
Lead/Principal Engineer
About OPAQUE
OPAQUE is the Confidential AI company. Born from UC Berkeley’s RISELab, we solve the core challenge blocking AI adoption at scale: security concerns about data leaks or compliance violations. OPAQUE provides verifiable privacy and governance for AI so organizations can safely run models, agents, and workflows on their most sensitive data. Its Confidential AI platform delivers verifiable runtime governance backed by cryptographic proof that data, models, and agent actions remain private, governed, and compliant with approved policies throughout every AI workflow. This extends traditional data governance tools with real runtime verification, enabling teams to responsibly deploy AI using their most valuable proprietary data, and move from pilot to production 4-5X faster. Customers and partners include ServiceNow, Anthropic, Encore Capital, Accenture, and leaders across high tech, financial services, insurance, and healthcare.
Learn More at Opaque.co
Read about our Values at Opaque.co/about
About the Role
We are looking for a senior technical leader with deep expertise in confidential computing and cloud-native security to help design, build, and operate next-generation secure data and compute platforms.
This role is for someone who can make architectural decisions, operate comfortably in ambiguity, and still write and review production-quality code. You will work at the intersection of cloud infrastructure, cryptography, policy enforcement, and distributed systems, helping define how sensitive workloads run securely at scale. Specifically you will work on measurement attestation proof, use of cloud attestation services so a solid understanding of RATS architecture(https://datatracker.ietf.org/doc/rfc9334/) would be beneficial.
What You’ll Do
- Act as an authority for confidential computing architecture and strategy and work with the team
- Design and implement end-to-end confidential computing solutions (TEE-based systems, attestation flows, key management)
- Build and evolve attestation and trust verification mechanisms across cloud-native environments
- Develop and maintain policy management frameworks that govern data access, compute trust, and enforcement
- Work hands-on with Kubernetes to secure containerized workloads, including admission control, policy enforcement, and runtime security
- Partner with product, security, and platform teams to translate security requirements into scalable systems
- Operate effectively in high-ambiguity problem spaces, setting technical direction where patterns do not yet exist
- Work with SDK,UX and product management as well as other engineers on the team on attestation features and platform components
Required Experience & Skills
Core Technical Expertise
- Deep experience with confidential computing (TEEs, enclaves, secure execution environments) with 10 years of engineering experience building low level platform and systems with production scale
- Strong understanding of attestation, RATS, identity, and trust chains
- Expertise in Azure, AWS, Google Cloud Platform (GCP), including security primitives and managed services
- Production experience with Kubernetes in security-sensitive environments
- Experience designing or operating policy-based systems (authorization, access control, enforcement engines)
- 10 years experience in engineering and lead engineer for at least 3 years.
Security & Systems
- Strong background in cloud security, platform security, or infrastructure security
- Solid understanding of cryptography fundamentals, key management, and secure data handling
- Ability to reason about threat models, attack surfaces, and mitigations at system scale
Hands-On Engineering
- Comfortable writing, reviewing, and debugging code in production systems
- Experience with modern backend languages (e.g., Go, Python, Java, Scala). Go-lang preferred
- Ability to move between architecture discussions and implementation details
Leadership & Decision Making
- Proven ability to own technical decisions and drive them to execution
- Comfortable pushing back, making tradeoffs, and setting direction
Experience working cross-functionally with product, engineering, and security stakeholders
Apply for this job
*
indicates a required field