Job Description
Summary
Core Competencies:
- Deep understanding of modern cryptography: Proficiency in symmetric and asymmetric encryption, hashing algorithms, key management, and cryptographic protocols. Blockchain protocols experience is a plus.
 - Secure coding expertise: Demonstrated ability to write secure, efficient, and well-documented code in Go and Python, with a focus on cryptographic implementations.
 - Systems thinking: Ability to analyze complex systems, identify potential vulnerabilities, and design robust security solutions within a distributed architecture. Experience with Hardware Security Modules is a plus.
 - Strong problem-solving skills: Capacity to troubleshoot cryptographic issues, analyze security threats, and develop effective mitigation strategies.
 - Excellent communication and collaboration: Ability to clearly explain complex cryptographic concepts to both technical and non-technical audiences.
 
Technical Skills:
- Develop and implement high-quality, secure code for cryptographic controls throughout our infrastructure.
 - Review code throughout the technology stack and help engineering teams resolve issues related to security guardrails.
 - Foster an efficient testing culture while reducing technical debt and unnecessary processes.
 
Complexity and Impact of Work:
- Build robust, resilient components that are easily integrated by other teams to ensure asset and data security.
 - Develop and maintain threat models for cryptosystem guarantees, both internal and external. Monitor technical debt and proactively identify areas for improvement.
 - Lead or substantially contribute to medium and large Security Team initiatives with minimal oversight. Coordinate team members across engineering boundaries and drive projects from inception to completion.
 - Break complex projects into manageable tasks with accurate time and scope estimates. Present options clearly, analyze tradeoffs thoroughly, and provide well-reasoned priority recommendations.
 - Deliver work that aligns with departmental objectives, subject to review upon completion. Take ownership of tactical business targets that affect team performance.
 
Organizational Knowledge:
- Understand and help implement the company's strategy by participating in planning and defining the Security Team's strategic goals in alignment with Anchorage Digital's overall objectives.
 - Stay alert to emerging company objectives and industry trends that could affect organizational success.
 - Consider security holistically across the entire product ecosystem while fostering a security-first company culture.
 - Balance speed of delivery with careful planning and precision.
 
Communication and Influence:
- Share knowledge broadly across the team while preventing single points of failure.
 - Mentor and guide engineers throughout the Engineering team. Help them understand security's impact on Anchorage Digital's strategic goals, enabling them to develop new technologies and services safely with appropriate oversight.
 - Collaborate across teams to solve problems, review specifications, and engage in technical discussions. Communicate insights and recommendations clearly to improve processes and address technical debt.
 - Demonstrate empathy by understanding others' context, needs, motivations, and concerns—adapting communication style to maximize effectiveness.
 
You may be a fit for this role if you have:
- Cryptography: You possess a strong foundation in applied cryptography, including symmetric/asymmetric encryption, hashing algorithms, digital signatures, key exchange protocols, and common cryptographic libraries.
 - Security Architecture and Implementation: You can contribute to the design and implementation of secure systems, with a focus on security best practices and industry standards. Golang, C++, Python.
 - Hardware Security Modules (HSMs): You have experience with the configuration and use of HSMs for secure key generation, storage, and management, and understand their role in protecting sensitive cryptographic operations.
 - Authentication and Authorization: You understand and can implement various authentication and authorization mechanisms, including multi-factor authentication, OAuth 2.0, and role-based access control (RBAC).
 - Threat Modeling: You can identify and assess potential threats to systems and applications, and effectively prioritize mitigation strategies.
 - You have developed “computer science fundamentals”, i.e. concurrency, algorithms, and data structures (Formal CS degree NOT required).
 - You genuinely care about code quality and test infrastructure.
 - You prioritize security, end-user experience, and business value over “cool tech.”
 - You self-describe as some combination of the following: creative, humble, ambitious, detail-oriented, hardworking, trustworthy, eager to learn, methodical, action-oriented, and tenacious.
 
Although not a requirement, bonus points if:
- In your mind the word “crypto” stands for cryptography, not cryptocurrency.
 - You read blockchain protocol white papers for fun, and stay up to date with the proliferation of cryptoasset innovations.
 - You were emotionally moved by the soundtrack to Hamilton, which chronicles the founding of a new financial system. :)
 
Skills
- C++
 - Communications Skills
 - Cryptocurrency
 - Cryptography
 - Development
 - Python
 - Software Engineering
 - Strategic Thinking
 - Team Collaboration
 

