Role Overview
We are hiring a hands-on Software Engineer to build high-performance, security-critical software primarily in Rust, secondarily in Go/NodeJS/Python. This role is strongly development-focused: you will design, implement, test, and harden core components that operate close to the network stack and security boundary, with an emphasis on correctness, performance, and production readiness.
You’ll work with engineers across security, platform, and infrastructure, translating security and protocol requirements into robust code, and ensuring the software meets enterprise-grade standards for reliability, observability, and maintainability.
Key Responsibilities
- Build and maintain production-grade Rust services/libraries that operate in security-sensitive, network-facing contexts.
- Implement and integrate cryptographic mechanisms using established libraries, following secure engineering practices.
- Develop software components interacting with transport/security protocols (e.g., TLS concepts, session lifecycle, certificates, key handling) and networking primitives (e.g., TCP/UDP, sockets, streaming I/O).
- Optimize performance for throughput/latency, including profiling, memory efficiency, concurrency control, and backpressure handling.
- Design for operability: metrics, structured logging, tracing, alert-friendly error handling, and safe failure modes.
- Write comprehensive tests: unit, integration, fuzz/property tests, and negative security tests.
- Contribute to secure SDLC: threat modelling participation, code reviews, vulnerability remediation, dependency hygiene, and secure defaults.
- Polyglot Problem Solving: Move fluidly across the stack. While Rust is the core, you will be expected to interface with, debug, or contribute to services written in other languages (e.g., Go, C++, or Python) as needed.
Required Qualifications
- Interest in AI and emerging technologies, and problem-solving mindset
- Bonus: exposure to databases, networking, or AI tools
- Strong experience developing in Rust (production systems, not just hobby projects).
- Solid fundamentals in network programming (socket I/O, connection lifecycle, timeouts, retries, buffering, framing).
- Practical understanding of applied security:
- secure coding practices
- key material handling basics
- authentication / authorization concepts
- common attack patterns (downgrade, replay, MITM, injection, resource exhaustion)
- Comfortable working in Linux environments (debugging, performance tooling, networking diagnostics).
- Ability to deliver clean, maintainable code with strong engineering discipline (tests, CI/CD familiarity, documentation).
Preferred / Bonus Experience
- Experience integrating or contributing to cryptography / TLS libraries (Rust ecosystem a plus).
- Familiarity with post-quantum cryptography (PQC) concepts and migration approaches (e.g., hybrid strategies, KEMs/signatures at a conceptual level).
- Experience with high-performance networking patterns (async runtimes, event loops, zero-copy considerations).
- Experience with secure networking products (secure proxies, gateways, VPN/tunnelling, L4/L7 security controls, DLP, inspection pipelines) — without requiring domain disclosure.
- Exposure to Kubernetes / containerized deployment and production operations (health checks, rollout safety, SLOs).
- Knowledge of secure development practices: SAST/DAST, dependency scanning, SBOM, reproducible builds.
What Success Looks Like (First 6–12 Months)
- Deliver core Rust components that meet performance and security requirements.
- Establish strong testing and verification practices (including fuzzing where appropriate).
- Improve reliability and operability with meaningful metrics, logs, and traces.
- Raise engineering quality through code reviews, secure-by-default patterns, and robust interfaces.
- While Rust is our choice for core, "close-to-the-metal" components, we need an engineer with a deep backend generalist background.
- Strong grasp of distributed systems, database design, caching strategies, and microservices architecture.
Candidate Profile
You’re a builder who enjoys working close to the metal, can reason clearly about protocol and security requirements, and takes pride in writing correct, defensive, high-performance Rust code that holds up in production.