Six engineers who each ran into the same credential sprawl problem at different companies.
Founder & CEO
Previously engineering lead at Palantir's Federal division, where he built secure data pipeline infrastructure for US government clients. Left in 2023 after spending three weeks manually auditing 847 orphaned OAuth tokens across 12 providers in a multi-agent research system he'd built. Started Alter the following month.
Co-Founder & CTO
Eight years at HashiCorp, most recently as senior engineer on the Vault secrets engine team. Designed the OIDC auth backend used by thousands of Vault deployments. Holds two patents on token lifecycle management. Joined Alter as co-founder after realizing Vault's design assumptions all break when the requesting entity is a non-human agent running at scale.
Head of Security Engineering
Former security engineer at Okta's identity infrastructure team, where he worked on OAuth 2.1 spec implementation and the FAPI 2.0 security profile. Came to Alter after publishing a widely-read post-mortem on how AI coding agents were bypassing company OAuth policies through token sharing between agent instances.
We're hiring a senior backend engineer (Go/Rust) and a developer relations engineer. If you've worked on auth infrastructure, OAuth at scale, or agentic AI systems, we'd like to talk.