Deep expertise in enterprise secrets management (secrets lifecycle, HSMs, KMS systems, key hierarchies, encryption-at-rest) with production experience of foundational services at scale
Strong knowledge of machine identity at scale (workload identity, service accounts, mTLS, certificate-based authentication, service-to-service authentication)
Cryptography fundamentals including PKI architecture, X.509 certificate lifecycle, JWTs, signing protocols, encryption standards, and key management patterns
Zero-trust architecture experience with attestation frameworks, attestation-based identity, and least-privilege access patterns across distributed systems
Hands-on coding ability in Python, Go, or similar languages - you write production-quality code, review PRs, debug systems, and lead technical implementations
Understanding of emerging technologies like confidential computing (Intel SGX, AMD SEV-SNP), post-quantum cryptography, or attestation-based authentication
Ability to prototype and validate technical solutions at enterprise scale, challenging existing assumptions with data‑backed alternatives
Proven experience delivering production‑grade POCs in realistic environments and measuring their impact.
Strong technical communication skills, including clear documentation, design proposals, and sharing working code and architectures
Demonstrated technical leadership through hands‑on coding, code reviews, system debugging, and mentoring in cryptography and machine identity.
Strong bias toward action, with ongoing engagement in emerging cryptography/security trends, standards bodies, and industry innovation.
Strong knowledge of machine identity at scale (workload identity, service accounts, mTLS, certificate-based authentication, service-to-service authentication)
Cryptography fundamentals including PKI architecture, X.509 certificate lifecycle, JWTs, signing protocols, encryption standards, and key management patterns
Zero-trust architecture experience with attestation frameworks, attestation-based identity, and least-privilege access patterns across distributed systems
Hands-on coding ability in Python, Go, or similar languages - you write production-quality code, review PRs, debug systems, and lead technical implementations
Understanding of emerging technologies like confidential computing (Intel SGX, AMD SEV-SNP), post-quantum cryptography, or attestation-based authentication
Ability to prototype and validate technical solutions at enterprise scale, challenging existing assumptions with data‑backed alternatives
Proven experience delivering production‑grade POCs in realistic environments and measuring their impact.
Strong technical communication skills, including clear documentation, design proposals, and sharing working code and architectures
Demonstrated technical leadership through hands‑on coding, code reviews, system debugging, and mentoring in cryptography and machine identity.
Strong bias toward action, with ongoing engagement in emerging cryptography/security trends, standards bodies, and industry innovation.