- *Job Title: Security & Cryptography Engineer**
- *Location: San Francisco, CA (Hybrid)**
- *Employment: Contract**
- *Key Responsibilities**
- Implement MPC-CMP key management with 1-round signing, split shares, and auto key refresh
- Integrate Intel SGX enclaves for hardware-isolated cryptographic operations
- Design PKI/MSP infrastructure for identity management across network participants
- Implement mTLS for all communication with automated certificate rotation
- Build real-time compliance screening integrating Chainalysis and Elliptic
- Implement Travel Rule protocol for cross-border reporting
- Design ZK-proof generation for periodic Merkle root anchoring to Ethereum
- Architect Private Data Collections and channel-level data segregation
- Lead penetration testing, vulnerability assessments, and red team exercises
- Maintain SOC 2 Type 2, ISO 27001, PCI DSS, C4 CCSS QSP Level 3 compliance
- Operate 24/7 SOC with automated threat detection and incident response
- Design key ceremony procedures and multi-sig governance for root keys
- *Required Qualifications**
- 7+ years security, 3+ years cryptographic systems or key management
- Deep MPC knowledge: threshold signing (MPC-CMP, FROST)
- HSM, Intel SGX/TDX, TEE experience
- PKI: X.509, certificate authorities, CRL/OCSP, mTLS
- KYC/AML implementation with Chainalysis, Elliptic, or similar
- ZK-proof systems (zk-SNARKs, zk-STARKs) practical applications
- Blockchain security: contract auditing, consensus attacks, crypto primitives
- SOC 2, ISO 27001, PCI DSS familiarity
- Go, Rust, or C++ for systems-level security
- BS/MS in CS, Cryptography, or Information Security
- *Technical Skills Required**
- *Category Skills**
- *Cryptography**
: MPC-CMP, ZK-Proofs, Merkle Trees, Threshold Signing
HSMs, Intel SGX, Key Ceremonies, Multi-sig
PKI/X.509, mTLS, MSP, Certificate Rotation
Chainalysis, Elliptic, Travel Rule, KYC/AML
Go, Rust, C++, Python
SOC 2, ISO 27001, PCI DSS, C4 CCSS QSP L3
- *Preferred Qualifications**
- Fireblocks platform and MPC-CMP integration experience
- Published cryptography or ZK-proof research
- CISSP, CISM, or CEH certification
- Financial security regulations (GLBA, Reg SP, FFIEC)
- Open-source cryptographic library contributions
- SOC operations experience