Comcast Cybersecurity: Network Research Engineer, Post-Quantum Cryptography
PA - Philadelphia, 1800 Arch St, United States
Comcast
Comcast NBCUniversal creates incredible technology and entertainment that connects millions of people to the moments and experiences that matter most.Job Summary
We are looking for a Network Research Engineer to support our Post-Quantum Cryptography workstream. This role is part of our growing Comcast’s Security & Privacy Innovation, Engineering, Research and Development (SPIDER) team. We are on a mission to build cutting-edge security and privacy tools in complex environments. If you’re excited to work with a group of technical experts solving hard networking and cryptography problems using network analysis tools, infrastructure, and building end-to-end solutions to meet emerging cryptography goals, this opportunity is for you.Responsible for contributing to individual algorithm development and the software development process. Evaluates accuracy and functionality of individual algorithms and understands the overall implications of entire frameworks. Develops and tests prototypes and new products and applications. Responsible for the initial design and implementation of products and applications. Analyzes and evaluates solutions both internally generated as well as third party supplied. Develops novel ways to solve problems and discover new products, Serves as a mentor to the team and peers. Works independently with minimal-to-no supervision while also demonstrating the ability to lead projects and initiatives autonomously.
Job Description
Core Responsibilities
Builds tools and technologies to enable discovery of cryptographic assets across Comcast using network and infrastructure telemetry data.
Works closely with stakeholders to gather requirements to prototype, develop, validate, and build systems to support quantum-ready encryption.
Implements technologies and associated roadmaps to create new telemetry for cryptographic inventorying.
Designs, implements, and evaluates PQC-enabled network protocols for different layers of the OSI model, e.g., PQC-enabled TLS.
Supports evaluation of vendor provided and open-source solutions for PQC transition.
Participate in standards organizations and coalitions like IETF, MITRE PQCC, etc.
Implements automation tools and frameworks (CI/CD pipelines) following secure design principles.
Presents findings and roadmaps to executive leadership and contribute to organizational post-quantum strategy.
- Develops specifications, technical requirements and algorithms for future products and applications.
- Provides technical solutions to a wide range of difficult problems. Independently determines and develops approach to solutions.
- Tests and evaluates solutions presented to the Company by various internal and external partners and vendors. Completes case studies, testing and reporting.
- Designs prototypes and contributes to studies to support product or application development.
- Organizes and maintains resources. Researches, writes and edits documentation and technical requirements, including evaluation plans, confluence pages, white papers, presentations, test results, technical manuals, formal recommendations and reports. Contributes to the company by creating patents, API's and other intellectual property. Presents papers and attends conferences.
- Collaborates with teams outside of immediate work group. Represents the work team in providing solutions to technical issues associated with assigned projects.
- Provides guidance and leadership to more junior researchers. Collaborates within and across teams. Deciphers tasks into functional components.
- Consistent exercise of independent judgment and discretion in matters of significance.
- Regular, consistent and punctual attendance. Must be able to work nights and weekends, variable schedule(s) and overtime as necessary.
- Other duties and responsibilities as assigned.
Minimum Qualifications:
Bachelor's degree in computer science, Network Security, IT, or similar technical field with 5 years of professional experience OR Master’s degree in Computer Science, Network Security, IT, or similar technical field with 3 years of professional experience OR equivalent.
Solid understanding of various protocols like TLS, X.509, BGP, DHCP, IPsec, DNSsec, etc.
Knowledge of networking principles and components like firewalls, routers, switches, load balancers, servers, etc.
At least 2 years of experience working with network packet capture tools like WireShark, tcpdump, nmap, or similar.
Well-versed in PKI and OCSP.
Understanding of cryptographic algorithms (RSA, ECC, AES) and digital signatures.
Ability to learn and work independently, along with strong communication, and a strong work ethic.
Preferred Qualifications:
PhD in Computer Science, Network Security, IT, or similar technical field.
Deep knowledge of cryptographic algorithms, interest in Post-Quantum Cryptography algorithms like ML-KEM, and familiarity with NIST PQC standards and guidelines.
Knowledge of cloud infrastructure (like AWS, Azure, Google).
Good understanding of API development, deployment, and integration experience.
Working experience in any one of the SQL databases, Databricks, Snowflake, or similar.
Employees at all levels are expected to:
- Understand our Operating Principles; make them the guidelines for how you do your job.
- Own the customer experience - think and act in ways that put our customers first, give them seamless digital options at every touchpoint, and make them promoters of our products and services.
- Know your stuff - be enthusiastic learners, users and advocates of our game-changing technology, products and services, especially our digital tools and experiences.
- Win as a team - make big things happen by working together and being open to new ideas.
- Be an active part of the Net Promoter System - a way of working that brings more employee and customer feedback into the company - by joining huddles, making call backs and helping us elevate opportunities to do better for our customers.
- Drive results and growth.
- Respect and promote inclusion & diversity.
- Do what's right for each other, our customers, investors and our communities.
Disclaimer:
- This information has been designed to indicate the general nature and level of work performed by employees in this role. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications.
Skills
Cryptography, Cybersecurity, Network ProtocolsWe believe that benefits should connect you to the support you need when it matters most, and should help you care for those who matter most. That's why we provide an array of options, expert guidance and always-on tools that are personalized to meet the needs of your reality—to help support you physically, financially and emotionally through the big milestones and in your everyday life.
Please visit the benefits summary on our careers site for more details.
Education
Bachelor's Degree: Computer and Information Science (Required), Ph. D.: Computer and Information ScienceWhile possessing the stated degree is preferred, Comcast also may consider applicants who hold some combination of coursework and experience, or who have extensive related professional experience.Certifications (if applicable)
Relevant Work Experience
5-7 YearsComcast is proud to be an equal opportunity workplace. We will consider all qualified applicants for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability, veteran status, genetic information, or any other basis protected by applicable law.* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: AES APIs Automation AWS Azure CI/CD Cloud Computer Science Confluence Cryptography Databricks Encryption Firewalls Network security NIST Nmap PhD PKI Privacy RSA Snowflake SQL Strategy TLS
Perks/benefits: Career development Conferences Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.