Position Overview
We are seeking a highly skilled with specialized expertise in Confidential Computing and secure infrastructure deployment to join our post-funding startup. The ideal candidate will be a hands-on technical expert capable of implementing secure encrypted data solutions while bringing client-facing applications to market. This role combines deep technical implementation skills with an understanding of application psychology and user experience.
Key Responsibilities
Technical Implementation (70%)
- Confidential Compute Development:
- Design and implement solutions using Azure DCASv5/ECASv5 instances for confidential workloads
- Develop secure data processing using hardware encryption/decryption and two-party wrap/unwrap methodologies
- Implement and manage cryptographic hardware key solutions
- Secure Azure Infrastructure:
- Develop Infrastructure as Code (IaC) deployments for secure Azure environments
- Convert existing deployments to IaC templates (Terraform/Bicep/ARM)
- Implement and manage Azure SQL with comprehensive encryption strategies
- Develop Function Apps/Azure Functions for secure data automation
- Identity & Security Management:
- Design and implement App Registrations and Managed Identities
- Develop Azure Authentication solutions for multi-client applications (Mobile Thick Client Web)
- Implement API security and authentication protocols
Application Development & Deployment (20%)
- Bring applications to market across multiple client types (Mobile Desktop Web)
- Develop and maintain applications in VS Code environment
- Implement DevOps practices for continuous integration/deployment
- Conduct data automation and encryption implementation
User Experience & Product Insight (10%)
- Collaborate on application psychology elements and user experience design
- Contribute to feature placement based on user emotional response
- Assist with logo development and color scheme considerations
- Provide technical perspective on marketing and application studies
Required Technical Expertise
Must-Have:
- 5 years Azure development experience with proven confidential computing implementations
- Hands-on experience with DCASv5/ECASv5 instances and confidential computing scenarios
- Expertise in IaC development conversions and deployments
- Proven experience implementing hardware encryption and cryptographic key management
- Experience bringing multiple application types to market (Mobile Thick Client Web)
- Strong background in Azure SQL Function Apps and API development
- Proficiency with Azure Authentication Managed Identities and App Registrations
- DevOps implementation experience
Preferred:
- Experience with two-party cryptographic control methodologies
- Background in data automation with encryption at rest and in transit
- Understanding of application psychology and user experience principles
- Startup experience in post-funding environments
Soft Skills & Additional Qualifiers
- Execution-focused: Doer mentality with less emphasis on big-picture strategy
- Hands-on approach: Willing to work across the entire development stack
- Product-aware: Understanding of how technical implementation affects user perception
- Adaptable: Comfortable in a fast-paced post-funding startup environment
Position Overview We are seeking a highly skilled with specialized expertise in Confidential Computing and secure infrastructure deployment to join our post-funding startup. The ideal candidate will be a hands-on technical expert capable of implementing secure encrypted data solutions while bringing...
Position Overview
We are seeking a highly skilled with specialized expertise in Confidential Computing and secure infrastructure deployment to join our post-funding startup. The ideal candidate will be a hands-on technical expert capable of implementing secure encrypted data solutions while bringing client-facing applications to market. This role combines deep technical implementation skills with an understanding of application psychology and user experience.
Key Responsibilities
Technical Implementation (70%)
- Confidential Compute Development:
- Design and implement solutions using Azure DCASv5/ECASv5 instances for confidential workloads
- Develop secure data processing using hardware encryption/decryption and two-party wrap/unwrap methodologies
- Implement and manage cryptographic hardware key solutions
- Secure Azure Infrastructure:
- Develop Infrastructure as Code (IaC) deployments for secure Azure environments
- Convert existing deployments to IaC templates (Terraform/Bicep/ARM)
- Implement and manage Azure SQL with comprehensive encryption strategies
- Develop Function Apps/Azure Functions for secure data automation
- Identity & Security Management:
- Design and implement App Registrations and Managed Identities
- Develop Azure Authentication solutions for multi-client applications (Mobile Thick Client Web)
- Implement API security and authentication protocols
Application Development & Deployment (20%)
- Bring applications to market across multiple client types (Mobile Desktop Web)
- Develop and maintain applications in VS Code environment
- Implement DevOps practices for continuous integration/deployment
- Conduct data automation and encryption implementation
User Experience & Product Insight (10%)
- Collaborate on application psychology elements and user experience design
- Contribute to feature placement based on user emotional response
- Assist with logo development and color scheme considerations
- Provide technical perspective on marketing and application studies
Required Technical Expertise
Must-Have:
- 5 years Azure development experience with proven confidential computing implementations
- Hands-on experience with DCASv5/ECASv5 instances and confidential computing scenarios
- Expertise in IaC development conversions and deployments
- Proven experience implementing hardware encryption and cryptographic key management
- Experience bringing multiple application types to market (Mobile Thick Client Web)
- Strong background in Azure SQL Function Apps and API development
- Proficiency with Azure Authentication Managed Identities and App Registrations
- DevOps implementation experience
Preferred:
- Experience with two-party cryptographic control methodologies
- Background in data automation with encryption at rest and in transit
- Understanding of application psychology and user experience principles
- Startup experience in post-funding environments
Soft Skills & Additional Qualifiers
- Execution-focused: Doer mentality with less emphasis on big-picture strategy
- Hands-on approach: Willing to work across the entire development stack
- Product-aware: Understanding of how technical implementation affects user perception
- Adaptable: Comfortable in a fast-paced post-funding startup environment
View more
View less