Staff Security Engineer, Pki & Secrets

Weights & Biases Weights & Biases · Data AI · Bellevue, WA +4 · Technology

Staff Security Engineer focused on PKI and secrets management infrastructure, including CA hierarchies, secrets platforms, HSMs, key management, and code signing. The role involves designing, implementing, and operating these systems at scale within a cloud provider environment, with a focus on security, reliability, and ease of use for AI workloads.

What you'd actually do

  1. Contribute to the design, implementation, and operation of CoreWeave's PKI infrastructure, including CA hierarchies, issuance policies, certificate lifecycle management, and trust distribution across Kubernetes clusters and bare-metal hosts.
  2. Manage and evolve secrets management platforms, including access policies, secret lifecycle governance, and integration patterns using External Secrets Operator and cert-manager.
  3. Operate and scale HSM infrastructure, including PKCS#11 integration, key ceremony procedures, and high-availability designs backing our certificate authorities and signing services.
  4. Contribute to the design of key management and data encryption solutions for internal and customer-facing use cases, including envelope encryption and KMS API design.
  5. Deliver PKI-based solutions supporting workload identity, mutual TLS, and hardware attestation.

Skills

Required

  • 8+ years of experience in security engineering or infrastructure engineering
  • Strong understanding of PKI concepts including CA hierarchies, certificate profiles, issuance policies, revocation, and trust distribution.
  • Hands-on experience operating HashiCorp Vault or similar secrets management platforms in production.
  • Experience with hardware security modules (HSMs), PKCS#11 interfaces, and key ceremony procedures.
  • Solid understanding of applied cryptography: symmetric and asymmetric algorithms, digital signatures, envelope encryption, and TLS.
  • Proficiency in Go, Python, or similar languages, with the ability to build production tooling and automation.
  • Experience with Kubernetes, including cert-manager, trust-manager, or External Secrets Operator.

Nice to have

  • Experience operating PKI backed by HSMs in a cloud provider or hyperscaler environment.
  • Familiarity with code signing workflows (Authenticode, Cosign/Sigstore, transparency logs, timestamping).
  • Experience with KMS design, including customer-managed keys and multi-tenant key isolation.
  • Understanding of hardware attestation and workload identity (TPM, SPDM, SPIFFE/SPIRE).
  • Exposure to post-quantum cryptography standards and migration planning.

What the JD emphasized

  • PKI
  • secrets management
  • HSMs
  • key management
  • code signing
  • cryptographic infrastructure
  • PKI infrastructure
  • secrets management platforms
  • HSM infrastructure
  • key management
  • code signing infrastructure
  • cryptographic best practices
  • post-quantum cryptography readiness