Sr. Applied Scientist, Cedar Authorization

Amazon Amazon · Big Tech · Finland · Remote · Applied Science

The role involves driving the science and engineering behind an open-source authorization language (Cedar) and its integration into cloud-native platforms like Kubernetes. Responsibilities include advancing formal verification and analysis capabilities, developing tools to identify security/safety issues in authorization policies, creating and productizing prototypes, and contributing to the open-source codebase as a maintainer. The role also involves representing the project at technical conferences, advocating for adoption, and collaborating with the open-source community to advance project maturity.

What you'd actually do

  1. Drive the design and development of Cedar's integration into cloud-native authorization environments, including Kubernetes and other CNCF ecosystem projects.
  2. Advance Cedar's formal verification, SMT-based analysis, and policy validation capabilities to raise the bar for authorization assurance.
  3. Interact with various teams to develop an understanding of their security, authorization, and policy requirements.
  4. Apply the acquired knowledge to build tools that find problems, or show the absence of security/safety problems, in authorization policies and systems.
  5. Implement these tools through the use of SAT, SMT, and various concepts from programming languages, theorem proving, formal verification, and constraint solving.

Skills

Required

  • PhD, or Master's degree and 6+ years of applied research experience
  • Experience programming in Java, C++, Python, Rust, Go, or related language
  • Experience in any of the following areas: algorithms and data structures, parsing, numerical optimization, data mining, parallel and distributed computing, high-performance computing
  • Experience in patents or publications at top-tier peer-reviewed conferences or journals

Nice to have

  • 5+ years of industry or academic research experience
  • Experience in professional software development
  • Experience with authorization systems, policy languages, or access control frameworks (e.g., Cedar, OPA/Rego, RBAC/ABAC/ReBAC systems)
  • Experience contributing to or maintaining open-source projects, particularly within the CNCF or Kubernetes ecosystem
  • Demonstrated community leadership in cloud-native or open-source communities (e.g., CNCF Ambassador, SIG/WG chair, conference speaker)
  • Experience with formal verification, SMT solvers, or automated reasoning applied to policy analysis or software correctness
  • Familiarity with Kubernetes authorization architecture, admission control, or API machinery
  • Track record of public speaking, technical advocacy, or developer relations at industry conferences

What the JD emphasized

  • formal verification
  • program analysis
  • constraint-solving
  • theorem proving
  • authorization language
  • open-source
  • cloud-native
  • Kubernetes
  • SMT-based analysis
  • policy validation
  • security
  • safety
  • SAT
  • programming languages
  • formal verification
  • constraint solving
  • prototypes
  • production systems
  • maintainer
  • code quality
  • review standards
  • technical direction
  • technical conferences
  • CNCF events
  • KubeCon
  • advocate
  • thought leader
  • tech decisions
  • mentor
  • train
  • open-source community
  • project maturity
  • cloud-native developers
  • contributors
  • organizations
  • adoption
  • feedback
  • cutting-edge technology
  • formal methods
  • automated reasoning
  • authorization
  • cloud-native systems
  • applied scientists
  • engineers
  • challenging problems
  • value to customers
  • security
  • usability
  • authorization
  • open-source community
  • CNCF journey
  • publish your work
  • present at leading industry conferences
  • policy language
  • evaluation engine
  • authorization
  • ergonomic
  • fast
  • analyzable
  • automated reasoning
  • formal verification
  • AWS services
  • CNCF
  • Sandbox project
  • Graduated project
  • industry standard
  • authorization
  • programming languages
  • formal methods
  • cloud-native infrastructure