Red Hat is the world’s leading provider of enterprise open source software solutions, and they are seeking a Senior Product Security Engineer to own and execute key cryptographic modernization initiatives. This role involves acting as the primary enabler for product teams across Red Hat, helping them adopt new policies, integrate modern libraries, and audit their applications.
Responsibilities:
- Act as the primary technical owner for auditing Go-based cryptographic implementations within OpenShift and container runtimes (CRI-O, Podman). You will identify and resolve cryptographic discrepancies where containerized applications fail to correctly leverage the host's FIPS or PQC providers
- Act as the primary technical owner responsible for continuing the implementation and integration of Red Hat's cryptographic inventory tools (e.g., Crypto Scanner)
- You will partner with the Principal Product Security Engineer to define and implement scanner policies for detecting cryptographic assets in our build pipelines
- You will work directly with pipeline and data teams to integrate these tools and produce a sustainable Cryptographic Bill of Materials (CBOM)
- You will partner with product teams to integrate Merkle Tree Certificate support within the portfolio’s unified security fabric
- Serve as the primary go-to technical consultant for product teams (like OpenShift, Ansible, and Middleware) navigating cryptographic migrations (e.g., PQC, FIPS)
- You will consult directly with engineers to help them audit their code, understand their dependencies (e.g., python-cryptography), and build migration plans that align with the portfolio-wide policy
- You will enable other teams by creating documentation, best-practice guides, and office hours to scale your expertise
- Define the functional requirements for and partner on the integration of new cryptographic tools, such as runtime instrumentation for core libraries
- You will track and manage critical cryptographic dependencies across the portfolio, working with RHEL Security and other teams to resolve blockers and ensure the successful, sequential delivery of modern crypto capabilities
Requirements:
- Deep, hands-on experience in Go and Python is required
- Broad knowledge in applied cryptography (PKI, TLS, digital signatures)
- Strong understanding of modern cryptographic challenges, including Post-Quantum Cryptography (PQC)
- Strong understanding of OCI specifications and how container runtimes interact with cryptographic hardware (HSMs) or kernel-level providers
- Proven experience owning and delivering complex, cross-team technical projects from design to completion
- A track record of building relationships across teams and acting as a recognized go-to person
- Strong analytical skills to diagnose complex dependencies and technical blockers in a large-scale software portfolio
- Previous experience contributing to or maintaining core cryptographic libraries or security-focused Go projects
- Familiarity with SPIFFE/SPIRE or Sigstore/Cosign
- Experience with Merkle Tree implementations or binary-level runtime analysis
- Familiarity with FIPS validation processes in virtualized/containerized environments