Role Summary
As a Principal Technologist specializing in Product Security for the Wind River Private Cloud Platform, you will serve as the technical authority driving the secure design, architecture, and lifecycle hardening of Wind River’s mission‑critical cloud infrastructure solutions. You will guide security strategy across virtualization, orchestration, and distributed edge computing systems—ensuring the platform meets stringent requirements for telco, aerospace, defense, and industrial deployments. This role bridges advanced cloud engineering, embedded systems knowledge, and modern cybersecurity practices.
Key Responsibilities
Security Architecture & Strategy
Define and evolve the security architecture for Wind River Private Cloud Platform, including control plane components, hypervisors, networking stacks, and orchestration frameworks.
Lead threat modeling, security risk assessments, and mitigation strategies across distributed cloud/edge environments.
Establish platform security requirements, secure design patterns, and architectural principles.
Detailed architecture and design definition of individual product security features
Providing direction and specific requirement input to development teams
Working with business team and customers to define/clarify requirements
Evaluating and proposing technology choices
Product & Platform Security
Drive secure-by-default configurations across compute, storage, networking, and platform services.
Own the security roadmap for the platform, ensuring alignment with industry standards (NIST, CIS, FIPS, etc.).
Oversee vulnerability management, secure boot, runtime integrity measures, API security, and cryptographic services.
Partner with product, engineering, and QA teams to embed security throughout SDLC (shift‑left security).
Technical Leadership
Serve as the top technical expert and advisor for product security across cloud, containerization, virtualization, and real‑time/edge systems.
Mentor senior engineers and influence engineering directors and executives on cybersecurity tradeoffs and priorities.
Represent the organization in security reviews, customer briefings, escalations, and cross-functional technical committees.
Security Operations & Compliance
Guide secure deployment patterns and operational security practices for private cloud customers.
Support incident investigation, root‑cause analysis, and remediation for platform-level vulnerabilities.
Define and enforce policies for SBOM, supply chain integrity, CI/CD security, and secure artifact distribution.
Collaboration & Influence
Collaborate with teams across Wind River Studio ecosystem (edge platform, analytics, DevSecOps tooling).
Represent Wind River in standards bodies and industry working groups (ETSI, CNCF, Linux Foundation, etc.).
Partner with customer engineering teams on secure deployment architectures for telecom and mission‑critical environments.
Required Qualifications
15+ years in cloud/platform engineering, embedded systems, or cybersecurity with deep architectural ownership.
Expertise in product security, including threat modeling, secure architecture, and vulnerability management.
Strong knowledge of:
Kubernetes Security Hardening - RBAC, Secrets, Encryption, Security Policies
Certificate Management, PKI, EJBCA, cert-manager
Authentication mechanisms: OIDC, LDAP, Active Directory
Linux internals, kernel security, container hardening and breakout protection
Practical cryptography algorithms and application
Hardware root of trust (TPM, UEFI Secure Boot, Trusted Boot)
CIS Benchmarks for Linux and Kubernetes
Virtualization technologies (KVM, QEMU, etc.)
Cloud networking, SDN/NFV, microservices security
Hands-on experience with CI/CD security, SAST, DAST, container scanning, SBOM generation.
Proven ability to lead complex cross‑organizational security initiatives.
Preferred Qualifications
Experience with private cloud infrastructure, Titanium Cloud, or telecom/industrial -grade cloud infrastructure.
Background in telco (5G), aerospace/defense, industrial IoT, or other safety/security‑critical domains.
Familiarity with Yocto, embedded Linux, RTOS environments.
Participation in open-source security initiatives or upstream kernel/cloud projects.
Advanced degree in Computer Science, Electrical Engineering, Cybersecurity, or similar field.
Success Indicators
Demonstrated improvements in platform security posture, measurable vulnerability reduction, and secure SDLC maturity.
Adoption of security architecture patterns across engineering teams.
Strong technical influence with executives, partners, and global customers.
Delivery of innovative, scalable platform security capabilities for distributed cloud and edge environments.
Privacy Notice - Active Candidates: https://www.aptiv.com/privacy-notice-active-candidates
Aptiv is an equal employment opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, sex, gender identity, sexual orientation, disability status, protected veteran status or any other characteristic protected by law.
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
#LI-JP1
Privacy Notice - Active Candidates: https://www.aptiv.com/privacy-notice-active-candidates
Aptiv is an equal employment opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, sex, gender identity, sexual orientation, disability status, protected veteran status or any other characteristic protected by law.