Security Software Engineer, Platform Integration
About Anthropic Anthropic’s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole.
What this role actually needs.
About Anthropic Anthropic’s mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Responsibilities: - Attestation verification pipeline. Consume trusted reference integrity manifests for every component in the TCB. Validate measurements end-to-end, surface drift, and gate workload placement on attestation outcomes. - DICE chain consumption. Integrate with iRoT-rooted DICE chains where exposed, and define what Anthropic requires of partners where they aren't yet. - Dynamic root-of-trust and late-launch integration. Working with other security engineers to ensure Anthropic's host software stack securely leverages DRTM primitives, and work with silicon vendors and firmware maintainers to address gaps in relevant technologies. - Interconnect topology validation. Build the tooling to validate interconnect topology claims for multi-node workloads and catch deviations before they reach production. - CPU and interconnect encryption posture. Validate that CPU and interconnect encryption are enabled and attestable on a given system; own Anthropic's position on performance tradeoffs and multi-node attestation integration work. - Debug-disable verification. Define automated mechanisms to prove hardware debug mechanisms are disabled in production. Requirements: - Deep systems software engineering experience with kernel, firmware, or low-level platform code. - Understanding of hardware as encountered in modern server platforms, and implications of trust relationships within. - Working knowledge of modern attestation primitives: RoTs, TPMs, DICE, SPDM, measured boot, DRTM across major CPU architectures, reference integrity manifest best practices, remote attestation protocols and design patterns. - Ability to read vendor documentation critically and identify gaps between what the spec claims and what can actually be relied on in production . - Strong ownership disposition: comfortable being the one accountable for a capability landing, including when it requires pushing partners. - Supply-chain attestation work (SPDM, TCG provenance, pre-delivery identity bootstrapping beyond TOFU). Company context: Anthropic is an AI safety company building Claude, a frontier-model assistant for developers, enterprises, and consumers.
Day-to-day expectations
Anthropic lists these responsibilities for the Security Software Engineer, Platform Integration role.
- Attestation verification pipeline. Consume trusted reference integrity manifests for every component in the TCB. Validate measurements end-to-end, surface drift, and gate workload placement on attestation outcomes.
- DICE chain consumption. Integrate with iRoT-rooted DICE chains where exposed, and define what Anthropic requires of partners where they aren't yet.
- Dynamic root-of-trust and late-launch integration. Working with other security engineers to ensure Anthropic's host software stack securely leverages DRTM primitives, and work with silicon vendors and firmware maintainers to address gaps in relevant technologies.
- Interconnect topology validation. Build the tooling to validate interconnect topology claims for multi-node workloads and catch deviations before they reach production.
- CPU and interconnect encryption posture. Validate that CPU and interconnect encryption are enabled and attestable on a given system; own Anthropic's position on performance tradeoffs and multi-node attestation integration work.
- Debug-disable verification. Define automated mechanisms to prove hardware debug mechanisms are disabled in production.
What a strong candidate brings
These requirements are extracted from the source listing and normalized for UpJobz readers.
- Deep systems software engineering experience with kernel, firmware, or low-level platform code.
- Understanding of hardware as encountered in modern server platforms, and implications of trust relationships within.
- Working knowledge of modern attestation primitives: RoTs, TPMs, DICE, SPDM, measured boot, DRTM across major CPU architectures, reference integrity manifest best practices, remote attestation protocols and design patterns.
- Ability to read vendor documentation critically and identify gaps between what the spec claims and what can actually be relied on in production .
- Strong ownership disposition: comfortable being the one accountable for a capability landing, including when it requires pushing partners.
- Supply-chain attestation work (SPDM, TCG provenance, pre-delivery identity bootstrapping beyond TOFU).
Why this listing is more than a copied job post.
Security Software Engineer, Platform Integration is framed against UpJobz source checks, country scope, compensation visibility, and work-authorization signals so candidates can make a faster go/no-go decision.
United States tech market
United States roles on UpJobz are filtered for high-tech relevance, source freshness, and actionable employer detail before they are allowed into SEO surfaces.
Compensation read
The employer source does not expose a reliable salary range, so candidates should ask for compensation early instead of waiting until late-stage interviews.
Work authorization read
Current extracted signal: Open to TN, H-1B, and OPT candidates already in the United States. UpJobz treats this as a search signal, not legal advice, and links visa-sensitive roles back to the relevant visa hub where possible.
Location read
On-site roles in San Francisco should be compared against commute, local salary bands, and nearby employer demand.
Browse similar jobs
Turn this listing into an application plan.
This is the first pass at the premium UpJobz layer: a fast brief that helps serious applicants move with more clarity.
Next moves
- Tailor your resume around ai and llm instead of sending a generic application.
- Use the first two bullets of your application to connect your background directly to security software engineer, platform integration is a high-signal on-site role in san francisco, and it is most realistic for open to tn, h-1b, and opt candidates already in the united states.
- Open the role quickly if it fits and bookmark three similar jobs before you leave the page.
Interview themes
Watchouts
- Compensation is hidden, so get range clarity in the first recruiter conversation.
- Use open to tn, h-1b, and opt candidates already in the united states as part of your positioning so the recruiter does not have to infer it.
- Show concrete examples of succeeding in on-site environments.
Keywords to match against your background
Use these terms to decide whether your resume, portfolio, and recent projects line up with the role.
Apply through the employer source
Open the source listing from job-boards.greenhouse.io, confirm the role is still active, then apply on the employer or ATS page.
Source: job-boards.greenhouse.io · Source ID: 5209776008 · Confidence: 97/100 · Last checked: May 7, 2026
How UpJobz verifies job sourcesContinue browsing tech jobs