Staff Infrastructure Security Engineer (generalist)

Crusoe · Data AI · San Francisco, CA - US · IT, Compliance, and Security

This role is for a Staff Infrastructure Security Engineer at Crusoe, an AI infrastructure company. The primary focus is on securing the company's cloud platform for AI and high-performance workloads by designing and implementing security controls across compute, networking, and storage. The role involves using Infrastructure-as-Code, building automated security guardrails, managing secrets, and collaborating with other engineering teams to ensure a secure and reliable environment for AI model training.

What you'd actually do

  1. Architecting security controls across compute, networking, and storage layers of a global cloud platform
  2. Championing Infrastructure-as-Code (IaC) standards (e.g., Terraform) to enforce secure defaults, immutability, and drift detection
  3. Building automated security guardrails embedded directly into CI/CD and deployment pipelines
  4. Collaborating on a centralized Vault-as-a-Platform service to manage secrets, encryption keys, and internal PKI
  5. Designing and operating certificate lifecycles (X.509, SSH) to support secure machine-to-machine trust

Skills

Required

  • 8+ years of hands-on experience in infrastructure engineering, SRE, or security engineering
  • Deep understanding of security principles across the stack, from Linux and container runtimes to cloud control planes
  • Proven experience using Infrastructure-as-Code (Terraform) to manage complex, multi-environment infrastructure at scale
  • Strong knowledge of cryptography, secrets management, PKI, and modern authentication standards
  • Experience securing public cloud (AWS, GCP) and/or bare-metal environments
  • Strong networking fundamentals, including routing, segmentation, firewalls, and Zero Trust architectures
  • Hands-on experience with Kubernetes and container security, including secure secrets injection into microservices
  • Fluency in at least one programming language (Go or Python preferred) for automation and tooling

Nice to have

  • Experience building or operating internal security platforms (e.g., Vault-as-a-Service)
  • Background securing high-scale cloud or AI infrastructure
  • Experience implementing Zero Trust identity architectures end-to-end
  • Familiarity with bare-metal provisioning and data center security considerations

What the JD emphasized

  • secure-by-default environment
  • security controls
  • secure defaults
  • automated security guardrails
  • secure machine-to-machine trust
  • secure, monitored access
  • security gaps