Member of the Technical Staff, Security Engineering, Cryptography

Job Description




Core Competencies
  • Deep understanding of modern cryptography: Proficiency in symmetric and asymmetric encryption, hashing algorithms, key management, and cryptographic protocols. Blockchain protocols experience is a plus.
  • Secure coding expertise: Demonstrated ability to write secure, efficient, and well-documented code in Go and Python, with a focus on cryptographic implementations.
  • Systems thinking: Ability to analyze complex systems, identify potential vulnerabilities, and design robust security solutions within a distributed architecture. Experience with Hardware Security Modules is a plus.
  • Strong problem-solving skills: Capacity to troubleshoot cryptographic issues, analyze security threats, and develop effective mitigation strategies.
  • Excellent communication and collaboration: Ability to clearly explain complex cryptographic concepts to both technical and non-technical audiences.

  • Technical Skills
  • Develop and implement high-quality, secure code for cryptographic controls throughout our infrastructure.
  • Review code throughout the technology stack and help engineering teams resolve issues related to security guardrails.
  • Foster an efficient testing culture while reducing technical debt and unnecessary processes.

  • Complexity and Impact of Work
  • Build robust, resilient components that are easily integrated by other teams to ensure asset and data security.
  • Develop and maintain threat models for cryptosystem guarantees, both internal and external. Monitor technical debt and proactively identify areas for improvement.
  • Lead or substantially contribute to medium and large Security Team initiatives with minimal oversight. Coordinate team members across engineering boundaries and drive projects from inception to completion.
  • Break complex projects into manageable tasks with accurate time and scope estimates. Present options clearly, analyze tradeoffs thoroughly, and provide well-reasoned priority recommendations.
  • Deliver work that aligns with departmental objectives, subject to review upon completion. Take ownership of tactical business targets that affect team performance.

  • Organizational Knowledge
  • Understand and help implement the company's strategy by participating in planning and defining the Security Team's strategic goals in alignment with Anchorage Digital's overall objectives.
  • Stay alert to emerging company objectives and industry trends that could affect organizational success.
  • Consider security holistically across the entire product ecosystem while fostering a security-first company culture.
  • Balance speed of delivery with careful planning and precision.

  • Communication and Influence
  • Share knowledge broadly across the team while preventing single points of failure.
  • Mentor and guide engineers throughout the Engineering team. Help them understand security's impact on Anchorage Digital's strategic goals, enabling them to develop new technologies and services safely with appropriate oversight.
  • Collaborate across teams to solve problems, review specifications, and engage in technical discussions. Communicate insights and recommendations clearly to improve processes and address technical debt.
  • Demonstrate empathy by understanding others' context, needs, motivations, and concerns—adapting communication style to maximize effectiveness.

  • You may be a fit for this role if you have:
  • Cryptography: You possess a strong foundation in applied cryptography, including symmetric/asymmetric encryption, hashing algorithms, digital signatures, key exchange protocols, and common cryptographic libraries.
  • Security Architecture and Implementation: You can contribute to the design and implementation of secure systems, with a focus on security best practices and industry standards. Golang, C++, Python.
  • Hardware Security Modules (HSMs): You have experience with the configuration and use of HSMs for secure key generation, storage, and management, and understand their role in protecting sensitive cryptographic operations.
  • Authentication and Authorization: You understand and can implement various authentication and authorization mechanisms, including multi-factor authentication, OAuth 2.0, and role-based access control (RBAC).
  • Threat Modeling: You can identify and assess potential threats to systems and applications, and effectively prioritize mitigation strategies.
  • You have developed “computer science fundamentals”, i.e. concurrency, algorithms, and data structures (Formal CS degree NOT required).
  • You genuinely care about code quality and test infrastructure.
  • You prioritize security, end-user experience, and business value over “cool tech.”
  • You self-describe as some combination of the following: creative, humble, ambitious, detail-oriented, hardworking, trustworthy, eager to learn, methodical, action-oriented, and tenacious.

  • Although not a requirement, bonus points if:
  • In your mind the word “crypto” stands for cryptography, not cryptocurrency.
  • You read blockchain protocol white papers for fun, and stay up to date with the proliferation of cryptoasset innovations.
  • You were emotionally moved by the soundtrack to Hamilton, which chronicles the founding of a new financial system. :)