Twelve months ago, the consensus was that quantum computers capable of breaking RSA encryption were a decade away. Recent research has moved that estimate uncomfortably closer: breaking widely used cryptographic systems may require as few as 100,000 qubits, down from estimates of around 1 million qubits published just a year ago.
The NSA is not waiting. All new national security systems must be quantum-safe by January 2027. NIST finalized its first post-quantum cryptographic standards in 2024 and is actively pushing adoption. An industry coalition β including senior officials from the FBI, NIST, and CISA β has declared 2026 the βYear of Quantum Security.β
This is the year post-quantum cryptography transitions from research specialty to operational requirement. And the workforce that understands it is still small enough that early movers will define the field.
The Threat You Need to Understand First
Post-quantum cryptography exists because quantum computers will eventually break the mathematical foundations of most encryption in use today.
RSA, ECC (Elliptic Curve Cryptography), and Diffie-Hellman key exchange all rely on the computational difficulty of two problems: factoring large integers and solving discrete logarithm problems. Classical computers canβt solve these efficiently. A sufficiently powerful quantum computer running Shorβs Algorithm can.
This isnβt a distant hypothetical. Itβs a timeline question β and that timeline is compressing faster than most of the industry anticipated.
βHarvest Now, Decrypt Laterβ: The Threat Thatβs Already Active
Hereβs the problem that makes 2026 the moment to act, even if quantum computers canβt break RSA today: adversaries donβt have to wait.
Harvest now, decrypt later (HNDL) is a strategy where sophisticated threat actors β nation-states, primarily β collect encrypted data today, store it, and plan to decrypt it once quantum computing reaches sufficient capability. Intelligence agencies, diplomatic communications, financial records, health data: anything that will be valuable in 5β10 years is worth harvesting now.
This means the window for migrating to quantum-safe cryptography is not βbefore quantum computers can break encryption.β Itβs now. Data encrypted today with RSA or ECC is already potentially compromised by HNDL attacks.
The NSAβs January 2027 deadline for new national security systems reflects this urgency. The guidance to phase out quantum-vulnerable algorithms after 2030 reflects the timeline for existing systems.
Why 2026 Is the Real Inflection Point for Careers
Three things converged this year that make 2026 the practical entry point for quantum security careers:
1. NIST standards are finalized and real In August 2024, NIST published the first three finalized post-quantum cryptographic standards. These are not drafts or research proposals β they are the standards that government agencies and their contractors are being required to adopt. Having finalized standards means organizations can now actually implement PQC at scale, which means they need people who know how.
2. Government mandates are creating non-discretionary demand The NSAβs January 2027 requirement for new national security systems is already generating hiring activity. Defense contractors, intelligence community primes, and federal agencies all need cryptography experts who understand PQC. This is not optional spending β itβs a mandate with a deadline. The procurement and hiring activity started in 2025 and is accelerating through 2026.
3. Commercial adoption is beginning in high-stakes sectors Financial services, healthcare, and cloud infrastructure providers are all beginning quantum readiness programs. This is driven partly by regulatory anticipation (financial regulators are watching NIST adoption closely) and partly by the HNDL threat, which is particularly acute for financial records and health data with long-term sensitivity.
The Standards Every Security Professional Should Know
You do not need a physics background to work in post-quantum cryptography. You need to understand the standards β what theyβre designed to protect against, how they work at a conceptual level, and where they fit in real-world cryptographic infrastructure.
The NIST-Standardized PQC Algorithms
CRYSTALS-Kyber (now called ML-KEM β Module Lattice Key Encapsulation Mechanism) Used for key encapsulation β the process of securely establishing a shared secret key between parties. This is the PQC replacement for RSA and Diffie-Hellman in key exchange scenarios. Itβs based on the hardness of problems in lattice mathematics, which quantum computers cannot efficiently solve.
Kyber is already being integrated into TLS implementations and is the primary algorithm for replacing RSA in key exchange. Understanding how key encapsulation works and where Kyber slots into TLS 1.3 or SSH is foundational knowledge for PQC work.
CRYSTALS-Dilithium (now called ML-DSA β Module Lattice Digital Signature Algorithm) Used for digital signatures β proving that a message or piece of software genuinely came from who it claims to. This replaces RSA and ECDSA in signature applications. Like Kyber, itβs lattice-based.
FALCON (now called FN-DSA) A second digital signature algorithm, also lattice-based but using a different mathematical foundation (NTRU lattices). Produces smaller signatures than Dilithium, making it attractive for constrained environments like IoT devices and embedded systems.
