About the job
About the Opportunity:
Join Veza as a dedicated Backend Software Engineer and become an integral part of our innovative team. In this role, you will be instrumental in designing, developing, and maintaining key features of our advanced Identity Security Platform. Collaborating closely with cross-functional teams, you will create robust, scalable solutions that adapt to the evolving demands of our clients. This is a fantastic opportunity to influence the success of a high-impact startup while working with cutting-edge technologies in the dynamic security sector.
Your Responsibilities:
- Design, develop, and maintain backend services and APIs for our SaaS-based Identity Security Platform, ensuring optimal performance, scalability, and reliability.
- Work in tandem with product managers, fellow engineers, UX designers, and security specialists to build features that fulfill business needs and adhere to security standards.
- Enhance and sustain the Access Request and Access Review functionalities, pioneering new features for our platform.
- Oversee identity lifecycle management processes, including user provisioning, de-provisioning, and access control policies.
- Implement comprehensive logging, monitoring, and auditing capabilities to ensure compliance with regulatory requirements.
- Continuously optimize platform performance, security, and scalability through code reviews, testing, and refactoring efforts.
- Stay informed about industry trends and emerging technologies in identity and access management to drive innovation within our platform.
Qualifications:
- Education:
- Bachelor's or Master's degree in Computer Science, Engineering, or a related discipline.
- Experience:
- Minimum of 2 years of experience in backend software development, particularly in identity and access management, security, or similar fields.
- Strong command of one or more object-oriented programming languages, such as Golang or Java.
- Proven experience in designing and implementing RESTful APIs and microservices architectures.
- Solid understanding of authentication and authorization protocols, standards, and best practices.
- Familiarity with cloud platforms like AWS, Azure, or Google Cloud Platform, alongside knowledge of IAM services.
