The successful candidate will be building and implementing cryptographic systems based on provably secure protocols in critical missions deployed to billion devices at scale. You will design cryptographic solutions, while ensuring feasibility and scalability. This will require making tradeoffs between memory, power, and latency.