This is Srikanth from Reliable Software. We have a position with one of our clients. Below are a few details pertaining to the job. Please take a look at it and let me know if you would like to be considered for the opportunity. Please share with me your updated resume.
Job Title: Lead Privacy Engineer / Technical De-Identification Architect
Location: Remote
Job Description:-
We are seeking a Lead Privacy Engineer / Technical De-Identification Architect to design, implement, and operationalize advanced de-identification, anonymization, pseudonymization, and encryption capabilities for Project Trinity. This role will be responsible for translating privacy, regulatory, security, and data usability requirements into technical controls that can be deployed across platform architecture, ingestion frameworks, data processing pipelines, and governed data access patterns.
This is a highly technical role requiring expertise in privacy engineering, secure data architecture, cryptographic controls, data transformation frameworks, and pipeline integration. The individual will define and implement de-identification and encryption strategies for sensitive datasets across structured, semi-structured, image, text, and machine-generated data, while supporting region-specific requirements where U.S. and international approaches may converge or diverge. The role will also drive vendor evaluation, workflow certification, residual risk scoring, runbook development, and production-scale execution for approved use cases.
Validation: this role summary is more technical and now explicitly includes encryption architecture and engineering expectations.
Required Qualifications
· Bachelor’s or Master’s degree in Computer Science, Cybersecurity, Data Engineering, Biomedical Informatics, Information Security, or related technical field
· 7+ years of experience in privacy engineering, data protection engineering, security architecture, data platform engineering, or closely related technical roles
· Hands-on experience designing and implementing de-identification, anonymization, or pseudonymization controls for sensitive or regulated data
· Strong understanding of cryptographic concepts and enterprise encryption patterns, including data-at-rest encryption, transport encryption, key management, secrets management, and certificate-based trust models
· Experience designing secure handling patterns for identifiers, tokenization systems, mapping tables, and access-restricted re-linkage mechanisms
· Experience integrating privacy and security controls into cloud-native or enterprise data pipelines, APIs, and analytics platforms
· Strong technical experience with schema design, transformation logic, metadata-driven processing, validation rules, and control automation
· Experience evaluating commercial or open-source de-identification or privacy-enhancing technologies from both architecture and implementation perspectives
· Ability to convert legal, privacy, and regulatory requirements into enforceable technical specifications and control frameworks
· Strong documentation skills, including reference architectures, technical standards, interface definitions, and runbooks
Thanks,
Srikanth Donkani
Lead-Talent Acquisition Manager
(W)
Reliable Software Resources
22260 Haggerty Road, Suite#285, Northville, MI 48167.