At a Glance
- Tasks: Join Apple to tackle security challenges in cloud infrastructure and protect massive data.
- Company: Be part of Apple's innovative team focused on cutting-edge technology and security.
- Benefits: Competitive salary, health benefits, continuous learning, and career growth opportunities.
- Other info: Collaborative environment with ownership of security projects and cross-team collaboration.
- Why this job: Make a real impact on security for millions of users while working with top-tier tech.
- Qualifications: Strong backend software engineering skills and knowledge of security concepts required.
The predicted salary is between 60000 - 80000 £ per year.
Join the Apple Cloud Object Store (ACOS) team as a Software Engineer with a focus on security. The ACOS team, which is part of Apple Services Engineering organisation, is one of the most critical infrastructure teams at Apple, storing and serving petabytes of data across Apple's services. In this role you'll work at the intersection of distributed systems engineering and security — building the authentication, authorisation, and encryption foundations that protect data at exabyte scale.
The security challenges in a large-scale cloud object store are deep and varied. You will work on problems such as:
- Designing and evolving authentication systems to meet modern security standards.
- Implementing and improving encryption-at-rest schemes with robust key lifecycle management at scale.
- Building IAM policy enforcement at high throughput.
- Driving compliance for a multi-region storage platform.
- Conducting threat modeling for a system handling hundreds of thousands of requests per second.
You'll also contribute to broader storage engineering work — durability, availability, multi-tenancy, and performance — making this a well-rounded SWE role with a security-first mindset.
Responsibilities
- Join a highly collaborative team that values mutual support and security-first engineering.
- Own and contribute to security infrastructure projects across authentication, authorisation, and encryption.
- Implement and evolve authentication systems to meet modern security standards.
- Build and maintain encryption-at-rest infrastructure.
- Participate in threat modeling for new and existing features.
- Identify, scope, and lead projects that span security, reliability, isolation, scalability, and maintainability.
- Collaborate with Apple's Security and Privacy orgs, serving as the storage org's point of contact for security matters.
Minimum Qualifications
- Solid backend software engineering experience with strong computer science fundamentals: networking, distributed systems, and security concepts.
- Good understanding of authentication and authorisation.
- Understanding of cryptographic fundamentals.
- Experience driving complex projects end-to-end and collaborating across teams.
Preferred Qualifications
- Experience with IAM systems, STS/short-lived credentials, or policy-based access control.
- Hands‑on experience with encryption infrastructure.
- Familiarity with compliance frameworks such as PCI-DSS or SOX in a cloud infrastructure context.
- Experience with threat modeling methodologies or conducting security design reviews.
Software Engineer, Security in London employer: Apple
Contact Detail:
Apple Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Software Engineer, Security in London
✨Tip Number 1
Network like a pro! Attend tech meetups, conferences, or online webinars related to software engineering and security. It's a great way to meet industry folks and get your name out there.
✨Tip Number 2
Show off your skills! Build a portfolio showcasing your projects, especially those related to authentication, encryption, or distributed systems. This will give potential employers a taste of what you can do.
✨Tip Number 3
Don’t just apply anywhere; focus on companies that align with your values and interests, like Apple. Use our website to find roles that excite you and tailor your approach to each one.
✨Tip Number 4
Prepare for interviews by brushing up on your knowledge of security concepts and distributed systems. Practice common technical questions and be ready to discuss your past projects in detail.
We think you need these skills to ace Software Engineer, Security in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your backend software engineering experience and security knowledge. Use keywords from the job description to show we’re on the same page about what you bring to the table.
Showcase Relevant Projects: Include specific examples of projects where you've tackled authentication, authorisation, or encryption challenges. We want to see how you've applied your skills in real-world scenarios, especially in distributed systems.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Explain why you're excited about the role and how your experience aligns with our security-first mindset. Let us know what makes you a great fit for the ACOS team.
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team!
How to prepare for a job interview at Apple
✨Know Your Security Fundamentals
Make sure you brush up on your knowledge of authentication and authorisation protocols like OAuth2 and mTLS. Being able to discuss these concepts confidently will show that you understand the core security principles that are crucial for the role.
✨Showcase Your Project Experience
Prepare to talk about complex projects you've driven from start to finish, especially those involving security or distributed systems. Highlight your collaboration with other teams and how you navigated challenges, as this will demonstrate your ability to work in a highly collaborative environment.
✨Familiarise Yourself with Compliance Frameworks
Since compliance is a big part of the role, it’s a good idea to have a basic understanding of frameworks like PCI-DSS or SOX. Be ready to discuss how you’ve applied these in past projects or how you would approach compliance in a cloud infrastructure context.
✨Prepare for Technical Questions
Expect technical questions related to cryptographic fundamentals and encryption infrastructure. Brush up on key lifecycle management and encryption-at-rest schemes, as being able to explain these concepts clearly will set you apart from other candidates.