Cryptographer / 8 months ago

4th floor No 128, Seethakathi Business Centre, 689, Anna Salai, Thousand Lights East, Thousand Lights, Chennai, Tamil Nadu

Vacancy: 2
Salary: 30000
End date: 29/06/2023

Job Description:

As a cryptographer, you’ll help develop complex security systems using ciphers and algorithms to encrypt sensitive data and protect it from hackers, misuse, and cybercrime. This protected information can include financial, personal, business, or military data. Cryptographers use many different private key or secret key ciphers to help with encryption. They can use RSA public keys, digital signatures, and other encryption techniques to help ensure their work is secure.

Your typical duties will be many and vary depending on what type of organization you work for.  Most center on protecting data from being intercepted, decrypted, copied, altered, or deleted by unauthorized actors. Thus, you’ll need a solid understanding of cryptographic security systems and their related algorithms. You’ll also develop and apply various statistical and mathematical models to help find and thwart potential systems threats.


  • *A knowledge of IT security hardware, software, and solutions.
  • *Fluency in source code programming languages such as C#, C++, 
  • *Experience within IT support and using computer operating systems like UNIX, Linux, and MS Windows.
  • *The ability to create source code.


  • Identifying and securing weaknesses in existing cryptography systems.
  • Testing cryptology theories in practice per your organization’s needs.
  • Enhancing data security through the implementation of more secure and encrypted solutions.
  • Using public key cryptography with RSA or other cipher types.
  • Utilizing secret key, private key, and public key cryptography to aid in encryption goals.
  • Developing and managing your organization’s encryption technology, including its code, software, and third-party product adoption.
  • Prototyping new security solutions with advanced programming encryption techniques and practices.
  • Training other staff that handles encryption data and helping them develop safe and secure systems.
  • Working to decrypt information if needed to find vulnerabilities that hackers could find.