{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/distributed-systems-security"},"x-facet":{"type":"skill","slug":"distributed-systems-security","display":"Distributed Systems Security","count":1},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_5700317e-599"},"title":"Software Engineer - Information Security","description":"<p>We&#39;re looking for a Software Engineer: Information Security to join our team and help us build security into every layer of our infrastructure while maintaining our exceptional developer experience.</p>\n<p>As a Software Engineer: Information Security, you will design and implement security controls for PlanetScale&#39;s cloud-native database platform, protecting millions of queries per second for some of the world&#39;s largest applications.</p>\n<p>You will collaborate with engineering teams to conduct security reviews, threat modeling, and provide secure coding guidance across our distributed systems.</p>\n<p>A special focus for this role is on proactive red teaming and testing - you will consistently try to break into the PlanetScale platform as an attacker would, and help patch what you find.</p>\n<p>You will evaluate, procure, and implement proactive security tools and technologies to strengthen our security posture.</p>\n<p>You will work closely with our compliance team to ensure adherence to SOC 2, PCI DSS, and other security frameworks.</p>\n<p>You will build security automation and tooling to scale security practices across the engineering organization.</p>\n<p>You will respond to security incidents and conduct post-incident reviews to improve our security resilience.</p>\n<p>The ideal candidate will have strong experience with cloud security, application security, and securing distributed database systems.</p>\n<p>They will be able to communicate complex security concepts clearly to engineering teams and translate business requirements into technical security solutions.</p>\n<p>The candidate will thrive in a collaborative environment and enjoy working across teams to embed security into the development lifecycle.</p>\n<p>They will have excellent problem-solving skills and be able to balance security requirements with developer productivity.</p>\n<p>The candidate will be self-motivated and able to work independently while making sound security and technical decisions.</p>\n<p>Required skills include:</p>\n<ul>\n<li>5+ years of software engineering experience with a focus on security engineering or application security</li>\n</ul>\n<ul>\n<li>Strong proficiency in Go, with experience in other languages like Python, Java, or C++</li>\n</ul>\n<ul>\n<li>Experience securing cloud-native applications and infrastructure (AWS, GCP, Azure)</li>\n</ul>\n<ul>\n<li>Knowledge of database security, encryption, and access controls</li>\n</ul>\n<ul>\n<li>Experience with security frameworks and compliance requirements (SOC 2, PCI DSS)</li>\n</ul>\n<ul>\n<li>Understanding of threat modeling, security architecture, and secure coding practices</li>\n</ul>\n<p>Preferred skills include:</p>\n<ul>\n<li>Experience with database internals, distributed systems security, or infrastructure security</li>\n</ul>\n<ul>\n<li>Background in security tool evaluation, implementation, and automation</li>\n</ul>\n<ul>\n<li>Experience with Kubernetes security, container security, and cloud security posture management</li>\n</ul>\n<ul>\n<li>Knowledge of security monitoring, incident response, and vulnerability management</li>\n</ul>\n<ul>\n<li>Previous experience at a high-growth technology company or in a security engineering role</li>\n</ul>\n<ul>\n<li>Relevant security certifications (CISSP, CISM, CEH, etc.)</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_5700317e-599","directApply":true,"hiringOrganization":{"@type":"Organization","name":"PlanetScale","sameAs":"https://www.planetscale.com/","logo":"https://logos.yubhub.co/planetscale.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/planetscale/jobs/4009938009","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Go","Python","Java","C++","Cloud security","Application security","Database security","Encryption","Access controls","Security frameworks","Compliance requirements","Threat modeling","Security architecture","Secure coding practices"],"x-skills-preferred":["Database internals","Distributed systems security","Infrastructure security","Security tool evaluation","Implementation","Automation","Kubernetes security","Container security","Cloud security posture management","Security monitoring","Incident response","Vulnerability management"],"datePosted":"2026-04-24T16:11:04.139Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco Bay Area or Remote"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Go, Python, Java, C++, Cloud security, Application security, Database security, Encryption, Access controls, Security frameworks, Compliance requirements, Threat modeling, Security architecture, Secure coding practices, Database internals, Distributed systems security, Infrastructure security, Security tool evaluation, Implementation, Automation, Kubernetes security, Container security, Cloud security posture management, Security monitoring, Incident response, Vulnerability management"}]}