Full-Time

Executive Assistant

Posted on 2/1/2025

Signal

Signal

51-200 employees

Privacy-focused messaging platform with encryption

Compensation Overview

$120k - $140k/yr

+ 20% Base Salary Bonus Potential

Junior, Mid

Remote in USA

Candidates must maintain work hours in the Eastern Time zone.

Category
Executive Support
Administrative & Executive Assistance
Administrative Support
Required Skills
Data Analysis
Requirements
  • Strong organizational and multitasking skills
  • Exceptional ability to execute reliably, solve problems proactively, pay close attention to details, and prioritize time and tasks
  • Ability to learn and adapt to new software and technologies
  • Proficient in Microsoft Office Suite and Google Suite applications
  • Excellent English verbal, written, and interpersonal communication skills
  • Maintain high discretion and confidentiality regarding personal, financial, and sensitive information
  • Ability to work independently and proactively in a fast-paced, dynamic, and remote work environment
  • Resilience to navigate competing priorities and constant change
Responsibilities
  • Act as a liaison between the executive, other employees, and external partners and collaborators to help build and maintain strong relationships.
  • Assist the President in problem-solving, decision-making, and prioritizing tasks.
  • Attend meetings, take notes, and distill down the key takeaways, action items, and follow-ups for the President.
  • Handle incoming and outgoing communication on behalf of the President, including placing phone calls, drafting emails, managing the email inbox, and other inquiries.
  • Conduct research, gather and analyze data, prepare reports or presentations, and provide recommendations or alternative solutions to help inform decision-making and strategic planning.
  • Manage the President's professional and personal calendar, including scheduling, rescheduling, and prioritizing appointments and meetings.
  • Provide general administrative support to the President, such as managing expenses, minor accounting duties, processing invoices, and handling any other administrative tasks as required.
  • Scan, organize, and maintain electronic documents, files, and records, ensuring information is accurate, up-to-date, and easily accessible.
  • Assist with planning and organizing professional events, including interfacing with agencies, coordinating guest lists, managing invitations, securing venues, arranging decorations, and overseeing logistics.
  • Plan, manage, and iterate very complex travel schedules for the team.
  • Ensuring all necessary travel documents are in order and necessary arrangements are made.
  • Enter and manage tasks using a variety of digital tools like G-Drive, and browser-based calendars, on behalf of the President.
  • Maintain confidentiality and discretion in handling professional and personal sensitive information, documents, and discussions within and outside the organization.

Signal provides a messaging platform that prioritizes user privacy through end-to-end encryption. This means that messages and calls are secure and can only be accessed by the intended recipients, ensuring that even Signal cannot read users' messages. The platform includes features like voice and video calls, group chats, and encrypted stickers, all available without long-distance charges. Unlike many tech companies, Signal operates as a nonprofit, which allows it to focus solely on user privacy without the influence of advertising or data tracking. Its funding comes from grants and donations, making it independent and dedicated to providing a secure communication service.

Company Size

51-200

Company Stage

N/A

Total Funding

$50M

Headquarters

Indianapolis, Indiana

Founded

2013

Simplify Jobs

Simplify's Take

What believers are saying

  • Rising cyber threats increase demand for Signal's secure communication tools.
  • NIST's post-quantum standards offer Signal a chance to enhance encryption technologies.
  • Growing interest in post-quantum encryption aligns with Signal's future-proofing goals.

What critics are saying

  • Signal's removal from China's App Store limits growth in the Chinese market.
  • Post-quantum encryption standards may require costly updates to Signal's protocols.
  • Meta's Threads popularity poses a competitive threat to Signal's user base.

What makes Signal unique

  • Signal offers end-to-end encryption by default, ensuring user privacy and security.
  • Signal operates as a nonprofit, relying on donations rather than ads for funding.
  • Signal's independence from major tech companies enhances its commitment to user privacy.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Remote work flexibility

Healthcare, vision, and dental

401(k)

Growth & Insights and Company News

Headcount

6 month growth

-1%

1 year growth

-4%

2 year growth

0%
Today's General Counsel
Mar 26th, 2025
Russian State Threat Actors Targeting Signal Messenger Accounts

To combat these threats, Signal Messenger has introduced security updates to counteract malicious device-linking attempts.

