Founding Engineer candidate brief

Technical PRD Briefs for Founding Engineers

A public, candidate-facing version of the product and engineering workstreams a Founding Platform & AI Systems Engineer should be ready to own, review, or challenge.

Why this page exists:
JurneeGo is not hiring a task-only engineer. This role requires system ownership across child safety, role boundaries, AI orchestration, auditability, and PRD-to-Jira execution discipline.

How candidates should read these PRDs

These are not full internal specifications. They are public technical briefs that summarize the areas where a founding engineer should be able to reason clearly, make tradeoffs, and convert product requirements into safe, testable systems.

AreaWhat we are evaluatingWhy it matters
System boundariesCan you keep child, parent, teacher, school, and internal roles separated?Unsafe access patterns break trust before product-market fit can be tested.
AI safetyCan you design around guardrails, prompt attacks, model fallback, and output integrity?Children should never become experimental edge cases for general-purpose AI.
Execution disciplineCan you move from PRD to Jira to build to QA without silently redefining scope?Early-stage speed only works if product truth is preserved.

Candidate-facing PRD briefs

PRD 01

Edge Admission, Identity & Role Validation

Every session or request should enter the system through an identity and role boundary. A founding engineer should be able to design admission logic that validates user identity, role claims, session context, and authorization before any child-facing workflow proceeds.

  • JWT / identity validation
  • Role-aware admission for child, parent, teacher, and school contexts
  • Fail-closed behavior for invalid or ambiguous access
  • Audit logging of admission decisions
PRD 02

Input Safety, PII Screening & Prompt Attack Prevention

Before messages reach AI services, the platform must screen for unsafe content, denied topics, personally identifiable information, and adversarial prompt behavior. The engineer should understand both safety UX and enforcement design.

  • Input guardrails before LLM calls
  • PII and sensitive-data handling
  • Denied-topic and safety boundary logic
  • Block, redirect, and escalation states
PRD 03

AI Orchestration & Canonical Response Integrity

JurneeGo’s child-facing AI output should be generated through a controlled pipeline. Curator notes, translation layers, and analytics may render or annotate the canonical response, but should not secretly rewrite it.

  • Model routing and fallback
  • Prompt context boundaries
  • Immutable canonical child-facing response
  • Cost / latency / quality tradeoff analysis
PRD 04

Shared Session Architecture Event Flow

Shared learning means the child is not interacting with AI alone. The platform must synchronize session events across child, parent, and teacher views while preserving agency, visibility, and role permissions.

  • Real-time event stream and projections
  • Parent / teacher visibility without hidden monitoring
  • Annotation events separated from AI output
  • Session auditability and replayable event history
PRD 05

Async Worker Tier for Analytics, Reports & Notifications

Learning analytics, reporting, and notification workflows should not slow the child-facing learning experience. A founding engineer should design asynchronous processing that is reliable, observable, and safe for sensitive data.

  • Queue-based async processing
  • Learning analytics and reporting jobs
  • Notification workflow isolation
  • Dead-letter and retry behavior
PRD 06

Secrets Hygiene, Observability & Audit Visibility

The platform needs rigorous handling of provider credentials, storage credentials, safety logs, model calls, access events, and operational telemetry. This is not optional infrastructure; it is part of trust.

  • Dedicated secrets system and rotation
  • Centralized logs and distributed traces
  • Audit visibility for safety and access events
  • Operational alerting tied to child-facing reliability

PRD-to-Jira operating discipline

JurneeGo’s internal operating rule is simple: product decisions and PRDs explain the work; Jira tracks execution. A founding engineer should be comfortable turning approved product requirements into Jira epics, stories, tasks, bugs, QA criteria, and completion evidence.

Expected founding-engineer behavior:
Challenge unclear PRDs early. Link Jira work back to source requirements. Preserve canon. Do not let implementation silently redefine child-facing product behavior.
  1. Read the product intent.

    Understand the user role, safety constraint, product behavior, and non-goals before implementation.

  2. Break down the system.

    Convert requirements into backend, frontend, AI pipeline, data, logging, QA, and release tasks.

  3. Protect child-facing truth.

    Keep canonical AI output, curator annotations, and presentation layers separated unless an approved system-level process says otherwise.

  4. Evidence completion.

    Closed tickets are not enough; the feature must be tested, accepted, and evidenced.

Optional technical thought exercise

Before applying, candidates may submit a short written response, diagram, or component breakdown answering:

Design a safe multi-tenant AI platform used by children, parents, and teachers.

Your design should consider system boundaries, role-based access, safety guardrails, AI orchestration, prompt context management, logging, monitoring, audit visibility, reliability, and deployment strategy.