Platform Engineer - Identity and Access Management (iam)

Palantir Palantir · Enterprise · London, United Kingdom · Information Security

Platform Engineer focused on Identity and Access Management (IAM) infrastructure and tooling for Palantir's corporate and customer-facing systems. Responsibilities include developing automation, building and managing secure systems in cloud environments (AWS, Azure, GCP), scaling SSO integrations, standardizing operational workflows, and researching emerging authentication protocols. Requires technical proficiency in identity protocols and management platforms, strong infrastructure-as-code skills, and UK security clearance.

What you'd actually do

  1. Develop automation and tooling for corporate and customer-facing identity platforms
  2. Build, secure, and manage geo-redundant systems and services in AWS and Azure
  3. Scale the implementation of Single Sign-On (SSO) integrations across multiple Entra ID tenants using infrastructure-as-code frameworks
  4. Build tooling to standardise and scale operational workflows across AWS, Azure, and Google Cloud Platform (GCP)
  5. Research and drive adoption of emerging authentication protocols (such as passwordless auth) in collaboration with Security Engineers

Skills

Required

  • Minimum 3 years' experience in Site Reliability Engineering (SRE), DevOps, or an equivalent discipline
  • Experience deploying and operating Linux- or Windows-based infrastructure in AWS, Azure, or Google Cloud
  • Expert-level proficiency in a language such as Go (preferred), Python, PowerShell, or TypeScript
  • Experience with infrastructure-as-code frameworks such as Terraform, CloudFormation, Ansible, Puppet, or PowerShell DSC
  • Technical proficiency in identity protocols (SAML, OIDC, LDAP, Kerberos, FIDO2, WebAuthn)
  • Experience managing identities and governance workflows on platforms such as Entra ID, AWS Cognito, or Okta
  • Current UK security clearance (SC or DV level), or eligibility to obtain clearance

Nice to have

  • Go (preferred)

What the JD emphasized

  • Technical proficiency in identity protocols (SAML, OIDC, LDAP, Kerberos, FIDO2, WebAuthn)
  • Experience managing identities and governance workflows on platforms such as Entra ID, AWS Cognito, or Okta
  • Current UK security clearance (SC or DV level), or eligibility to obtain clearance