Join us as an Identity and Access Management Software Engineer
This is an opportunity for a driven Identity and Access Management (IAM) Software Engineer to take on an exciting new career challenge
Day-to-day, you'll build a wide network of stakeholders of varying levels of seniority
It’s a chance to hone your existing technical skills and advance your career
What you'll do
In your new role, you’ll engineer and maintain innovative, customer centric, high performance, secure and robust solutions.
You’ll be working within a feature team and using your extensive experience to engineer software, scripts and tools that are often complex, as well as liaising with other engineers, architects and business analysts across the platform.
You’ll also be:
Producing complex and critical software rapidly and of high quality which adds value to the business
Working in permanent teams who are responsible for the full life cycle, from initial development, through enhancement and maintenance to replacement or decommissioning
Collaborating to optimise our software engineering capability
Designing, producing, testing and implementing our working code
Working across the life cycle, from requirements analysis and design, through coding to testing, deployment and operations
The skills you'll need
You’ll need a background in software engineering, a deep understanding of IAM concepts and protocols, software design, architecture, and an understanding of how your area of expertise supports our customers.
Additionally you will have knowledge of Webserver, Web Proxy, Reverse Proxy, API Gateway, different Browsers and Mobile Native Apps, along with PKI basics and standards such as NIST and OWASP. You’ll need excellent stakeholder management skills and be proficient in translating technical jargon, in addition to having an analytical mindset and learning new things in a fast paced environment.
You’ll also need knowledge of:
Federated SSO and deep understanding of IAM concepts
IdP products such as Keycloak
Java, any other language is a plus
Docker and Kubernetes
IaC, such asTerraform, and AWS or other Cloud
OAuth2, OIDC, mTLS, SAML, JSON/JWT, REST API, 2FA/MFA, LDAP, SOAP
Log analysis based on data in splunk, graylog, jeager and SQL
Manage Jenkins pipelines and Argo CD