Principal Security Engineer

Job Description
Amazon Lab126 is an inventive research and development company that designs and engineers high-profile consumer electronics. Lab126 began in 2004 as a subsidiary of, Inc., originally creating the best-selling Kindle family of products. Since then, we have produced groundbreaking devices like Fire tablets, Fire TV, Fire phone, and Amazon Echo. What will you help us create?

Work hard. Have fun. Make history.

The Role:
Lab 126 is looking for a Principal Security Engineer to ensure that our Kindle applications, services and handling of content are designed and implemented to the highest standards thus maintaining and enhancing customer trust. You will ensure that customers owned all their entitlements, untampered, in a secure manner. Our content providers’ rights are protected. You will be responsible for the security from content ingestion until the words are live in customer’s screens. If you enjoy analyzing, breaking and coming-up with solutions to applications from a security perspective, and you are skilled at discovering security issues that appear under new threat scenarios, this position will provide you with a challenging opportunity. Your work will have impact across the entire organization and company. Also, you will coach and mentor security, and software engineers in security best practices for design and development.

You will tackle challenging, unique situations every day. You should be comfortable with a high degree of ambiguity and relish the idea of solving problems that haven’t been solved before. Along the way, we guarantee that you’ll learn a ton, have fun and make a significant impact on millions of Amazon customers. There are opportunities to leverage your security engineering skillset across many teams and initiatives and to also go deep and get your hands on the hard problems you are passionate about.


Basic Qualifications

  • Bachelor’s Degree in Computer Science, Computer Engineering or related field, or 10+ years relevant work experience
  • 10+ years of experience in vulnerability testing and auditing
  • 10+ years of application security experience
  • 10+ years of experience and involvement with development team(s) that delivered commercial software or software-based services (development, QA testing, or security role)
  • Strong experience and detailed technical knowledge in security engineering, system and network security, authentication and security protocols, cryptography, and application security
  • Experience with the application of threat modeling or other risk identification techniques
  • Development experience in C, C++ and/or Java and scripting skills (e.g., PERL, shell scripting)
  • Excellent written and verbal communication skills
  • Excellent leadership skills and teamwork skills

Preferred Qualifications

  • Master’s/PhD degree in Computer Science or equivalent
  • 15+ years of security engineering experience
  • 15+ years of experience in vulnerability testing and auditing
  • Experience with service-oriented architecture and web services security
  • Experience with the application of threat modeling or other risk identification techniques
  • Detailed knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits
  • Knowledge of network and web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols)
  • Results oriented, high energy, self-motivated

Meet Some of Amazon Lab126's Employees

Guneet S.

Senior Manager, Hardware Reliability Engineering

Guneet leads the Hardware Reliability Development Team that works on the Kindle, Fire, and Amazon Echo family of products. Guneet's team plays an essential role in making products like Fire tablets robust and reliable so customers can use them for years.

Cicie W.

Technical Program Manager, Device Software

Cicie oversees the Software Development and Quality Assurance Teams to support products using the Fire operating system. She specifically handles product battery life and thermal mitigation strategies.

Back to top