System Architect at Anjuna
About the role
Anjuna is an enterprise security startup in the space of Confidential Computing. We move the security perimeter to be around the application instead of the host itself, enabling our users to deploy very sensitive applications and data in untrusted environments. We are leveraging secure enclave technologies to protect applications even from users who obtained administrative or physical access to the host.
We are looking for a hands-on system architect to oversee the overall architecture of our solution and provide guidance to the engineering team. The candidate must have a strong technical background, knowledge of operating systems and Linux.
This role's responsibilities include solution analysis and design, high-level and detailed design of system components, guiding engineers through the design of the features they are responsible for. We are looking for someone with good leadership and communication skills. This role would work closely with the Head of Engineering, engineering leads, product managers, and the CTO on all aspects of system architecture, roadmap planning, etc.
Required experience and knowledge:
- Operating Systems
- Design patterns
- Systems Security
- Basic knowledge of cryptography - advantage
- Solid experience with design documentation
- Understanding of QA processes
Why work at Anjuna?
- We care about our employees, customers, and partners
- Check out our website to learn more about our amazing technology
- We strive for excellence and put our customers first
- You'll be working with a strong team with a lot of industry experience
- It's an opportunity to use state-of-the-art CRM and campaign automation tools
- Benefits: great healthcare benefits and a 401k program
We look forward to hearing from you!
Why you should join Anjuna
Anjuna creates a software perimeter around applications that provides hardware-grade security for the applications, completely removing the need to secure or patch the host, VM, or container. This is ideal for running applications in environments where there is no control over the host, like the public cloud, or when running alongside untrusted applications. We use novel technologies such as Intel SGX to make it happen.