Join the Least Authority team and contribute to our work.
How to Apply
Get in touch and send us any of the following at jobs [at] leastauthority.com:
- Website link
- Past work
- Github link
- Social media profile links (LinkedIn, Twitter, etc.)
- Example work
- Or even just a nice email about yourself
Working with Least Authority
How We Work
We are a remote-first and global organization. You can have options for where and when you work while staying in close, collaborative communication with the team. Our work is conducted in English; speaking German is not a requirement.
What We Do
Following our mission, our work involves areas from security auditing and supporting others to building products and collaborating within the Free and Open Source Software (FOSS) community. We provide consulting services and conduct security audits for software development projects. You can read some of our final reports here.
Another focus of our work is building products aimed at increasing the security of the data and systems, along with enhancing and preserving privacy. We also collaborate with human rights organizations and non-profit foundations to provide secure tools and privacy enhancing technologies for human rights defenders.
In addition, we support projects, programs, and other ventures that focus on increasing awareness of the importance of digital security and privacy in technology.
Learn more about our open source development and other privacy-related efforts for building distributed systems on our blog.
For more information about Least Authority and to meet the team, see About Us.
Security / Cryptography Researcher & Engineer
We’re looking for another Security or Cryptography Researcher & Engineer to join our team. You could be a software engineer, computer scientist, or mathematician who is interested in doing security research and engineering for advanced applied cryptography, especially with distributed systems. This position will work with our Security Consulting team on projects ranging from blockchain protocols to data management to zero-knowledge proofs. It involves analyzing designs, specifications and codebases, along with documenting findings, providing recommendations, and communicating with consulting clients. Research will use the latest security best practices, knowledge of advancements in related fields and previous experience / findings.
The ideal person for this role has interest in some of the following areas:
- Distributed & decentralized technologies
- Applied & advanced cryptography, like Zero-Knowledge Proofs
- Blockchain, cryptocurrency and Web 3.0 systems
- Open source software and development practices
- Security research and knowledge sharing to advance best practices
- Adversarial scenarios, attack vectors and threat modeling
- Privacy Enhancing Tech and secure communications tools
- A deep understanding of least one coding language, with a drive to learn additional ones, such as: Go, Rust, Haskell, Solidity, Michaelson, C++
Learn more about our security consulting work by browsing our published reports.
This position can be project-based, part-time or full-time based on your interests and our needs.