Saronic Technologies is a leader in revolutionizing autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations through autonomous and intelligent platforms.
Security at Saronic is a force multiplier. We're seeking a Security Engineer focused on software and systems security to own the security of Saronic's software platforms, build systems, and deployment infrastructure from development through production. Saronic builds on NixOS and Rust, and we need someone who understands how to secure software at every stage of the lifecycle, from reproducible builds and dependency management through CI/CD pipeline security, runtime hardening, and secure deployment to vessel and cloud environments. You will be the technical authority on how Saronic builds, ships, and runs secure software.
Key Responsibilities:
Own the application security posture for Saronic's software platforms, including Rust-based services, system software, and supporting applicationsLead secure code review, SAST, DAST, and fuzzing efforts, and define secure coding standards for Rust development including memory safety practices, safe FFI boundaries, and secure error handlingConduct threat modeling for software systems and translate findings into actionable security requirements integrated into design reviews and sprint planningDrive vulnerability management for software dependencies, including tracking, prioritization, and remediation of vulnerabilities in third-party crates and librariesSecure and harden NixOS configurations for vessel platforms and development infrastructure, leveraging Nix's reproducibility and declarative model for security enforcementDesign system hardening profiles in NixOS including kernel hardening, service isolation, mandatory access controls, and minimal attack surface configurationsDefine and enforce package management and dependency policies within the Nix ecosystem, ensuring build closures are auditable, reproducible, and free from unauthorized or vulnerable packagesArchitect secure system update and rollback mechanisms using NixOS capabilities, ensuring fleet-wide consistency and integrityDesign and implement security controls across the CI/CD pipeline including source integrity, build isolation, artifact signing, and deployment verification with build environments that are ephemeral, isolated, and hardenedBuild and maintain software supply chain security practices aligned to SLSA framework principles, including provenance tracking, hermetic builds, signed attestations, and SBOM generationIntegrate security scanning (SAST, SCA, container scanning, secrets detection) into CI/CD pipelines as automated guardrails, and create self-service pipeline templates that enable teams to ship without bottlenecksDesign secure deployment patterns for vessel software updates, including secure delivery, integrity verification, and rollback capabilitiesImplement runtime application security controls including logging, monitoring, and anomaly detection for deployed servicesDefine software and systems security standards, patterns, and reference architectures that engineering teams adopt as the default secure path
Required Qualifications:
10+ years of hands-on experience in application security, product security, DevSecOps, or a closely related software security engineering roleStrong experience with Rust security including safe/unsafe boundaries, FFI security, memory safety patterns, and dependency auditingDemonstrated experience securing Linux-based systems, with specific experience or strong aptitude for NixOS, Nix package management, and declarative system configurationDeep expertise in CI/CD pipeline security including build system hardening, artifact signing, supply chain integrity (SLSA), and automated security scanning integrationProven experience building DevSecOps programs that embed security into development workflows without creating bottlenecksStrong understanding of software supply chain security including dependency management, SBOM, provenance tracking, and vulnerability management for third-party componentsProficiency in Rust, Python, Go, or Nix for building security tooling, automation, and pipeline integrationsAbility to obtain and maintain a security clearance
Preferred Qualifications:
Experience in defense, aerospace, robotics, autonomy, or other high-assurance environmentsHands-on NixOS experience including writing Nix derivations, managing flakes, and building custom NixOS modules for system hardeningExperience securing software for embedded or resource-constrained Linux environmentsFamiliarity with NIST SP 800-171, NIST SP 800-53, NIST SP 800-218, or supply chain signing frameworks (sigstore, in-toto, Notary)Experience operating in AWS GovCloud or FedRAMP-regulated environmentsRelevant certifications such as OSWE, OSCP, GWAPT, GWEB, AWS Security Specialty, or equivalent