boundaries, FFI security, memory safety patterns, and dependency auditing
  • Demonstrated experience securing Linux-based systems, with specific experience or strong aptitude for NixOS, Nix package management, and declarative system configuration
  • Deep expertise in CI/CD pipeline security including build system hardening, artifact signing, supply chain integrity (SLSA), and automated security scanning integration
  • Proven experience building DevSecOps programs that embed security into development workflows without creating bottlenecks
  • Strong understanding of software supply chain security including dependency management, SBOM, provenance tracking, and vulnerability management for third-party components
  • Proficiency in Rust, Python, Go, or Nix for building security tooling, automation, and pipeline integrations
  • Ability to obtain and maintain a security clearance

Nice to have

  • Experience in defense, aerospace, robotics, autonomy, or other high-assurance environments
  • Hands-on NixOS experience including writing Nix derivations, managing flakes, and building custom NixOS modules for system hardening
  • Experience securing software for embedded or resource-constrained Linux environments
  • Familiarity with NIST SP 800-171, NIST SP 800-53, NIST SP 800-218, or supply chain signing frameworks (sigstore, in-toto, Notary)
  • Experience operating in AWS GovCloud or FedRAMP-regulated environments
  • Relevant certifications such as OSWE, OSCP, GWAPT, GWEB, AWS Security Specialty, or equivalent

What the JD emphasized

  • Rust security
  • NixOS
  • CI/CD pipeline security
  • software supply chain security