Lead Security Engineer — Cryptographic Libraries & Tls

JPMorgan Chase JPMorgan Chase · Banking · Palo Alto, CA +1 · Corporate Sector

Lead Security Engineer responsible for building and maintaining a TLS abstraction layer across Java, Python, and Node.js runtimes. This role involves deep expertise in network security protocols, cryptographic libraries, and polyglot software engineering, focusing on secure, performant, and well-tested TLS configurations for enterprise-wide deployment.

What you'd actually do

  1. Design, implement, debug, and extend the TLS abstraction layer, ensuring consistent TLS configuration and behavior across Java (JSSE/Bouncy Castle), Python (ssl/OpenSSL bindings), and Node.js (built-in TLS/OpenSSL) runtimes.
  2. Serve as the team's subject-matter expert on TLS 1.2 and 1.3 handshake mechanics, cipher suite negotiation, certificate validation, key exchange algorithms, and session resumption — and translate that expertise into library design decisions.
  3. Architect clean, well-documented APIs that decouple application-level TLS intent (e.g., minimum protocol version, allowed cipher suites, certificate pinning, mutual TLS) from the platform-specific implementation details of each runtime's TLS stack.
  4. Build and maintain comprehensive test suites — including unit, integration, interoperability, and protocol-conformance tests — that verify correct TLS behavior across all supported runtimes and configurations. Develop test harnesses that exercise edge cases such as certificate chain validation failures, protocol downgrade scenarios, and cipher suite mismatches.
  5. Design, maintain, and improve CI/CD pipelines for the library, including automated builds, multi-runtime test matrices, static analysis, dependency scanning, and artifact publishing across all supported language ecosystems (Maven/Gradle, PyPI, npm).

Skills

Required

  • Java
  • Python
  • Node.js/TypeScript
  • TLS 1.2
  • TLS 1.3
  • X.509
  • PKI
  • CI/CD
  • network security protocols
  • cryptographic libraries
  • API design
  • testing strategies
  • diagnostic skills

Nice to have

  • OpenSSL
  • Bouncy Castle
  • FIPS 140-2/140-3
  • mutual TLS (mTLS)
  • HSMs
  • key management infrastructure
  • Docker
  • Kubernetes
  • AWS
  • performance profiling
  • AI-assisted development tools
  • CISSP
  • CCSP

What the JD emphasized

  • security-sensitive
  • infrastructure-level library development
  • Deep understanding of TLS 1.2 and 1.3
  • protocol-conformance testing
  • cross-platform interoperability testing