Senior Security Engineer, Enterprise Security

Weights & Biases Weights & Biases · Data AI · Bellevue, WA +4 · Technology

Senior Security Engineer focused on enterprise security, identity and access management, zero trust, and phishing-resistant MFA. Responsibilities include designing and implementing security controls for workforce, endpoints, networks, and SaaS applications, with a strong emphasis on automation and building secure-by-default experiences. The role involves hands-on engineering, architecture, and program ownership in a cloud-native environment.

What you'd actually do

  1. Design, implement, and operate workforce identity solutions (e.g., Okta/Entra and other IdPs) including SSO, MFA, conditional access, and lifecycle automation via SCIM.
  2. Develop and roll out phishing-resistant MFA for high-value accounts and critical access paths (e.g., FIDO2/WebAuthn, hardware keys, device-bound authenticators).
  3. Define and maintain RBAC/IAM patterns for enterprise applications (role models, groups, entitlements, JIT access, and approvals).
  4. Design and deploy controls that combine user identity, device posture, network context, and application sensitivity to enforce least-privilege access.
  5. Evaluate, onboard, and harden SaaS applications (Google Workspace, Microsoft 365, Slack, HRIS, ticketing, and other business apps) to align with enterprise security policies.

Skills

Required

  • 5+ years of experience in enterprise security, identity and access management, or closely related security engineering roles.
  • Strong, practical understanding of modern IAM concepts: SSO, federation, RBAC/ABAC, JIT access, least privilege, and separation of duties.
  • Hands-on experience implementing and operating SSO and workforce identity with platforms such as Okta, Entra ID, or equivalent IdPs.
  • Deep familiarity with SAML, OAuth 2.0/OIDC, and SCIM, including real-world experience integrating these protocols with third-party SaaS and internal apps.
  • Demonstrated experience designing and rolling out MFA, ideally including phishing-resistant approaches (FIDO2/WebAuthn, hardware security keys, device-bound authenticators, step-up authentication).
  • Experience designing and deploying zero trust or context-aware access controls (e.g., device trust, network segmentation, mTLS, ZTNA) in hybrid or remote-friendly environments.
  • Proficiency in at least one modern scripting or programming language (e.g., Python, Go) used to build automation.

What the JD emphasized

  • phishing-resistant MFA
  • zero trust
  • hands-on engineering
  • architecture and program ownership
  • user identity, device posture, network context, and application sensitivity
  • zero trust network access (ZTNA)
  • Python
  • Go