Iam Software Engineer II

Uber Uber · Consumer · Sao Paulo, Brazil · Engineering

Software Engineer II on the Identity and Access Management (IAM) team, responsible for designing and building features, APIs, and workflows for authentication and authorization. The role involves transforming governance systems with AI-driven security models and industry trends like RAG and MCP.

What you'd actually do

  1. Design, build, and maintain centralized access management systems and risk models where performance, security, and scale are inseparable.
  2. Solve messy, high-impact identity problems (such as birthright provisioning and access certifications) often without a clear starting point.
  3. Own your work end-to-end, from writing high-quality engineering design documents to managing critical platform changes using Terraform and standard build code.
  4. Champion software engineering best practices like code health, testing, and design clarity even when project stakes and pressure are high.
  5. Collaborate across disciplines to integrate SSO applications and middleware technologies while acting as the technical voice of the identity team.

Skills

Required

  • Senior/Staff seniority in the development, design, and consulting of SailPoint IIQ or similar IGA and authentication platforms.
  • Experience building and documenting high-quality code for complex software systems scaling to millions of users.
  • Proficiency with large-scale distributed storage and SQL database systems such as MySQL.
  • Strong understanding of Role-Based Access Control (RBAC), Policy-Based Access Control (PBAC), and Attribute-Based Access Control (ABAC).
  • Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent experience).

Nice to have

  • Working experience in DevOps, Linux, Puppet, and infrastructure automation to improve system reliability.
  • Experience leveraging AI/ML, prompt engineering, or MCP to build innovative identity solutions or resolve operational bottlenecks.
  • Technical certifications in SailPoint, Google Cloud, or Microsoft security architectures.
  • Demonstrated ability to use CSS and JavaScript to build or customize complex front-end interfaces for security tools.
  • Experience using developer productivity tools like Cursor or GitHub Copilot to optimize the software development lifecycle.

What the JD emphasized

  • high-stakes transformation
  • AI-driven security models
  • messy, high-impact identity problems
  • without a clear starting point
  • critical platform changes
  • project stakes and pressure are high
  • legacy complexity