Anchorage Digital - Member of Technical Staff, Security Engineering
Upload My Resume
Drop here or click to browse · Tap to choose · PDF, DOCX, DOC, RTF, TXT
Requirements
• Develop and implement high-quality, secure code for cryptographic controls throughout our infrastructure. • Review code throughout the technology stack and help engineering teams resolve issues related to security guardrails. • Foster an efficient testing culture while reducing technical debt and unnecessary processes. • Complexity and Impact of Work: • Build robust, resilient components that are easily integrated by other teams to ensure asset and data security. • Develop and maintain threat models for cryptosystem guarantees, both internal and external. Monitor technical debt and proactively identify areas for improvement. • Lead or substantially contribute to medium and large Security Team initiatives with minimal oversight. Coordinate team members across engineering boundaries and drive projects from inception to completion. • Break complex projects into manageable tasks with accurate time and scope estimates. Present options clearly, analyze tradeoffs thoroughly, and provide well-reasoned priority recommendations. • Deliver work that aligns with departmental objectives, subject to review upon completion. Take ownership of tactical business targets that affect team performance. • Organizational Knowledge: • Understand and help implement the company’s strategy by participating in planning and defining the Security Team’s strategic goals in alignment with Anchorage Digital’s overall objectives. • Stay alert to emerging company objectives and industry trends that could affect organizational success. • Consider security holistically across the entire product ecosystem while fostering a security-first company culture. • Balance speed of delivery with careful planning and precision. • Communication and Influence: • Mentor and guide engineers throughout the Engineering team. Help them understand security’s impact on Anchorage Digital’s strategic goals, enabling them to develop new technologies and services safely with appropriate oversight. • Collaborate across teams to solve problems, review specifications, and engage in technical discussions. Communicate insights and recommendations clearly to improve processes and address technical debt. • Demonstrate empathy by understanding others’ context, needs, motivations, and concerns—adapting communication style to maximize effectiveness. • You may be a fit for this role if you have: • Cryptography: You possess a strong foundation in applied cryptography, including symmetric/asymmetric encryption, hashing algorithms, digital signatures, key exchange protocols, and common cryptographic libraries. • Cryptography: • Security Architecture and Implementation: You can contribute to the design and implementation of secure systems, with a focus on security best practices and industry standards. • Security Architecture and Implementation: • Hardware Security Modules (HSMs): You have experience with the configuration and use of HSMs for secure key generation, storage, and management, and understand their role in protecting sensitive cryptographic operations. • Hardware Security Modules (HSMs): • Authentication and Authorization: You understand and can implement various authentication and authorization mechanisms, including multi-factor authentication, OAuth 2.0, and role-based access control (RBAC). • Authentication and Authorization: • Threat Modeling: You can identify and assess potential threats to systems and applications, and effectively prioritize mitigation strategies. • Threat Modeling: • You have developed “computer science fundamentals”, i.e. concurrency, algorithms, and data structures • You genuinely care about code quality and test infrastructure. • You prioritize security, end-user experience, and business value over “cool tech.” • You self-describe as some combination of the following: creative, humble, ambitious, detail-oriented, hardworking, trustworthy, eager to learn, methodical, action-oriented, and tenacious. • Although not a requirement, bonus points if: • In your mind the word “crypto” stands for cryptography, not cryptocurrency. • You read blockchain protocol white papers for fun, and stay up to date with the proliferation of cryptoasset innovations. • You were emotionally moved by the soundtrack to Hamilton, which chronicles the founding of a new financial system. :)
Responsibilities
• Develop and implement security measures to protect digital assets within the company's infrastructure. • Conduct regular risk assessments of systems and processes related to privacy concerns in line with industry standards. • Collaborate closely with other technical staff members, including engineers and IT professionals, on projects that require a strong understanding of security principles. • Stay informed about the latest trends and threats within cybersecurity by attending workshops, conferences, or webinars to continuously improve skills relevant to privacy protection in engineering roles.
Similar Jobs
No credit card. Takes 10 seconds.