Role Summary
We are seeking a Senior GrapheneOS Security Engineer to architect, deploy, harden, and maintain sovereign, de-Googled Android security environments built entirely on GrapheneOS. This role focuses on creating a fully independent, Big Tech–decoupled mobile ecosystem for sensitive communications, on-device privacy, and operational security — suitable for executives, high-risk individuals, and organizations facing advanced threat models. The engineer will design a zero-trust, end-to-end secure mobile stack, ensuring the system operates without Google Play Services, cloud dependencies, or centralized telemetry.
Key Responsibilities
1. GrapheneOS Deployment & Hardening
- Build, flash, and maintain GrapheneOS using deterministic, reproducible builds
- Configure hardened system components:
- Memory tagging (MTE)
- Hardened libc, kernel protections
- Enhanced sandboxing and app isolation
- Optimize OS security posture without compromising usability for mission workflows
- Maintain strict separation between personal profiles, work profiles, and secure compartments
2. Secure Android Application Architecture (No Google Dependencies)
- Deploy and manage applications using:
- F-Droid privileged extension
- Aurora services (anonymous mode)
- Custom internal app repositories
- Build or integrate end-to-end encrypted communication applications that run without Google Play, push services, or Firebase
- Configure per-application network routing, VPN restrictions, and firewall rules
- Implement a no-analytics, no-telemetry, and no-crash-reporting application infrastructure
3. Private, Self-Hosted Backend & Sync Layer
- Configure secure backend infrastructure (self-hosted; no third-party cloud):
- Nextcloud (documents, encrypted backups)
- Matrix Synapse (private messaging)
- Vaultwarden (encrypted secrets)
- Custom Tor hidden services for secure sync
- Establish Tor-only, metadata-minimized connectivity between phones and servers
- Build workflows where the device:
- Only syncs on approved networks
- Never leaks metadata
- Maintains full sovereignty over backup locations and encryption keys
4. Zero-Trust Mobile Security Engineering
- Implement system-wide isolation mechanisms:
- Hardened user profiles
- Per-app storage scopes
- Hardened toggles (camera, mic, sensors)
- Configure and maintain:
- Verified boot
- Integrity checks
- Hardware-backed key storage
- Build provisioning pipelines for employees, VIP clients, or high-risk users
5. Threat Modeling, Monitoring & Red-Teaming
- Conduct adversarial threat modeling against:
- Network attacks
- Side-channel attacks
- Baseband exploitation
- Physical access attempts
- Test resistance to:
- SIM-based hijacking
- IMSI catchers
- Rogue access points
- App-level exfiltration
- Provide executive intelligence reports on vulnerabilities and risk exposure
Required Technical Skills
GrapheneOS & Android Security
- Expert knowledge of GrapheneOS internals, permissions, toggles, and threat model
- Experience with AOSP, Android kernel hardening, and system-level security patches
- Strong understanding of secure boot, verified boot, and hardware-backed key attestation
Networks & Privacy
- Strong foundation in:
- Tor routing
- VPN chaining
- DNS over Tor/HTTPS
- Firewall isolation
- Zero-metadata communication workflows
Backend Sovereign Infrastructure
- Comfortable with:
- Linux server security
- Nextcloud with encrypted storage
- Matrix Synapse
- Vaultwarden
- Custom private app stores
Cryptography
- Solid understanding of:
- Hardware key storage
- End-to-end encryption
- Key rotation
- Backup encryption
- Secure file sharing
Personal Attributes
- Zero-trust mindset, assuming compromise until proven otherwise
- Surgical precision in configurations and security workflows
- Strong discipline in documentation and operational hygiene
- Ability to translate complex technical security risks into clear, executive-level guidance
- Extreme discretion and respect for confidentiality
What This Role Enables
A fully sovereign, Big-Tech-free Android mobile ecosystem
- Mobile devices resistant to advanced surveillance, interception, and network-based attacks
- GrapheneOS-hardened communication channels with zero metadata leakage
- A secure, private backend infrastructure outside U.S. or EU jurisdiction
- A system architecture capable of withstanding state-level threat models