We are actively seeking a highly skilled and specialized Confidential Computing Engineer to pioneer the development of privacy-preserving solutions within our identity systems. The role mandates the creation and management of complex pipelines utilizing advanced cryptographic primitives such as multi-party computation, trusted execution environments, zero-knowledge proofs, and homomorphic encryption.
- Engineer infrastructure founded on confidential pipelines and frameworks, utilizing multi-party computation (MPC), trusted execution environments (TEE), and zero-knowledge proofs (ZKP), while carrying out pertinent optimizations to enhance efficiency.
- Analyze and implement cutting-edge academic research, identifying and exploring opportunities for productization to drive innovation within the industry.
- Construct application-layer software that seamlessly integrates with the aforementioned pipelines, designed to function in a modular and composable manner, thereby ensuring flexibility and scalability.
[Skills & Qualifications]
- Possesses profound expertise in advanced cryptographic systems, including multi-party computation (MPC), trusted execution environments (TEE), zero-knowledge proofs (ZKP), threshold encryption, and fully homomorphic encryption (FHE).
- A minimum of 2-3 years of professional experience utilizing systems programming languages such as C++, Rust, Golang, and others relevant to the field.
- Demonstrates a robust understanding of Transport Layer Security (TLS) protocols, reflecting a comprehensive knowledge of secure communication within computer networks.
- Acquaintance with prevalent privacy development frameworks, such as MP-SPDZ, Rosetta, libsnarks, arkworks-rs, Halo2, Plonky2, and others pertinent to the field.
- Prior professional experience in the implementation of TLS protocols, reflecting an in-depth understanding of secure communication practices.
- Extensive experience in developing applications with trusted enclaves, including, but not limited to, Intel Software Guard Extensions (SGX), ARM TrustZone, and AMD SEV, showcasing specialized skills in secure computing environments.
- Possession of a graduate degree in a field directly relevant to cryptography and systems, underscoring a strong theoretical and practical foundation in these critical areas.