SPHINCS+ (now called SLH-DSA β Stateless Hash-Based Digital Signature Algorithm) Unlike the lattice-based algorithms, SPHINCS+ is based on hash functions β mathematics weβve trusted for decades. Itβs more conservative: larger signature sizes and slower than the lattice algorithms, but its security assumptions rest on simpler, better-understood math. Itβs the algorithm you choose when you want maximum confidence in long-term security guarantees.
The Practical Skill: Crypto Agility
Beyond knowing the algorithms, the most valuable skill in PQC implementation is cryptographic agility β designing systems so that cryptographic algorithms can be swapped out without redesigning the entire architecture. Many systems in production today bake in specific algorithms in ways that make migration extremely difficult.
Building crypto-agile systems β and assessing existing systems for crypto agility β is a high-demand skill that doesnβt require deep mathematics. Itβs systems architecture applied to cryptography.
How to Transition Into Quantum Security Work
Starting From a Traditional Security Background
You donβt need to become a cryptographer. The quantum security field needs people who can:
- Conduct cryptographic inventories β identifying where RSA, ECC, and Diffie-Hellman are in use across an organizationβs systems, applications, and protocols
- Manage migration projects β the operational work of replacing vulnerable algorithms with NIST-approved PQC alternatives
- Assess vendor and supply chain readiness β evaluating whether third-party products and services support PQC
- Write quantum risk assessments β translating technical cryptographic risk into business risk language for boards and executives
These are skills that map directly from existing GRC, security engineering, and systems architecture experience. Youβre not learning quantum physics β youβre applying security fundamentals to a new cryptographic context.
The Learning Path
Step 1 β NIST documentation Read NISTβs published standards for ML-KEM, ML-DSA, and SLH-DSA. The introductory sections explain the threat model and intended use cases in clear language. NIST also publishes a Migration to Post-Quantum Cryptography guidance document (NIST IR 8413) that is the practical entry point for implementation work.
Step 2 β CISA and NSA guidance Both CISA and NSA have published quantum readiness guidance documents. NSAβs CNSA 2.0 suite specifies which algorithms are approved for national security systems. These documents tell you exactly what implementations must look like in the highest-stakes environments β the rest of the market follows.
Step 3 β Hands-on with Open Quantum Safe The Open Quantum Safe project provides open-source implementations of PQC algorithms and integrations with protocols like TLS and SSH. Running PQC-enabled TLS in a test environment and comparing performance characteristics to classical algorithms gives you practical understanding that reading alone wonβt provide.
Step 4 β Build a cryptographic inventory methodology Practice doing a cryptographic inventory on an application or system you have access to. Document where keys are generated, stored, and used; which algorithms are in play; and what would be required to migrate each instance to a PQC alternative. This exercise is directly billable work in the real world.
Certifications and Credentials
The certification landscape for PQC is still developing. Current options:
- (ISC)Β² CSSP or CISSP with cryptography concentration β Solid baseline that hiring managers recognize, even if not PQC-specific
- CompTIA SecurityX (previously CASP+) β Updated to include post-quantum and emerging cryptography content
- Vendor-specific training β AWS, Google Cloud, and Microsoft Azure all have quantum security content tied to their PQC readiness services
No single certification yet defines βquantum security professionalβ β which means demonstrating practical knowledge and documented project work carries more weight than credentials.
Salary Data and Where the Jobs Are
- Entry-level quantum security analyst: $80,000β$110,000
- Mid-level quantum security engineer: $120,000β$160,000
- Senior PQC researcher/architect: $140,000β$200,000+
- Average across all quantum security roles: ~$125,000
The highest concentrations of quantum security roles are in:
Defense and intelligence sector β The NSA mandate creates non-discretionary demand at Lockheed Martin, Raytheon, Booz Allen Hamilton, SAIC, and similar contractors. Security clearances are often required, which both limits competition and increases compensation.
Financial services β Banks, payment processors, and exchanges with long-term data sensitivity are beginning quantum readiness programs. Goldman Sachs, JPMorgan, and major European banks are all active.
Cloud infrastructure providers β AWS, Google Cloud, and Microsoft Azure are building PQC support into their core services. They need engineers who understand how to integrate PQC into TLS, certificate management, and key management services at hyperscale.
Consulting firms β PQC readiness assessments are becoming a service line at Deloitte, PwC, and boutique cybersecurity consultancies. This is a high-leverage role for building broad PQC experience across multiple client environments quickly.
The quantum threat is real, the timeline is moving, and the NIST standards exist. Whatβs still missing is the workforce. The professionals who built expertise in cloud security in 2015 didnβt wait until cloud was mainstream β they got in when getting in was still possible.
Post-quantum cryptography is at that moment right now.
You donβt need a physics degree. You need to start.



