<div>
<h2 style="margin-top: 18pt; margin-bottom: 4pt;"><strong><span style="font-size: 17pt; font-family: Arial, sans-serif;">About the Role</span></strong></h2>
<p style="margin-top: 12pt; margin-bottom: 12pt;"><span style="font-size: 11pt; font-family: Arial, sans-serif;">Parallel Domain is looking for a Principal Site Reliability Engineer to own the reliability, scalability, and security of our cloud infrastructure - the backbone that runs simulation workloads for some of the most demanding customers in autonomous vehicle development.</span></p>
<p style="margin-top: 12pt; margin-bottom: 12pt;"><span style="font-size: 11pt; font-family: Arial, sans-serif;">This is a hands-on, high-ownership role. You'll be the primary infrastructure owner across our multi-region AWS/EKS platform, working closely with a small platform engineering team, partnering with engineering leads across simulation and ML, and our customer-facing teams.</span></p>
</div>
What You'll Do
Infrastructure Ownership & Cloud Operations
β’
Own and evolve our AWS-based infrastructure, improving platform performance and availability today, and building toward deployable configurations that support enterprise customer environments tomorrow.
β’
Own EKS cluster operations across production regions: node pool strategy, AMI lifecycle, autoscaling, and Kubernetes workload health.
β’
Support the GitOps deployment pipeline - define, deploy, and manage applications across clusters using infrastructure-as-code.
β’
Manage complex networking: VPC design, cross-region connectivity, DNS, and load balancing.
β’
Lead infrastructure deprecation and migration efforts with minimal disruption.
Reliability Engineering & Incident Response
β’
Own SLO measurement infrastructure; enable proactive triage of emerging issues before they impact customers.
β’
Lead incident investigation, root cause analysis and postmortems, driving systemic fixes rather than one-off patches.
β’
Design and improve automated remediation systems to reduce MTTR.
Security & Access Management
β’
Review and provide security-conscious feedback on platform architecture decisions.
β’
Own cloud IAM governance - roles, policies, and access boundaries across accounts and services.
β’
Lead compliance-adjacent work including audit-readiness, partner certification requirements, and supporting responses to customer security questionnaires.
Cross-Functional Collaboration
β’
Partner with application development teams to build an inherently secure platform and drive next-generation deployment architecture.
β’
Partner with customer teams to ensure availability for expected utilization.
β’
Partner with Finance on cloud cost optimization - lifecycle policies, right-sizing, and spend visibility.
β’
Support GPU and batch workloads in collaboration with simulation and ML engineering teams.
Platform Tooling & Developer Experience
β’
Improve CI/CD pipelines and automated infrastructure validation.
β’
Support engineering teams with infra-side debugging, log analysis, and environment configuration.
What We're Looking For
Technical Depth
β’
5+ years in SRE, DevOps, or infrastructure engineering roles.
β’
Infrastructure-as-code proficiency - Terraform modules, state management, and multi-environment patterns.
β’
Deep AWS experience - EKS, EC2, IAM, S3, Storage Gateway, VPC networking, Transit Gateway, CloudFront, KMS, and IRSA.
β’
Kubernetes expertise - cluster operations, node pools, probes, cordoning, pod scheduling, RBAC, Helm, node autoscaling (Karpenter experience a plus); solid understanding of containerization and AMI lifecycle management.
β’
CI/CD - experience with GitOps workflows and pipeline tooling (ArgoCD, GitHub Actions, Jenkins)
β’
Solid networking fundamentals - CIDR design, security groups, DNS, load balancing, VPN, cross-region connectivity.
β’
Experience with monitoring and observability tooling - Prometheus, Grafana, Elasticsearch.
β’
Comfort with Python and Bash for tooling and automation.
β’
Familiarity working across Linux and Windows environments. Operational familiarity with Windows Server is a meaningful advantage.
Communication & Ownership
β’
You communicate clearly across engineering, product, and customer-facing teams, flagging issues with urgency proportional to customer impact.
β’
You advocate for SRE best practices and can effectively operationalize an informed and principled view on security.
β’
You take end-to-end ownership of complex, multi-team efforts - from planning through execution and post-change verification.
β’
You know when to push for a clean solution vs. when to accept a pragmatic one, and you communicate that tradeoff clearly.
Nice to Have
β’
Experience with Windows-based workloads on EKS.
β’
Experience supporting simulation, ML, or rendering workloads in cloud infrastructure; running GPU workloads on Kubernetes, including NVIDIA and DirectX device plugin configuration.
β’
Experience with AWS Storage Gateway or Transfer Family integrations.
β’
Familiarity with Envoy Gateway or similar.
β’
Experience with container-optimized OS images (e.g., Bottlerocket, Packer).
β’
Experience with cloud cost optimization at scale.
Core Tools
Terraform Β· AWS Β· Kubernetes Β· Helm Β· ArgoCD Β· Kustomize Β· Grafana Β· Prometheus Β· Elasticsearch Β· VictoriaLogs Β· Fluent Bit Β· GitHub Actions Β· Jenkins Β· Docker Β· Python Β· Bash
Why This Role
PD's simulation platform runs at the intersection of high-performance compute, distributed systems, and customer-critical reliability. The infrastructure problems here are genuinely interesting β multi-region GPU scheduling, Windows workloads on Kubernetes, startup latency optimization, and an enterprise product direction that will require rethinking how we deploy and manage the platform entirely.
The Principal SRE at PD is not a ticket-taker - it's a high-trust, high-autonomy position where you'll have genuine influence over infrastructure architecture, cross-team process, and customer experience.