Member of Technical Staff, Security Engineering
Anchorage

Core Competencies:
-
Deep understanding of modern cryptography: Proficiency in symmetric and asymmetric encryption, hashing algorithms, key management, and cryptographic protocols. Blockchain protocols experience is a plus.
-
Secure coding expertise: Demonstrated ability to write secure, efficient, and well-documented code in Go and Python, with a focus on cryptographic implementations.
-
Systems thinking: Ability to analyze complex systems, identify potential vulnerabilities, and design robust security solutions within a distributed architecture. Experience with Hardware Security Modules is a plus.
-
Strong problem-solving skills: Capacity to troubleshoot cryptographic issues, analyze security threats, and develop effective mitigation strategies.
-
Excellent communication and collaboration: Ability to clearly explain complex cryptographic concepts to both technical and non-technical audiences.
Technical Skills:
-
Develop and implement high-quality, secure code for cryptographic controls throughout our infrastructure.
-
Review code throughout the technology stack and help engineering teams resolve issues related to security guardrails.
-
Foster an efficient testing culture while reducing technical debt and unnecessary processes.
Complexity and Impact of Work:
-
Build robust, resilient components that are easily integrated by other teams to ensure asset and data security.
-
Develop and maintain threat models for cryptosystem guarantees, both internal and external. Monitor technical debt and proactively identify areas for improvement.
-
Lead or substantially contribute to medium and large Security Team initiatives with minimal oversight. Coordinate team members across engineering boundaries and drive projects from inception to completion.
-
Break complex projects into manageable tasks with accurate time and scope estimates. Present options clearly, analyze tradeoffs thoroughly, and provide well-reasoned priority recommendations.
-
Deliver work that aligns with departmental objectives, subject to review upon completion. Take ownership of tactical business targets that affect team performance.
Organizational Knowledge:
-
Understand and help implement the company's strategy by participating in planning and defining the Security Team's strategic goals in alignment with Anchorage Digital's overall objectives.
-
Stay alert to emerging company objectives and industry trends that could affect organizational success.
-
Consider security holistically across the entire product ecosystem while fostering a security-first company culture.
-
Balance speed of delivery with careful planning and precision.
Communication and Influence:
-
Share knowledge broadly across the team while preventing single points of failure.
-
Mentor and guide engineers throughout the Engineering team. Help them understand security's impact on Anchorage Digital's strategic goals, enabling them to develop new technologies and services safely with appropriate oversight.
-
Collaborate across teams to solve problems, review specifications, and engage in technical discussions. Communicate insights and recommendations clearly to improve processes and address technical debt.
-
Demonstrate empathy by understanding others' context, needs, motivations, and concerns—adapting communication style to maximize effectiveness.
You may be a fit for this role if you have:
-
Cryptography: You possess a strong foundation in applied cryptography, including symmetric/asymmetric encryption, hashing algorithms, digital signatures, key exchange protocols, and common cryptographic libraries.
-
Security Architecture and Implementation: You can contribute to the design and implementation of secure systems, with a focus on security best practices and industry standards. Golang, C++, Python.
-
Hardware Security Modules (HSMs): You have experience with the configuration and use of HSMs for secure key generation, storage, and management, and understand their role in protecting sensitive cryptographic operations.
-
Authentication and Authorization: You understand and can implement various authentication and authorization mechanisms, including multi-factor authentication, OAuth 2.0, and role-based access control (RBAC).
-
Threat Modeling: You can identify and assess potential threats to systems and applications, and effectively prioritize mitigation strategies.
-
You have developed “computer science fundamentals”, i.e. concurrency, algorithms, and data structures (Formal CS degree NOT required).
-
You genuinely care about code quality and test infrastructure.
-
You prioritize security, end-user experience, and business value over “cool tech.”
-
You self-describe as some combination of the following: creative, humble, ambitious, detail-oriented, hardworking, trustworthy, eager to learn, methodical, action-oriented, and tenacious.
Although not a requirement, bonus points if:
-
In your mind the word “crypto” stands for cryptography, not cryptocurrency.
-
You read blockchain protocol white papers for fun, and stay up to date with the proliferation of cryptoasset innovations.
-
You were emotionally moved by the soundtrack to Hamilton, which chronicles the founding of a new financial system. :)