Decrypt
Dec 10th, 2024
Us ‘Flips’ To Support Encryption Following China’S ‘Salt Typhoon’ Cyberattack

Decrypt’s Art, Fashion, and Entertainment Hub. Discover SCENEThe ‘Salt Typhoon’ cyberattacks by Chinese hackers on governments and businesses have been described as a “watershed moment” by digital privacy advocates, after U.S. officials recommended the use of end-to-end encryption in their aftermath.After U.S. Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) officials urged Americans to use encrypted messaging apps in the wake of the cyberattack, Zooko Wilcox-O'Hearn, creator of privacy coin Zcash, tweeted, "So apparently U.S. national security orgs are advising Americans to use end-to-end-encryption because the Chinese Communist Party is reading your unencrypted messages.” He added that, “Hopefully this is the watershed moment when the U.S. law-enforcement and natsec culture flips to pro-encryption."So apparently U.S

PYMNTS
Aug 15th, 2024
Nist’S Post-Quantum Cybersecurity Standards Ready For Enterprise Use

As information has become electronic, the encryption of that information has become imperative. And with the news Tuesday (Aug. 13) that, after an eight-year-long process, the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has finalized its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer, businesses dealing with an emergent and sophisticated breed of cybercriminals can breathe a small sigh of relief. While observers may be wondering what the big deal is about post-quantum (PQ) cryptography — particularly when nobody has actually seen or used a real quantum computer, and their commercial viability remains perpetually 10 years away — the big deal, so to speak, is actually a simple one: post-quantum security standards are by definition safer, more resilient, and more flexible than existing classical measures

PYMNTS
Jul 8th, 2024
Microsoft Institutes Iphones-Only Rule For Workers In China

Microsoft is requiring staff in China to use iPhones for work starting in September.The measure essentially bans Android-powered devices for these workers and is part of Microsoft’s Secure Future Initiative, designed to make sure all employees use the Microsoft Authenticator password manager and Identity Pass app, Bloomberg reported Monday (July 8).Microsoft will require its hundreds of employees based in China to use only Apple devices to verify their identities when logging in to work computers or phones, the report said, citing an internal memo.The move underscores the increasing differences between mobile ecosystems in China and other countries, per the report. For example, Apple’s iOS store is available in China, but Google’s isn’t, leaving Chinese companies like Huawei to operate their own platforms.Microsoft decided to block access from those devices to its corporate resources as they lack Google’s mobile services in the country, according to the report. Staff members using Android devices will be provided with an iPhone 15.The move could call renewed attention to the iPhone’s standing in China, the report said. Since last year, an increasing number of Chinese government agencies and state-owned companies have required staff to stop using iPhones at work, citing security worries.Those same concerns led the Cyberspace Administration of China in April to order Apple to remove WhatsApp, Threads, Telegram and Signal from its App Store in China.Apple’s place in the Chinese smartphone market has risen and fallen over the past year. The most recent reporting showed that the company ended May with 11% of the Chinese smartphone market, even as iPhone sales rose 0.9% year over year,“While Apple bulls may note the data is backwards looking and is not likely indicative of Apple’s AI smartphone opportunity next year, we note that iPhone share loss to Huawei and other Chinese OEMs acts as a material governor on iPhone unit growth,” UBS analyst David Vogt wrote this month.Meanwhile, last month saw a report that companies such as Google and OpenAI had begun conducting more vetting of staff and prospective hires due to concerns about Chinese espionage

PYMNTS
May 24th, 2024
Making Sense Of Post-Quantum Opportunities For Payments And Commerce

The thing about far-away technological innovations is that they get closer to reality each day. And with the news Tuesday (May 21) that Zoom is making post-quantum end-to-end encryption (E2EE) globally available across its Zoom Workplace platform, specifically Zoom Meetings with Zoom Phone and Zoom Rooms coming soon, preparing for the operational and cybersecurity realities of the upcoming quantum internet is top of mind for forward-thinking organizations. That’s because quantum computers, once fully realized, could break widely used encryption algorithms such as RSA and ECC (Elliptic Curve Cryptography), which underpin the security of online transactions and communications. This looming threat necessitates the development and adoption of post-quantum encryption techniques

INACTIVE