Software Engineer, Security

Apple Apple · Big Tech · London, United Kingdom · Software and Services

Software Engineer focused on security for Apple's Cloud Object Store (ACOS) team, which handles petabytes of data. The role involves building authentication, authorization, and encryption foundations for large-scale cloud infrastructure, ensuring data protection at exabyte scale. Responsibilities include designing authentication systems, implementing encryption-at-rest, building IAM policy enforcement, driving compliance, and conducting threat modeling, alongside broader storage engineering work.

What you'd actually do

  1. Own and contribute to security infrastructure projects across authentication, authorisation, and encryption — building platforms that the rest of the storage org consumes.
  2. Implement and evolve authentication systems to meet modern security standards: improving credential security, integrating with other Apple services, and ensuring consistent auth across storage products.
  3. Build and maintain encryption-at-rest infrastructure: key lifecycle management, encryption standard upgrades, and ensuring cryptographic coverage at scale..
  4. Participate in threat modeling for new and existing features; embed security reviews into the design and launch process.
  5. Identify, scope, and lead projects that span security, reliability, isolation, scalability, and maintainability — this is a broad SWE role, not a pure security role.

Skills

Required

  • backend software engineering
  • computer science fundamentals
  • networking
  • distributed systems
  • security concepts
  • authentication
  • authorization
  • cryptographic fundamentals
  • driving complex projects end-to-end
  • collaborating across teams

Nice to have

  • IAM systems
  • STS/short-lived credentials
  • policy-based access control
  • encryption infrastructure
  • key rotation
  • envelope encryption
  • secret managers
  • compliance frameworks (PCI-DSS, SOX)
  • threat modeling methodologies
  • security design reviews

What the JD emphasized

  • security-first mindset
  • security posture
  • modern security standards
  • encryption-at-rest
  • key lifecycle management
  • IAM policy enforcement
  • compliance
  • threat modeling
  • security design reviews