Member of the Technical Staff, Security Engineering, Cryptography
Anchorage Digital
Core Competencies
- Deep understanding of modern cryptography: Proficiency in symmetric and asymmetric encryption, hashing algorithms, key management, and cryptographic protocols. Blockchain protocols experience is a plus.
- Secure coding expertise: Demonstrated ability to write secure, efficient, and well-documented code in Go and Python, with a focus on cryptographic implementations.
- Systems thinking: Ability to analyze complex systems, identify potential vulnerabilities, and design robust security solutions within a distributed architecture. Experience with Hardware Security Modules is a plus.
- Strong problem-solving skills: Capacity to troubleshoot cryptographic issues, analyze security threats, and develop effective mitigation strategies.
- Excellent communication and collaboration: Ability to clearly explain complex cryptographic concepts to both technical and non-technical audiences.
Technical Skills
- Develop and implement high-quality, secure code for cryptographic controls throughout our infrastructure.
- Review code throughout the technology stack and help engineering teams resolve issues related to security guardrails.
- Foster an efficient testing culture while reducing technical debt and unnecessary processes.
Complexity and Impact of Work
- Build robust, resilient components that are easily integrated by other teams to ensure asset and data security.
- Develop and maintain threat models for cryptosystem guarantees, both internal and external. Monitor technical debt and proactively identify areas for improvement.
- Lead or substantially contribute to medium and large Security Team initiatives with minimal oversight. Coordinate team members across engineering boundaries and drive projects from inception to completion.
- Break complex projects into manageable tasks with accurate time and scope estimates. Present options clearly, analyze tradeoffs thoroughly, and provide well-reasoned priority recommendations.
- Deliver work that aligns with departmental objectives, subject to review upon completion. Take ownership of tactical business targets that affect team performance.
Organizational Knowledge
- Understand and help implement the company's strategy by participating in planning and defining the Security Team's strategic goals in alignment with Anchorage Digital's overall objectives.
- Stay alert to emerging company objectives and industry trends that could affect organizational success.
- Consider security holistically across the entire product ecosystem while fostering a security-first company culture.
- Balance speed of delivery with careful planning and precision.
Communication and Influence
- Share knowledge broadly across the team while preventing single points of failure.
- Mentor and guide engineers throughout the Engineering team. Help them understand security's impact on Anchorage Digital's strategic goals, enabling them to develop new technologies and services safely with appropriate oversight.
- Collaborate across teams to solve problems, review specifications, and engage in technical discussions. Communicate insights and recommendations clearly to improve processes and address technical debt.
- Demonstrate empathy by understanding others' context, needs, motivations, and concerns—adapting communication style to maximize effectiveness.
You may be a fit for this role if you have:
- Cryptography: You possess a strong foundation in applied cryptography, including symmetric/asymmetric encryption, hashing algorithms, digital signatures, key exchange protocols, and common cryptographic libraries.
- Security Architecture and Implementation: You can contribute to the design and implementation of secure systems, with a focus on security best practices and industry standards. Golang, C++, Python.
- Hardware Security Modules (HSMs): You have experience with the configuration and use of HSMs for secure key generation, storage, and management, and understand their role in protecting sensitive cryptographic operations.
- Authentication and Authorization: You understand and can implement various authentication and authorization mechanisms, including multi-factor authentication, OAuth 2.0, and role-based access control (RBAC).
- Threat Modeling: You can identify and assess potential threats to systems and applications, and effectively prioritize mitigation strategies.
- You have developed “computer science fundamentals”, i.e. concurrency, algorithms, and data structures (Formal CS degree NOT required).
- You genuinely care about code quality and test infrastructure.
- You prioritize security, end-user experience, and business value over “cool tech.”
- You self-describe as some combination of the following: creative, humble, ambitious, detail-oriented, hardworking, trustworthy, eager to learn, methodical, action-oriented, and tenacious.
Although not a requirement, bonus points if:
- In your mind the word “crypto” stands for cryptography, not cryptocurrency.
- You read blockchain protocol white papers for fun, and stay up to date with the proliferation of cryptoasset innovations.
- You were emotionally moved by the soundtrack to Hamilton, which chronicles the founding of a new financial system. :)