Join us as an Identity and Access Management Software Engineer This is an opportunity for a driven Identity and Access Management (IAM) Software Engineer to take on an exciting new career challenge Day-to-day, you'll build a wide network of stakeholders of varying levels of seniority It’s a chance to hone your existing technical skills and advance your career What you'll do In your new role, you’ll engineer and maintain innovative, customer centric, high performance, secure and robust solutions. You’ll be working within a feature team and using your extensive experience to engineer software, scripts and tools that are often complex, as well as liaising with other engineers, architects and business analysts across the platform. You’ll also be: Producing complex and critical software rapidly and of high quality which adds value to the business Working in permanent teams who are responsible for the full life cycle, from initial development, through enhancement and maintenance to replacement or decommissioning Collaborating to optimise our software engineering capability Designing, producing, testing and implementing our working code Working across the life cycle, from requirements analysis and design, through coding to testing, deployment and operations The skills you'll need You’ll need a background in software engineering, a deep understanding of IAM concepts and protocols, software design, architecture, and an understanding of how your area of expertise supports our customers. Additionally you will have knowledge of Webserver, Web Proxy, Reverse Proxy, API Gateway, different Browsers and Mobile Native Apps, along with PKI basics and standards such as NIST and OWASP. You’ll need excellent stakeholder management skills and be proficient in translating technical jargon, in addition to having an analytical mindset and learning new things in a fast paced environment. You’ll also need knowledge of : Federated SSO and deep understanding of IAM concepts IdP products such as Keycloak Java, any other language is a plus Docker and Kubernetes IaC, such asTerraform, and AWS or other Cloud OAuth2, OIDC, mTLS, SAML, JSON/JWT, REST API, 2FA/MFA, LDAP, SOAP Log analysis based on data in splunk, graylog, jeager and SQL Manage Jenkins pipelines and Argo CD