Software Engineer, Trusted Execution (security Systems), Sear

Apple Apple · Big Tech · Cupertino, CA · Software and Services

Software Engineer focused on security systems, specifically the technologies that protect code execution on Apple hardware. Responsibilities include analyzing systems for security gaps, defining and enforcing authorization policies, and building automation and analytics to detect anomalies. The role requires a strong understanding of complex systems and their security properties, with programming proficiency in Python and a systems programming language.

What you'd actually do

  1. Analyze these systems for security gaps, help define and enforce authorization policies, and build automation and analytics to strengthen oversight and detect anomalies.
  2. Contribute to the design of new authorization strategies that leverage device hardware capabilities and security infrastructure.
  3. Work cooperatively with software, hardware, factory, and server teams on technologies and initiatives to improve security and drive the adoption of these technologies across the organization.
  4. As you grow in the role, there will be opportunities to work deeper in the stack, contributing to the operating system security technologies that run on every Apple device.

Skills

Required

  • BS in Computer Science, Information Security, or equivalent practical experience
  • Demonstrated ability to learn and reason about complex systems and their security properties
  • Programming proficiency in Python and at least one systems programming language (C, C++, Objective-C, or Swift)
  • Strong communication skills, with the ability to work across teams to drive security outcomes

Nice to have

  • Experience with security analysis, threat modeling, or security architecture review
  • Familiarity with applied cryptography concepts (PKI, digital signatures, attestations)
  • Understanding of operating systems internals or systems programming
  • Knowledge of access control principles, including least privilege and role-based access
  • Experience building data pipelines, analytics, or anomaly detection systems
  • Experience building internal tools, dashboards, or productivity automation
  • Self-directed learner who can navigate unfamiliar systems, codebases, and technology stacks — including legacy tools and languages — to get the job done
  • A passion for building pragmatic security solutions and a curiosity to go deeper into the stack

What the JD emphasized

  • security technologies
  • integrity of the systems
  • authorization policies
  • detect anomalies
  • security gaps
  • security properties
  • security analysis
  • threat modeling
  • security architecture review
  • access control principles