Join us at
Secufest Booth for innovative security solutions
read more
Built for Speed. Backed by Experts. CleanStart Wins 2025 Cybersecurity Excellence Award
Book a Demo
Book a Demo

Sr Manager Core Tech - Cryptography

Location : 
Ahmedabad
Department : 
Engineering
Experience : 
8+ years
By contacting us you agree with the storage and handling of your data by this website.

About Triam Security:

Triam Security is revolutionizing software supply chain security through our
advanced vulnerability database platform and CleanStart product line. We provide
hardened, vulnerability-free container images with built-in security, compliance,
and performance benefits. Our mission is to transform container security by
eliminating pre-existing vulnerabilities and providing full visibility and control over
the software supply chain.

Role Overview:

As Senior Manager of Core Technology for Cryptography, you will lead our strategic
efforts in implementing FIPS-compliant cryptographic solutions across our product
ecosystem. This leadership role combines deep technical expertise in cryptography
with team management responsibilities to ensure our container security platform
meets the highest standards of cryptographic integrity and regulatory compliance.
You will oversee a specialized team of cryptography engineers while collaborating
with cross-functional leadership to deliver innovative security solutions that
differentiate Triam in the marketplace.

Key Responsibilities:

Team Leadership and Management

  • Build, lead, and develop a high-performing team of cryptography engineers
    with diverse skill sets
  • Establish clear goals, expectations, and performance metrics aligned with
    company objectives
  • Conduct regular 1:1 meetings, performance reviews, and career
    development discussions
  • Create professional growth paths and mentorship opportunities for team
    members
  • Foster a culture of security excellence, innovation, and continuous
    improvement
  • Manage resource allocation, capacity planning, and technical debt
    prioritization
    Strategic Direction and Planning
  • Develop comprehensive roadmaps for cryptographic implementations
    across product lines
  • Align cryptography strategy with overall business and product objectives
  • Collaborate with Product Management to define security feature
    requirements
  • Establish technical standards and best practices for cryptographic
    implementations
  • Drive cryptographic architecture decisions with a focus on long-term
    scalability
  • Evaluate emerging cryptographic standards and technologies for potential
    adoption
    Technical Oversight and Implementation
  • Oversee the design and implementation of cryptographic signing and
    verification systems
  • Lead FIPS 140-2/140-3 validation efforts and compliance processes
  • Ensure proper key management practices and systems across all products
  • Implement secure attestation mechanisms for container images and
    artifacts
  • Establish cryptographic boundary definitions and security controls
  • Design cryptographic modules for optimal security and performance
  • Ensure algorithm selection and implementation meets regulatory
    requirements
    Cross-Functional Collaboration
  • Partner with Build, QA, and Infrastructure teams on security integration
  • Collaborate with Compliance to meet certification and regulatory
    requirements
  • Work with Product and UX teams on usability of security features
  • Coordinate with Customer Success on cryptographic feature deployment
  • Represent cryptography expertise in leadership forums and decision-making
  • Communicate security capabilities and roadmaps to internal stakeholders
    External Engagement and Compliance
  • Manage relationships with regulatory bodies and certification authorities
  • Oversee interactions with NIST and FIPS validation laboratories
  • Represent Triam at industry conferences and security forums
  • Stay current with evolving regulations and compliance requirements
  • Engage with security communities and standards organizations
  • Build relationships with key security partners and technology providers
    Innovation and Research
  • Drive innovation in container security through cryptographic technologies
  • Identify opportunities for cryptographic improvements in supply chain
    integrity
  • Evaluate emerging cryptographic approaches for potential adoption
  • Balance security requirements with performance and usability
    considerations
  • Sponsor research initiatives in applied cryptography
  • Foster a culture of security innovation within the organization
    Documentation and Knowledge Management
  • Ensure comprehensive documentation of cryptographic systems and
    processes
  • Oversee the creation of security whitepapers and technical specifications
  • Develop internal training programs on cryptographic principles
  • Establish knowledge sharing practices across engineering teams
  • Create guidance for secure implementation of cryptographic features
  • Ensure proper documentation for compliance and certification processes

Required Qualifications:

  • 8+ years of experience in cryptography, security engineering, or related fields
  • 3+ years of leading teams in security engineering or cryptography
  • Deep expertise in FIPS 140-2/140-3 requirements and validation processes
  • Practical experience with the complete FIPS validation lifecycle
  • Strong understanding of cryptographic protocols, algorithms, and
    implementations
  • Experience with hardware security modules (HSMs) and key management
    systems
  • Knowledge of digital signature schemes and certificate management
  • Understanding of container security and software supply chain integrity
  • Experience with secure boot and trusted execution environments
  • Proficiency in C programming language
  • Strong knowledge of Linux operating systems and security mechanisms
  • Excellent verbal and written communication skills
  • Strong leadership abilities with experience managing technical teams
  • Advanced degree in Computer Science, Mathematics, Cryptography, or
  • related field preferred

Preferred Qualifications:

  • Experience leading FIPS validation projects to successful completion
  • Background in implementing cryptographic libraries or security SDKs
  • Knowledge of SLSA framework and supply chain security best practices
  • Experience with Trusted Platform Modules (TPMs) and secure elements
  • Familiarity with post-quantum cryptography and emerging standards
  • Understanding of side-channel attack prevention and secure
    implementation
  • Experience with secure multi-party computation or threshold cryptography
  • Background in designing cryptographic attestation systems
  • Knowledge of container signing and verification mechanisms
  • Experience with cloud HSM services and key management systems
  • Experience with compilation of Linux packages and security modules
  • Linux kernel programming expertise, particularly in security subsystems
  • Publications or patents in the field of applied cryptography
  • Active participation in security standards organizations

Success Criteria:

  • Within 30 days: Develop a comprehensive understanding of Triam's
    cryptographic systems, challenges, and team capabilities
  • Within 90 days: Establish a detailed cryptographic roadmap with clear
    priorities, timelines, and resource requirements
  • Within 6 months: Demonstrate measurable progress on FIPS compliance
    initiatives and key cryptographic implementations
  • Within 12 months: Successfully complete initial FIPS validation processes
    and establish Triam as a leader in cryptographic container security

This position offers an exceptional opportunity to lead cutting-edge work in applying
cryptography to solve critical container security challenges, while building and
mentoring a team of security specialists in a fast-growing organization committed
to excellence in software supply chain security.

Career Detail Page Form
Apply Now
Job Details
Job Location
Ahmedabad
Experience
8+ years
Copyright 2025 © Triam Security
|
Privacy policy
|
Terms & Conditions
Download Data Sheet Form
crossmenuchevron-down linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram