overlandai
Product Security Engineer
At a Glance
- Location
- Seattle
- Experience
- 6+ years
- Posted
- 2026-03-09T14:17:49-04:00
Key Requirements
Required Skills
Certifications
- OSCP
Domain Knowledge
- Cybersecurity
- Defense
- Embedded Systems
- Engineering
Benefits & Perks
vision plans. Unlimited PTO 401k with company match Paren
Requirements
BS in CS/EE or related, or equivalent experience
6+ years in cybersecurity or secure software development, with no less than 2 years in a product security or offensive security role
Direct experience with the Department of Defense (DoD) Risk Management Framework (RMF), NIST 800-53, CNSSI 1253, and documenting security controls for Authority to Operate (ATO) or Authority to Connect (ATC) packages in eMass
Proven ownership of SAST/SCA/DAST and CI/CD security controls
Strong Linux internals and hardening experience (Ubuntu and/or NixOS)
Hands-on with cryptography engineering, key management, and secure boot chains
Compensation & Benefits
Overland AI believes in creating a work environment that you look forward to embracing every day.
The salary range for this position is $170K to $200K annually
Equity compensation
Best-in-class healthcare, dental and vision plans.
Unlimited PTO
401k with company match
Responsibilities
Lead the design and validation of security controls that ensure system integrity, intrusion prevention, secure logging, and data protection for robotic platforms.
Collaborate with customers, regulators, and internal teams to define and document security requirements that guide software development and system integration.
Ensure compliance with CSEIG v3.0, DISA STIGs, and NIST 800‑53/171 by implementing required controls and preparing evidence for certification and authorization (ATO/ATC) activities.
Drive a secure software development lifecycle (SDLC) by establishing policies, gates, and checklists across design, code review, CI/CD, and release processes.
Develop secure firmware and update mechanisms, including signed, atomic, and recoverable updates with built‑in health checks, CVE management, and SBOM generation.
Harden operating systems (Ubuntu and NixOS) through CIS/STIG baselines, AppArmor/SELinux configuration, systemd hardening, and least‑privilege enforcement.