<div>
<p style="text-align: justify; margin-top: 0pt; margin-bottom: 0pt;"><strong><span style="font-size: 11pt; font-family: Arial, sans-serif;">Who are We?</span></strong></p>
<br>
<p style="text-align: justify; margin-top: 0pt; margin-bottom: 0pt;"><a href="[Upgrade to PRO to see link]" style="text-decoration: none;"><span style="font-size: 11pt; font-family: Arial, sans-serif; color: #0000ff; text-decoration: underline; text-decoration-skip-ink: none;">Field AI</span><span style="font-size: 11pt; font-family: Arial, sans-serif; color: #000000;"> </span></a><span style="font-size: 11pt; font-family: Arial, sans-serif;">is transforming how robots interact with the real world. We are building risk-aware, reliable, and field-ready AI systems that address the most complex challenges in robotics, unlocking the full potential of embodied intelligence. We go beyond typical data-driven approaches or pure transformer-based architectures, and are charting a new course, with already-globally-deployed solutions delivering real-world results and rapidly improving models through real-field applications.</span></p>
<br>
<p style="text-align: justify; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 11pt; font-family: Arial, sans-serif;">Learn more at </span><a href="[Upgrade to PRO to see link]" style="text-decoration: none;"><span style="font-size: 11pt; font-family: Arial, sans-serif; color: #1155cc; text-decoration: underline; text-decoration-skip-ink: none;">[Upgrade to PRO to see link]</span></a></p>
<br>
<h2 style="margin-top: 18pt; margin-bottom: 4pt;"><strong><span style="font-size: 17pt; font-family: Arial, sans-serif;">About the Job</span></strong></h2>
<p style="margin-top: 12pt; margin-bottom: 12pt;"><span style="font-size: 11pt; font-family: Arial, sans-serif;">We are seeking a Robotics Platform Security Engineer to serve as the lead architect for our security. This role is not about theoretical research; it is a high stakes, applied position centered on building a robust Root of Trust from the silicon up. You will be responsible for the "Base Layer" of our autonomous systemsβarchitecting Secure Boot flows, managing hardware-backed cryptographic keys, and engineering hardened UNIX/Linux environments that can withstand both remote network attacks and direct physical tampering. Your mission is to ensure the robotic platform is a "Fortress OS" before a single line of mission-specific code is ever executed.</span></p>
<h2 style="margin-left: 18pt; text-indent: -18pt; margin-top: 18pt; margin-bottom: 4pt; padding-left: 18pt;"><strong><span style="font-size: 17pt; font-family: Arial, sans-serif;">What Youβll Get To Do</span></strong></h2>
<ul style="margin-top: 0px; margin-bottom: 0px; padding-inline-start: 48px;">
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 12pt; margin-bottom: 0pt;"><span style="font-size: 11pt;">Hardware Root of Trust & Secure Boot: Design and implement the end-to-end boot chain (from UEFI/Secure Boot to Measured Boot) to ensure the hardware validates every stage of the bootloader and kernel via TPM or Secure Elements.</span></p>
</li>
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 11pt;">Applied OS Hardening: Construct UNIX/Linux golden build images. This includes deep sysctl tuning, authoring custom AppArmor profiles, and stripping the kernel of non-essential drivers to eliminate lateral movement vectors.</span></p>
</li>
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 11pt;">Hardened Network Architecture: Engineer the robotβs security, utilizing mTLS for inter-process communication and configuring strictly scoped iptables/UFW policies to isolate sensitive control telemetry from external interfaces.</span></p>
</li>
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 11pt;">Security Orchestration (Python): Build a suite of Python tools to automate continuous security posture checks, including CIS Benchmark audits, automated certificate rotation, and real-time integrity monitoring via auditd.</span></p>
</li>
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 0pt; margin-bottom: 12pt;"><span style="font-size: 11pt;">Applied Vulnerability Research: Proactively identify and patch CVEs in the Linux ecosystem, using Python for automated fuzz testing of networking protocols and system interfaces.</span></p>
</li>
</ul>
<div style="font-size: 11pt;font-family: Arial, sans-serif;">
<h2 style="margin-left: 18pt; text-indent: -18pt; margin-top: 18pt; margin-bottom: 4pt; padding-left: 18pt;"><strong><span style="font-size: 17pt; font-family: Arial, sans-serif;">What You Have</span></strong></h2>
<ul style="margin-top: 0px; margin-bottom: 0px; padding-inline-start: 48px;">
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 12pt; margin-bottom: 0pt;"><span style="font-size: 11pt;">Applied System Mastery: Expert-level experience in Linux/UNIX administration and security hardening. You have a proven history of creating production-ready "Golden Images" compliant with STIG or CIS Benchmarks.</span></p>
