Help Build the Security Layer for the Agentic AI Era
We’re building at the frontier of two unstoppable waves : agentic AI and security . Autonomous AI agents are exploding in capability — planning, executing, and learning in real time — but enterprise security hasn’t caught up. That’s where we come in.
At Skyrelis, we’re creating the runtime security and observability layer for next-gen agentic systems, giving enterprises the trust, visibility, and control they need without slowing innovation. This is your chance to be part of a founding engineering team shaping a completely new category — agentic security — at the moment it matters most.
If you’ve ever wanted to join a startup right as the market is being created , work hands-on with cutting-edge AI frameworks , and help define the best practices and tools for securing autonomous systems at scale, this is it.
Why Join Us
- Shape a New Category – Build the security and observability layer for agentic AI before anyone else does.
- Frontier Tech – Work hands-on with multi-agent AI frameworks, runtime guardrails, and real-time security analytics.
- Zero → One Impact – No legacy code, no bureaucracy — your work defines the product and company direction.
- High Ownership – Early-stage equity and technical leadership in a rapidly growing market.
- World-Class Team – Founders with deep AI and cybersecurity experience who move fast and build ambitiously.
Core Responsibilities
Design and build Skyrelis’ forward-proxy architecture across customer-site and cloud environments (Envoy-based), enabling deep visibility and secure governance of multi-agent LLM traffic.Implement secure TLS interception flows , including termination, re-encryption, certificate validation, and safe handling of modern pinning / mTLS patterns.Architect and operate PKI systems —certificate issuance, rotation, trust chains, OCSP / CRL, and secure key lifecycle management.Develop Envoy extensions (filters, plugins, or WASM modules) to support telemetry capture, runtime risk scoring, and policy enforcement.Build secure networking paths for distributed agentic workloads (multi-agent, multi-tool, multi-region).Automate cloud security controls across public cloud platforms (AWS, GCP, Azure) using IaC (Terraform) and Kubernetes.Implement and maintain cloud security baselines , including IAM, detection / monitoring, CI / CD security, container security, network controls, and data protection workflows.Deploy and scale secure data-plane components using Kubernetes, Fargate / ECS, or equivalent cloud-native infrastructure.Collaborate with the Control Plane team to integrate proxy events, telemetry, and policy decisioning.Contribute to threat models, architecture documents, and internal security reviews across the platform.What You Bring
Required Experience
7+ years in cloud security engineering, distributed systems, or platform security.Deep expertise in public cloud platforms (AWS strongly preferred; GCP / Azure beneficial) and their native security services.Strong background in cloud networking : VPC design, private link, routing, DNS, load balancing, layer 4–7 protocols (TCP / IP, HTTP / 2, gRPC).Proven hands-on experience with Envoy Proxy (or Nginx / HAProxy / Squid), including extensions or custom integrations.Advanced understanding of TLS, PKI, X.509 , certificate authorities, trust chains, and secure key storage.Experience with TLS MITM workflows in enterprise environments (inspection, pinning strategies, mTLS).Strong software development skills in Go and / or Python with a track record of shipping production systems.Deep experience with Terraform (module design, complex provider usage, enterprise patterns).Expertise in Kubernetes security , including operators, admission controllers, and platform extensions.Demonstrated ability to design and scale distributed cloud-native systems (multi-region, low-latency architectures).Proven history leading technical initiatives, setting engineering standards, and elevating organizational capability.Nice-to-Haves
WASM filter development in Envoy.Experience with LLM / agent telemetry, inference traffic patterns, or AI observability.Familiarity with service mesh technologies (Istio, Linkerd).Background in high-scale observability stacks or data-plane performance tuning.Experience with secure multi-region data-plane and control-plane architectures.We’re grateful to everyone who takes the time to apply. While we’re unable to respond to every applicant, we’ll be in touch directly with those whose experience aligns closely with the role.