Applied Cryptographer
Trust Protocols, E2Ee, Open Source
Posted on 3/29/2023
INACTIVE
Locations
Remote
Experience Level
Entry
Junior
Mid
Senior
Expert
Requirements
- Applied Cryptography & Cryptographic Protocols
- Writing security sensitive code
- Authentication & Authorization protocols
- Secure Channels, Noise Protocol Framework, Strobe Protocol Framework, TLS and AKEs
- Misuse-resistant Secure API design
- Public Key Infrastructure (PKI), x509 etc
- Elliptic Curve Cryptography
- Individual and collaborative project management leadership
- 10+ years of engineering experience
- Building complex code bases
- Common networking and messaging protocols
- Distributed systems
- Git and GitHub's workflow
- Consuming and contributing to open source codebases
- Multiple programming languages
Responsibilities
- In this role, you will be responsible for the cryptographic design and implementation of Ockam protocols to create end-to-end application layer trust in data
- We believe that, in order to have a realistically manageable vulnerability surface, all modern applications need end-to-end guarantees of data integrity and authenticity
- The only way to build secure and private applications is to remove unnecessary implicit trust in network boundaries, intermediaries and infrastructure
Data security & encryption software
Company Overview
Ockam’s mission is to empower every developer with simple tools to create applications that build trust in data. Ockam has a simple developer experience and powerful primitives that orchestrate end-to-end encryption, key management, authorization policy enforcement, and mutual authentication.
Company Core Values
- High-performance
- Simple
- Transparent
- Time efficient