/

Solutions Architect — Banking Infrastructure

Solutions Architect — Banking Infrastructure

Full Time

Hybrid / remote · US or EU preferred

Visa Sponsorship Available

About the Role

Silence Laboratories is hiring a Solutions Architect for Banking Infrastructure to bridge our cryptographic core with the operational, security, and compliance realities of regulated financial institutions.

You will own architecture for deployments of Silent Shard and Silent Compute across wallets, custody systems, payment-processing environments, and bank-grade infrastructure — on-premises, cloud, hybrid, HSM-backed, TEE-backed, and highly controlled environments. You will work with customer technical teams, CISOs, compliance stakeholders, regulators where needed, and our internal cryptography, engineering, and product teams.

This is a hands-on architecture role. The right person can defend a system design in front of a CISO, produce audit-ready documentation, read cryptographic protocol documentation at a systems level, and prototype or validate architectural decisions rather than only advise from the sidelines.

What You Will Own

  • Lead customer architecture from technical discovery through production go-live for regulated financial deployments.

  • Design secure deployment patterns for MPC/TSS, HSM, TEE, custody, wallet, and payment workflows.

  • Produce customer-ready architecture docs, threat models, compliance mappings, integration guides, and operational runbooks.

  • Support technical workshops, security reviews, RFPs, due-diligence processes, and executive/CISO-level architecture discussions.

  • Translate customer constraints into product, protocol, and infrastructure requirements for internal teams.

  • Prototype or validate key architecture decisions in Rust, C, infrastructure-as-code, or equivalent tooling where necessary.

  • Help define reusable standards for bank-grade deployment, compliance, and operational readiness.

What Success Looks Like

  • Customers and internal teams trust you to lead architecture from discovery through production readiness with clear decisions and crisp documentation.

  • Regulated deployment patterns for Silent Shard and Silent Compute become reusable, reviewable, and easier to adapt across banks, custodians, payment networks, and similar institutions.

  • Compliance and security review conversations are supported by strong mappings to frameworks such as SOC 2 Type II, ISO 27001, PCI-DSS, FFIEC, MAS TRM, and DORA.

  • Technical workshops, RFP responses, security reviews, and CISO-level architecture discussions become sharper because the architecture is precise and defensible.

  • At least one institutional audit, due-diligence process, or security review is materially easier because of the documentation and system design discipline you bring.

  • Customer constraints flow back into product, protocol, and infrastructure decisions in a way that improves future deployments.

  • Post-quantum readiness and migration discussions become concrete enough for enterprise customers to plan around operationally.

What You Bring

  • 10+ years in infrastructure, security architecture, solutions architecture, or related technical roles.

  • At least 5 years of production architecture ownership inside a bank, custodian, payment network, central bank, or similarly regulated financial institution.

  • Hands-on production experience with HSMs such as Thales Luna, AWS CloudHSM, IBM Crypto Express, or equivalent systems.

  • Strong security architecture foundations across cloud, bare metal, and hybrid infrastructure: VPC design, IAM, secrets management, network segmentation, infrastructure-as-code, observability, and incident readiness.

  • Experience designing systems against compliance frameworks such as SOC 2 Type II, ISO 27001, PCI-DSS, FFIEC, MAS TRM, DORA, or similar.

  • Ability to read and reason about MPC/TSS or cryptographic protocol documentation at an architecture level.

  • Strong written and verbal communication with senior technical and compliance audiences.

Nice to Have

  • Rust, C, or similar systems programming experience sufficient to prototype or validate architecture choices.

  • Prior exposure to MPC/TSS infrastructure in production financial environments.

  • Experience with confidential compute such as Intel TDX, AWS Nitro Enclaves, GCP Confidential VMs, or equivalent.

  • Familiarity with post-quantum cryptography migration and its operational implications for key-management infrastructure.

  • Experience presenting to regulators, risk committees, external auditors, or CISO-led review boards.

Why Silence Laboratories

Silence Laboratories operates at the intersection of deep cryptographic research and high-stakes production deployment. Our team brings together PhD researchers with affiliations at MIT CSAIL, UIUC, NUS, and SUTD, engineers from globally top-ranked security teams, and industry veterans with leadership experience at Oracle, VMware, Snapchat, and other leading technology companies. The distance between a new cryptographic result and production code is intentionally short here.

For this role, that means helping financial institutions adopt modern cryptographic infrastructure without weakening control, auditability, or operational resilience. The work has to satisfy cryptographers, engineers, customers, security teams, and regulators.

Compensation

Competitive base, equity participation, and visa or EOR support where applicable. Final compensation depends on location, seniority, and depth of experience in regulated financial infrastructure, HSM-backed systems, compliance architecture, and key-management work. We discuss compensation expectations early so both sides can confirm alignment before deeper technical interviews.

Our Hiring Process

  1. Application & written screen: CV plus four short-answer questions. We read every one.

  2. Intro call with hiring manager (45 min): Mutual qualification, role context, comp expectations, candidate questions.

  3. Architecture deep-dive (90 min): Walk through a real deployment you owned, then a working session on a regulated-deployment scenario we provide.

  4. Cross-functional panel (2 to 3 conversations): Cryptography, engineering, and customer-facing stakeholders.

  5. References & offer: Two backchannel references. Offer typically follows within a week.