FluidStack

Senior/Staff Information Security Engineer

FluidStack

full-time

Posted on:

Origin:  • 🇺🇸 United States • New York

Visit company website
AI Apply
Manual Apply

Job Level

Senior

Tech Stack

CloudGoKubernetesLinuxPythonTerraform

About the role

  • Shape security strategy, drive engineering execution, and act as a trusted advisor to protect customer data and infrastructure
  • Play a crucial role in the engineering program for multiregion bare-metal and cloud environments covering threat intel, detection & response, vulnerability management and hardening of Kubernetes/SLURM, Linux and network fabrics
  • Design and automate security controls and telemetry pipelines (SIEM, SOAR, EDR) to operate at multi-terabit scale, integrating with Terraform-based IaC and GPU scheduling stacks
  • Support incident response, threat hunting and post-mortems; continuously tune detections and drive root-cause fixes with platform teams
  • Champion a zero-trust architecture, including IAM, SSO, secrets management and least-privilege policies
  • Partner with Compliance to meet SOC 2, ISO 27001 and customer requirements
  • Build a security culture by embedding security reviews into CI/CD and product lifecycles

Requirements

  • 4+ years in information or infrastructure security with at least 2 years securing large-scale cloud or HPC environments
  • Expert in container and orchestration security (Kubernetes, container-d runtime), Linux internals and network segmentation
  • Proven track record implementing SIEM/EDR tooling, crafting detections and running incident response aligned to MITRE ATT&CK
  • Strong scripting or coding skills in Python, Go or Bash; comfortable automating via Terraform, Helm and GitOps workflows
  • Deep understanding of IAM, PKI, zero-trust networking and modern auth protocols (OIDC, SAML)
  • Familiar with SOC 2, ISO 27001, NIST 800-53 and cloud-shared-responsibility models; able to translate controls into engineering tasks
  • Nice-to-haves: experience with GPU/AI infrastructure, high-performance rendering or energy-efficient edge data centers
  • Nice-to-haves: background in adversary tracking, threat-intel feed curation and eBPF-based telemetry
  • Nice-to-haves: contributions to open-source security projects or published CVEs
  • Nice-to-haves: relevant certs such as CISSP, OSCP, GCPN or KCNA