You think about how cryptographic primitives can be used to secure identity, access, communication, and storage of data. Have opinions on how trust, authorization, and credential systems should evolve with newer advances in computing and algorithms. Understand the principles that go into designing robust and adaptive cryptographic systems. Are able to identify potential flaws in a given cryptographic scheme, protocol, or implementation. What you’ll do You will work on the cryptographic foundations that let people, agents, and systems establish identity, delegate authority, and protect sensitive data. The job is to turn messy security requirements into mechanisms that are precise, durable, and usable in practice. You might design identity and access systems, build credentialing and key management infrastructure, develop secure and privacy-preserving protocols, or evaluate existing systems against realistic attack models. The aim is not just elegant cryptography, but systems that remain trustworthy under real-world use.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Education Level
No Education Listed