This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
At Cloudera, the Product Security group is dedicated to ensuring our platforms are secure by design and compliant with the most rigorous industry and government standards. We are seeking a highly motivated and experienced staff level software engineer to join our Accreditation Engineering team. In this role, you will be a "go-to" technical expert and the connective tissue between Security, Product, and Engineering teams, translating complex security requirements into actionable, automated engineering solutions. As a senior technical member of the team, you will exercise considerable latitude in identifying technical objectives based on business requirements and further apply industry and federal standards to our software development process. You will serve as a technical lead for security-driven initiatives, leveraging a deep understanding of technical architecture and underlying platforms to drive high-impact solutions for our government-certified environments.
Job Responsibility:
Design, develop, and maintain advanced build tooling to accelerate the remediation of vulnerabilities across engineering pillars
Lead Proof of Concepts (POCs) for security initiatives and evaluate third-party tools to increase developer velocity while enhancing our security posture
Ensure the stability and monthly promotion cadence of all government product environments (dev/int/stage/prod), driving seamless deployments and consistent delivery
Help find root causes and triage complex product-related stability issues in cloud environment clusters, collaborating with service teams to ensure rapid remediation
Drive compliance and accreditation efforts, including FedRAMP and ENS, by addressing engineering controls and coordinating annual audits
Author comprehensive design documents and test plans for cross-component security features, positively affecting change even in the face of ambiguity
Mentor junior team members and contribute to the growth of the team’s technical expertise through code reviews and documentation
Collaborate across organizational lines, interacting with internal stakeholders and senior management to resolve customer escalations and meet long-term objectives
Requirements:
B.S. or B.A. in Computer Science / related field with 10+ years of experience. Additional experience is acceptable in lieu of a degree
United States citizen working in the U.S.
Deep technical expertise in containerized environments, specifically Kubernetes and Docker
Familiarity with Amazon Web Services (AWS) and Elastic Kubernetes Service (EKS)
Strong proficiency (5+ years experience) in general-purpose programming languages such as Go, Java, and Python as well as scripting languages like Bash
Experience delivering, supporting, and troubleshooting secure products in the cloud (AWS, HashiCorp Vault, AWS Secrets Manager, AWS Lambda, DataDog, etc.)
Proven experience with Infrastructure-as-Code (IaC) tools such as Terraform and Helm to automate secure infrastructure rollouts
Experience automating CI/CD processes using platforms like GitLab CI/CD, Jenkins, or GitHub Actions
Effective analytical and problem-solving skills, with the ability to isolate root causes for hosted service outages or priority escalations
Nice to have:
Security-specific experience in CVE remediation and automation as well as integrating SAST/DAST scanning (e.g., Trivy, Aquasec, Tenable Nessus, Fortify) into developer workflows
Familiarity with government compliance frameworks and standards such as FedRAMP, FIPS, IRAP, ISO 27001, or SOC 2
Knowledge of secure coding practices, SDLC, security frameworks (Bouncy Castle, OpenSSL), and common vulnerabilities (OWASP Top 10)
Practical knowledge of data visualization frameworks like Grafana
Experience in Identity and Access Management (IAM) or Identity Governance platforms
Strong stakeholder management skills, with the ability to influence without authority in a remote, cross-functional environment
Ability to nimbly work across different Linux distributions