This position is open exclusively for Ukrainian residents within Ukraine (preferably Kyiv or Lviv).
We are looking for a Crypto R&D engineer with Rust experience to join our team and work with us on innovation in cryptography. If you are interested in applied cryptography, modern math and application security, this may be the position for you!
Responsibilities:
- Work as part of cryptographic research and development team.
- Analyse modern applied cryptography structures and algorithms, participate in the analysis of their security, and adapt them for our software needs.
- Participate in the code review of someone else’s cryptographic code (it’s fun!).
- Design, write, test, implement, wrap, debug code that implements certain mathematical and cryptographic constructions for secure distributed computing.
- Write code, write tests, read cryptographic papers, write specs, discuss cryptography, jump on calls, draw diagrams on the board.
Requirements:
- Experience with Rust (or good experience with C++, Scala, Haskell, whatever and readiness to learn Rust).
- Good understanding of cryptography basics (hash functions, signature, symmetric encryption, asymmetric encryption, ECC, DH).
- Good understanding of math and computer science — you will need to work with modern math, and modern algorithms often, and your colleagues will use academic language with you.
Nice to have:
- Good knowledge of applied cryptography, and / or formal education in this area and knowledge of the underlying mathematics.
- A general overview of programming languages will be a big plus: C, Go or Scala would be nice.
- An overall understanding of what information security is, how real-world risks and threats affect the choice of security controls and cryptographic structures, where cryptography needs to be supported by other security controls, what zero trust architecture is, and why AES-CBC is a questionable choice.
- An understanding how modern blockchains work with transaction privacy, what primitives are used, multi-signature protocols, consensus.
- The general understanding of zero knowledge proof protocols (interactive & non-interactive). We work with ZKP a lot, so it will be important to have a general understanding or willingness to learn.
- General understanding of modern applied cryptography: HPKE, key wrapping, CT on Merkle trees, the problem of searching in encrypted data.
Our hiring process:
- Resume review — up to 5 business days.
- Test task — estimated time 1-3 hours.
- Introductory meeting.
- Technical interview.
- Offer discussion.
What’s in it for you?
- A sense of meaning and responsibility for those who seek purpose — we’re building “invisible texture of modern civilization” — bits of infrastructure finance, power grids, healthcare rely on, and we are trusted with very challenging aspects of it.
- Competitive compensation with a flexible bonus scheme.
- Hybrid work model: this position allows for a combination of in-office and remote work as needed.
- UK, EU and USA clients.
- Working at the crossroads of ML security, cryptographic protocol support, hardware protection, reverse-resilient mobile app development, and securing web apps for millions of users.
- Public track record in the open-source aspect of our products.
- Conferences, books, courses — we encourage learning and sharing with the community. Our team members share a lot in talks, workshops, and blog posts.
- Paid vacation — 21 business days per year.
- Paid sick leaves.
We are a data security solutions company, providing custom bespoke solutions to innovative software development teams around the world. Our software is well-known amongst security-aware teams, recommended by OWASP, and popular for easily solving complicated security challenges. Apart from building “off-the-shelf” solutions, we design custom security controls for novel problems.
We work in the B2B space, with customers such as IIoT, AI / ML based systems, mission critical systems, robotics, navigation, power grid operators, payment processors, financial apps, legal companies, million-user customer applications. We cater to young ambitious startups and well-established enterprises, who use our software and solutions as core part of their security arsenal. Our customers are smart, but extremely demanding.