Principal UX Designer, AWS Security, Search, Observability & Governance

Amazon

Amazon

Product, Design

Santa Clara, CA, USA

Posted on May 1, 2026

Description

We are looking for a Principal UX Designer to define and own the end-to-end design strategy for AWS's security, observability, and agentic AI product portfolio. This is a high-impact IC role with significant organizational influence. You will partner directly with VP-level Product and Engineering leaders to shape products used by millions of security practitioners worldwide. The ideal candidate combines elite visual craft with deep technical fluency, operates as an "architect of systemic solutions" rather than a feature designer, and has a track record of shipping design systems that scale across complex B2B enterprise environments.

Key job responsibilities
1. Define the long-term UX vision and roadmap for AWS Security products (GuardDuty, Security Hub, Detective, Inspector, IAM) in partnership with senior product and engineering leadership
2. Architect and govern a unified design system across the security portfolio, ensuring consistency, accessibility, and scalability for high-density data interfaces
3. Lead the design of agentic AI interfaces — including intent-driven system actions, guided investigations, and human-in-the-loop approval workflows for automated security operations
4. Drive "design-as-code" practices: build production-quality prototypes using modern stacks (React, TypeScript) to collapse design-engineering feedback loops
5. Establish UX quality benchmarks and lead critique sessions across the organization, elevating design maturity and craft standards globally
6. Mentor and develop a team of senior designers, providing technical guidance and career development
7. Represent Design in executive reviews (VP, SVP) with data-driven recommendations and clear strategic narratives
8. Navigate complex stakeholder matrices to build consensus across multiple product teams operating under a shared UX umbrella

A day in the life
Your morning might start with a competitive signal, that you’re framing into a design implication for the team’s weekly brief. By mid-morning you’re in a working session with an applied scientist, pressure-testing the interaction model for an AI-generated observability insight before it goes into prototyping. You’re not waiting for a PM to write the brief. You’re shaping the problem definition. Afternoons might be a prototype review with a customer, gathering direct signal on whether the attack path visualization reads as actionable or overwhelming. Or it’s a cross-domain sync, where you’re reconciling interaction patterns between domains so that users moving between products don’t feel the seams. At this level, your output isn’t screens, it’s the design intelligence that sharpens how the entire team operates. You’re setting the bar for craft, bringing structure to ambiguous problem spaces, and making the case for design at the product definition layer, not after it.​​​​​​​​​​​​​​​​

About the team
The SSOG design team shapes the experience of AWS’s most technically demanding products — Security, Observability, Governance, and Search. We cover a portfolio that includes GuardDuty, Security Hub, CloudWatch, OpenSearch, and next-generation agentic surfaces like Security Workbench and Horizon. Our work spans the AWS Console, standalone web UIs, and increasingly the IDE, where security, observability, and governance signals are converging into the developer workflow itself.

We operate as an AI-native builder team. Every designer works directly alongside engineering in shared workflows, using tools like Kiro and our own SSOG Brain, a multi-agent design intelligence system we built to accelerate research synthesis, user flow generation, and UX quality review across domains. We don’t hand off specs and wait. We prototype, run experiments, and push toward production.

The problems we’re solving are genuinely hard: how do you make agentic security investigations legible to a CISO? How do you design trust and explainability into systems that act autonomously? How do you unify five distinct products into a cohesive operational experience without flattening what makes each one useful? If that’s the kind of challenge that pulls you in, you’ll find your people here.