Job Url: https://www.linkedin.com/jobs/search/?currentJobId=4367407549&distance=25.0&f_AL=true&f_TPR=r86400&f_WT=2&geoId=103644278&keywords=software%20engineer&origin=JOB_SEARCH_PAGE_JOB_FILTER&start=450 Job Description: Principal Software Engineer YouSource.ai · Palo Alto, CA (Remote) Easy Apply Save Save Principal Software Engineer at YouSource.ai Show more options Your profile is missing required qualifications Show match details Help me update my profile BETA Is this information helpful? Get personalized tips to stand out to hirers Find jobs where you’re a top applicant and tailor your resume with the help of AI. Try Premium for PKR0 Meet the hiring team Todd Gould 3rd Founder | Inventor | Stanford Graduate School of Business Alumnus Job poster Message About the job Company Description YouSource.ai is redefining network security in an AI-driven world with its innovative Forge platform, designed to ensure digital trust at scale. By embedding cryptographic identity, policy, and enforcement directly into systems, the Forge platform assumes breach conditions and prevents failures by design. With capabilities like runtime protection, identity-bound access without passwords, and containment of lateral movement, YouSource focuses on securing AI agents and autonomous systems. YouSource.ai provides cutting-edge solutions in network-native trust enforcement and digital trust technologies, offering alternatives to conventional security methods. Learn more at yousource.ai. Role Description You will own YouSource.ai’s Windows Forge Agent end-to-end development. This is deep systems engineering: kernel-adjacent enforcement, secure identity anchoring, deterministic behavior, and zero-trust-by-design runtime protection. Your job is to build a production-grade Windows agent that enforces cryptographic trust, policy, and segmentation at runtime. You will get to engineer and implement a new Digital Trust Layer(DTL) protocal that embeds cryptographic identity with every packet. Location: Fully remote (U.S.). Bay Area preferred. Responsibilities: Architecture & Ownership • Own the technical architecture of the Windows agent • Make hard tradeoffs between security, performance, and stability • Define failure modes and ensure the system fails closed • Enforce strict determinism and idempotency across agent behavior Windows Systems Engineering • Develop in C++ and Rust (Python only for tooling) • Work with: • Windows Filtering Platform (WFP) • Minifilter drivers (where appropriate) • Windows security primitives (LSA, tokens, SID, integrity levels) • TPM / CryptoAPI / CNG • Design secure IPC between kernel and user mode • Handle edge cases: reboots, crashes, partial upgrades, corruption Security & Trust Enforcement • Implement cryptographic identity anchoring • Enforce policy at runtime, not just at access time • Prevent trust replay, token reuse, and lateral movement • Assume the endpoint is under active attack Production Hardening • Build for real enterprise environments: • EDR conflicts • Legacy software • Locked-down systems • Instrument for diagnosability without leaking sensitive data • Write code that survives audits, pen tests, and red teams Technical Leadership • Set engineering standards for agent development • Review and challenge designs (including your own) • Mentor senior engineers — but remain hands-on • Push back on unsafe or naïve assumptions Required Experience • 10+ years professional software engineering • Deep Windows internals experience • Shipped at least one endpoint agent, security product, or kernel-adjacent system • Strong C++ systems programming background • Comfort working close to the OS without crashing it • Proven ability to debug production failures with limited visibility Strongly Preferred • Kernel driver experience (WFP, Minifilter, or equivalent) • Rust in security-critical systems • TPM / HSM / secure enclave work • Endpoint security, EDR, or network enforcement products • Experience designing agents that must be: • Invisible to users • Resistant to tampering • Safe to auto-update