</li>
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 11pt;">Hardware Security Expertise: Hands-on experience with TPM 2.0, Secure Elements (SE), and hardware-backed key storage. You understand the physical trust boundary of an embedded system and autonomous fleet.</span></p>
</li>
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 11pt;">Dual-Stack Programming: High proficiency in C/C++ for low-level system interactions and Python for building complex security automation and audit frameworks.</span></p>
</li>
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 11pt;">Network Defense: Deep knowledge of defensive networking, including VPN overlays, SSH hardening, and encrypted transport protocols (TLS/mTLS) for real-time systems.</span></p>
</li>
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 0pt; margin-bottom: 12pt;"><span style="font-size: 11pt;">Problem-Solving: The ability to conduct comprehensive threat modeling for robotic platforms, specifically identifying risks in the boot process and network-exposed interfaces.</span></p>
</li>
</ul>
<div style="font-size: 11pt;font-family: Arial, sans-serif;">
<h2 style="margin-left: 18pt; text-indent: -18pt; margin-top: 18pt; margin-bottom: 4pt; padding-left: 18pt;"><strong><span style="font-size: 17pt; font-family: Arial, sans-serif;">The Extras That Set You Apart</span></strong></h2>
<ul style="margin-top: 0px; margin-bottom: 0px; padding-inline-start: 48px;">
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 12pt; margin-bottom: 0pt;"><span style="font-size: 11pt;">Experience designing or implementing a complete secure boot and measured boot chain</span></p>
</li>
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 11pt;">Hands-on work with TPM backed disk encryption and remote attestation</span></p>
</li>
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 11pt;">Experience securing over-the-air (OTA) update systems</span></p>
</li>
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 11pt;">Deep familiarity with Linux boot internals (UEFI, GRUB, shim, UKI)</span></p>
</li>
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 11pt;">Experience hardening systems that operation in physically adversarial or untrusted environments</span></p>
</li>
<li style="font-size: 11pt; font-family: Arial, sans-serif;">
<p style="margin-top: 0pt; margin-bottom: 12pt;"><span style="font-size: 11pt;">Strong understanding of network isolation and encryption</span></p>
</li>
</ul>
</div>
</div>
</div>
Compensation and Benefits
Our salary range is between ($90,000 - $300,000 annual), but we take into consideration an individual's background and experience in determining final salary; base pay offered may vary considerably depending on geographic location, job-related knowledge, skills, and experience. Also, while we enjoy being together on-site, we are open to exploring a hybrid or remote option.
Why Join Field AI?
We are solving one of the worldβs most complex challenges: deploying robots in unstructured, previously unknown environments. Our Field Foundational Modelsβ’ set a new standard in perception, planning, localization, and manipulation, ensuring our approach is explainable and safe for deployment.
You will have the opportunity to work with a world-class team that thrives on creativity, resilience, and bold thinking. With a decade-long track record of deploying solutions in the field, winning DARPA challenge segments, and bringing expertise from organizations like DeepMind, NASA JPL, Boston Dynamics, NVIDIA, Amazon, Tesla Autopilot, Cruise Self-Driving, Zoox, Toyota Research Institute, and SpaceX, we are set to achieve our ambitious goals.
Be Part of the Next Robotics Revolution
To tackle such ambitious challenges, we need a team as unique as our vision β innovators who go beyond conventional methods and are eager to tackle tough, uncharted questions. Weβre seeking individuals who challenge the status quo, dive into uncharted territory, and bring interdisciplinary expertise. Our team requires not only top AI talent but also exceptional software developers, engineers, product designers, field deployment experts, and communicators.
We are headquartered in always-sunny Irvine, Southern California and have US based and global teammates.
Join us, shape the future, and be part of a fun, close-knit team on an exciting journey!
We celebrate diversity and are committed to creating an inclusive environment for all employees. Candidates and employees are always evaluated based on merit, qualifications, and performance. We will never discriminate on the basis of race, color, gender, national origin, ethnicity, veteran status, disability status, age, sexual orientation, gender identity, marital status, mental or physical disability, or any other legally protected status.