← Back to All Openings

Principal Cryptographic Provenance & Immutable Ledger Engineer

corpora-jobs-1778796293285-db9d41c6 - Frontier Development
Systems EngineerPrincipal1 position

Why This Role is Different

Frontier Development Role

Lead the design of a cryptographically secure, immutable knowledge‑base that turns every embedding into a verifiable artifact. Your work will become the foundation for trust, compliance, and self‑healing in our multi‑agent AI ecosystem.

The Frontier Element

You will pioneer the first end‑to‑end cryptographic provenance chain for semantic embeddings, blending cutting‑edge blockchain primitives with vector‑store internals—an uncharted intersection of AI and secure systems.

🔬

Project Context

Research Area

Cryptographic Provenance of Embeddings and Immutable Audit Trail

From: Retrieval Unreliability and Knowledge Base Corruption

Why This Role is Critical

The backbone of the proposed RAG architecture relies on tamper‑evident signatures and a permissioned ledger to guarantee that every vector and every retrieval trace is verifiable and recoverable. This role will design and implement the ingestion, signing, and ledger integration that turns abstract embeddings into cryptographically auditable artifacts.

What You Will Build

A production‑grade ingestion service that hashes, timestamps, and signs each embedding with a blockchain oracle; a permissioned blockchain layer that records immutable retrieval traces and rollback checkpoints; and tooling for automated audit‑trail validation and rollback orchestration.

🛠

Key Responsibilities

  • Architect and implement a vector ingestion pipeline that computes SHA‑256 hashes, attaches model fingerprints, and signs payloads via a blockchain oracle (e.g., Hyperledger Fabric or Ethereum Layer‑2).
  • Design a permissioned ledger schema that stores immutable retrieval traces, trust scores, and rollback checkpoints, and expose a gRPC API for audit‑trail queries.
  • Build automated rollback logic that detects corruption events, reverts to the last known good state, and flags deprecated vectors for deprecation.
  • Integrate cryptographic attestation verification into the retrieval engine, ensuring that every candidate vector passes signature validation before scoring.
  • Collaborate with the trust‑scoring team to embed provenance metadata into the dynamic trust‑weight calculation pipeline.
🎯

Required Skills & Experience

Technical Must-Haves

Cryptographic primitives (hashing, ECDSA, RSA, Ed25519)

Expert
Essential for generating and verifying signatures on embeddings and audit logs.

Blockchain SDKs (Hyperledger Fabric, Ethereum Solidity, zk-SNARKs)

Advanced
Required to build a permissioned ledger and oracle integration.

Vector database APIs (FAISS, Milvus, Pinecone)

Proficient
Needed to embed provenance metadata into the vector store.

Distributed systems design (CAP theorem, consensus protocols)

Expert
Critical for ensuring ledger consistency and low‑latency retrieval.

Python/Go/C++ backend development

Advanced
Core languages for building ingestion services and ledger adapters.

Experience Requirements

  • 5+ years designing secure, tamper‑evident systems for AI or data pipelines.
  • Track record of deploying production blockchain solutions or cryptographic attestation frameworks.

Education

PhD or Master’s in Computer Science, Electrical Engineering, or Mathematics with specialization in cryptography, secure systems, or distributed ledger technologies.

Preferred Skills

  • Experience with zk‑SNARKs or zk‑STARKs for lightweight attestation.
  • Knowledge of GDPR/HIPAA compliance requirements for data provenance.
🤝

You Will Thrive Here If...

  • Thrives in high‑autonomy environments where design decisions have system‑wide impact.
  • Shows a bias toward action, building prototypes to validate cryptographic assumptions.
📈

Impact & Growth

12-Month Impact

Within 12 months, deliver a fully operational ingestion‑to‑ledger pipeline that reduces vector‑level poisoning incidents by >90% and enables instant rollback for any detected corruption, while providing audit logs that satisfy regulatory compliance.

Growth Opportunity

Lead the expansion of the provenance framework to multi‑tenant, cross‑domain deployments, and evolve the ledger into a unified trust fabric for all downstream AI services.

Ready to Push the Boundaries?

If this sounds like the challenge you have been looking for, we want to hear from you. We value what you can build over where you have been.