Apply faster with JobTailor
RecommendedApply
Apply your way
Use the standard apply link, or let JobTailor help you move faster.
- Apply directly in one click
- No setup required
- Best if you’re in a hurry
✨ Start AI Apply
Tech Stack
Tools & technologiesDistributed SystemsNFS
About the role
Key responsibilities & impact- Lead the design and implementation of end-to-end security architecture for distributed storage platforms
- Partner closely with Data Path engineering teams to ensure secure, high-performance data movement across storage tiers
- Lead threat modeling, security reviews, and Secure Software Development Lifecycle (SSDLC) practices across the platform.
- Define identity and access management (IAM) integrating enterprise identity providers
- Architect fine-grained authorization models using RBAC and ABAC across tenants, datasets, and resources.
Requirements
What you’ll need- 12+ years of experience in security architecture, infrastructure security, or distributed systems
- Bachelor’s or Master’s degree in Computer Science, Engineering, or related field
- Proven experience designing security for large-scale distributed systems or storage platforms
- Deep expertise in encryption technologies, key management systems, and cryptographic frameworks
- Strong knowledge of identity and access management (IAM), including RBAC, ABAC, SSO, MFA, and federation
- Familiarity with secure API design, TLS 1.3, mutual TLS, and request signing mechanisms (e.g., SigV4)
- Experience designing multi-tenant systems with strong isolation and policy enforcement
- Knowledge of logging, auditing, and SIEM integration for security monitoring and compliance.
Benefits
Comp & perks- Exceptional technology and support
- Competitive salary
- Innovative culture
ATS Keywords
✓ Tailor your resumeApplicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
security architectureinfrastructure securitydistributed systemsencryption technologieskey management systemscryptographic frameworksidentity and access managementRBACABACsecure API design
