Crypto Engineer II @ TD
Your Application Journey
Email Hiring Manager
Job Details
Job Overview
TD is seeking a Crypto Engineer II to work on certifying data protection enterprise solutions and new use cases. The role focuses on lab build, test planning and design, test execution, runbook preparation, and automation of Data Protection technologies.
Key Accountabilities
- Collaborate with Crypto Requirement and Security Architecture teams.
- Prepare solution blueprint documentation for enterprise adoption.
- Validate cryptographic solutions, including data at rest and in transit protections.
- Work with technologies such as TDE, HSMs, PKI and post-quantum cryptography.
- Utilize scripting languages (Python, Bash, PowerShell) and automation tools like Ansible.
Technical Requirements
The ideal candidate will have:
- Minimum 7 years of IT experience in a large institution.
- 3+ years in the cryptography domain with hands-on validation experience.
- Expertise in security controls and encryption technologies.
- Experience in cloud and virtualized environments and relevant IS Security certifications (e.g. CISSP).
About TD
TD is a leading global financial institution with over 95,000 colleagues delivering customer experiences across North America and the world. TD offers robust development programs, competitive rewards, and continuous career growth opportunities.
Additional Information
This role is based in Toronto, Ontario, Canada and is subject to provincial employment regulations. TD provides extensive training, career development, and accommodations to ensure success and inclusion during the recruitment process.
Key skills/competency
- Cryptography
- Data Protection
- Encryption
- Scripting
- Automation
- API Testing
- Cloud Solutions
- PKI
- HSM
- Security
How to Get Hired at TD
🎯 Tips for Getting Hired
- Tailor your resume: Highlight cryptography and scripting experiences.
- Emphasize certifications: Mention CISSP or similar credentials.
- Showcase projects: Detail enterprise encryption projects.
- Prepare for technical questions: Review encryption standards and automation tools.