Deep understanding of modern cryptography: Proficiency in symmetric and asymmetric encryption, hashing algorithms, key management, and cryptographic protocols. Blockchain protocols experience is a plus.
Secure coding expertise: Demonstrated ability to write secure, efficient, and well-documented code in Go and Python, with a focus on cryptographic implementations.
Systems thinking: Ability to analyze complex systems, identify potential vulnerabilities, and design robust security solutions within a distributed architecture. Experience with Hardware Security Modules is a plus.
Strong problem-solving skills: Capacity to troubleshoot cryptographic issues, analyze security threats, and develop effective mitigation strategies.
Excellent communication and collaboration: Ability to clearly explain complex cryptographic concepts to both technical and non-technical audiences.
Technical Skills
Develop and implement high-quality, secure code for cryptographic controls throughout our infrastructure.
Review code throughout the technology stack and help engineering teams resolve issues related to security guardrails.
Foster an efficient testing culture while reducing technical debt and unnecessary processes.
Complexity and Impact of Work
Build robust, resilient components that are easily integrated by other teams to ensure asset and data security.
Develop and maintain threat models for cryptosystem guarantees, both internal and external. Monitor technical debt and proactively identify areas for improvement.
Lead or substantially contribute to medium and large Security Team initiatives with minimal oversight. Coordinate team members across engineering boundaries and drive projects from inception to completion.
Break complex projects into manageable tasks with accurate time and scope estimates. Present options clearly, analyze tradeoffs thoroughly, and provide well-reasoned priority recommendations.
Deliver work that aligns with departmental objectives, subject to review upon completion. Take ownership of tactical business targets that affect team performance.
Organizational Knowledge
Understand and help implement the company's strategy by participating in planning and defining the Security Team's strategic goals in alignment with Anchorage Digital's overall objectives.
Stay alert to emerging company objectives and industry trends that could affect organizational success.
Consider security holistically across the entire product ecosystem while fostering a security-first company culture.
Balance speed of delivery with careful planning and precision.
Communication and Influence
Share knowledge broadly across the team while preventing single points of failure.
Mentor and guide engineers throughout the Engineering team. Help them understand security's impact on Anchorage Digital's strategic goals, enabling them to develop new technologies and services safely with appropriate oversight.
Collaborate across teams to solve problems, review specifications, and engage in technical discussions. Communicate insights and recommendations clearly to improve processes and address technical debt.
Demonstrate empathy by understanding others' context, needs, motivations, and concerns—adapting communication style to maximize effectiveness.
You may be a fit for this role if you have:
Cryptography: You possess a strong foundation in applied cryptography, including symmetric/asymmetric encryption, hashing algorithms, digital signatures, key exchange protocols, and common cryptographic libraries.
Security Architecture and Implementation: You can contribute to the design and implementation of secure systems, with a focus on security best practices and industry standards. Golang, C++, Python.
Hardware Security Modules (HSMs): You have experience with the configuration and use of HSMs for secure key generation, storage, and management, and understand their role in protecting sensitive cryptographic operations.
Authentication and Authorization: You understand and can implement various authentication and authorization mechanisms, including multi-factor authentication, OAuth 2.0, and role-based access control (RBAC).
Threat Modeling: You can identify and assess potential threats to systems and applications, and effectively prioritize mitigation strategies.
You have developed “computer science fundamentals”, i.e. concurrency, algorithms, and data structures (Formal CS degree NOT required).
You genuinely care about code quality and test infrastructure.
You prioritize security, end-user experience, and business value over “cool tech.”
You self-describe as some combination of the following: creative, humble, ambitious, detail-oriented, hardworking, trustworthy, eager to learn, methodical, action-oriented, and tenacious.
Although not a requirement, bonus points if:
In your mind the word “crypto” stands for cryptography, not cryptocurrency.
You read blockchain protocol white papers for fun, and stay up to date with the proliferation of cryptoasset innovations.
You were emotionally moved by the soundtrack to Hamilton, which chronicles the founding of a new financial system. :)