1997-08-08 - Applied crypto, security guru needed, from Coopers & Lybrand

Header Data

From: Declan McCullagh <declan@well.com>
To: cypherpunks@toad.com
Message Hash: 3e20d320e7d309bc8ead50f079471f40c816945af5e2399b1f90cb2c9e1174aa
Message ID: <Pine.GSO.3.95.970807080202.6016A-100000@well.com>
Reply To: N/A
UTC Datetime: 1997-08-08 08:18:05 UTC
Raw Date: Fri, 8 Aug 1997 16:18:05 +0800

Raw message

From: Declan McCullagh <declan@well.com>
Date: Fri, 8 Aug 1997 16:18:05 +0800
To: cypherpunks@toad.com
Subject: Applied crypto, security guru needed, from Coopers & Lybrand
Message-ID: <Pine.GSO.3.95.970807080202.6016A-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



[From a CMU computer science department mailing list. --Declan]

---------- Forwarded message ----------
>From: Dahl Gerberick <Dahl.Gerberick@us.coopers.com>
>
>Hi,
>
>I recently took a senior level position with Coopers & Lybrand in Boston.
>As such it has come to my attention that they are looking for someone with
>the following background.
>
>I do not expect that you will know where I can find such a person right
>now, but if you keep this message handy you might think of me if that
>person should come along in the near future.
>
>If you should find someone who meets these requirements please get back to
>me, or have them contact me directly.
>
>          Dahl Gerberick
>          617-478-9936 (Office)
>          617-478-5900 (Fax)
>          617-784-2701 (Home)
>          gerberick@acm.org
>
>Thanks
>Dahl - -
>
>PS:  Feel free to redistribute this message as you see fit.
>
> - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
>- - - - - - - - - - - - - - - - - - - - -
>
>  1.  Minimum 5- 10 years experience in applied cryptography
>
>  2.  Ability to design and implement security applications that utilize
>       encryption technology
>
>  3.  Extensive knowledge of X.509 standards for digital certificates
>
>  4.  Detailed knowledge of all prevailing algorithms, DES, IDEA, RSA,
>       Elliptic curve, etc.
>
>  5.  Algorithm development background not necessary
>
>  6.  Intimate knowledge of all national standards for cryptographic
>       implementations such as ANSI X.9 working group standards
>
>  7.  Intimate knowledge of all commercially available encryption
>       products from vendors such as Entrust, Verisign, Cylink, IBM,
>       GTE, etc.
>
>  8.  Knowledge of legal implications of electronic commerce such
>       as ABA Digital Signature standard
>
>  9.  Security consulting background a plus
>
>  10. Technical skill in TCP/IP, UNIX, internetworking technology
>
>
>
>











Thread