ResponsibilitiesDesign security models that support multi-tenant platforms, diverse user groups and automated system behaviors Create a clear, scalable identity and access strategy across users, services, workflows and agents Define policy-based controls for environments, services, data-access layers and workflow execution Shape data protection standards covering classification, retention, minimization, lineage and usage transparency Establish runtime controls for safe automation including guardrails, permissible actions, validation steps and human-in-the-loop points Guide the adoption of secure delivery patterns in engineering and CloudOps including build, deploy and operate practices Design monitoring and audit structures that make system behavior observable and explainable Evaluate emerging risks related to automation, agent delegation, external integrations and cross-tenant data flowsWhat you will work withIdentity and access frameworks such as role, attribute and policy-based access models Policy engines and validation layers used across infrastructure, APIs, workflows and data surfaces Runtime controls for distributed systems including API-level permissions, workflow constraints, rate-limiting and isolation patterns Data governance concepts including classification, encryption, access boundaries and consent-driven use Observability and audit systems that track behavior across humans, services and automated agents Security models for advanced automation including safe action sets, agent trust boundaries and control checkpoints Lightweight design documentation, threat modelling and architecture standardsRequirementsStrong background in cloud-native security concepts and architectures Experience with identity, access, policy and data protection in multi-tenant or distributed platforms Ability to translate security needs into practical, widely adoptable patterns and design systems that support both high operational velocity and strong security posture Clear communication across technical and non-technical teams Comfortable designing for evolving requirements and new technical patterns Capable of transforming complex security concepts into practical designs that teams can adopt