Senior Security Engineer, Iam

Handshake · Enterprise · San Francisco, CA · Engineering

Senior Security Engineer, IAM at Handshake. Focuses on architecture, design, and implementation of enterprise identity automation and governance. Will define IAM automation strategy, build lifecycle workflows, and enable secure identity operations across various platforms. Requires strong scripting, IAM platform experience, and understanding of identity protocols. Experience with GCP IAM, Okta Workflows, or PAM is a plus.

What you'd actually do

  1. Architect, build, and own automated onboarding, offboarding, and access-change workflows across Okta, Workday, SCIM, and event-driven systems.
  2. Engineer integration layers between identity platforms and internal applications using Python, REST APIs, Webhooks, and Terraform.
  3. Implement error-handling, reconciliation logic, telemetry, and monitoring to ensure reliability and determinism in identity lifecycle events.
  4. Modernize existing provisioning logic and replace manual processes with scalable automation frameworks.
  5. Develop tooling and pipelines enabling version-controlled, testable, observable IAM automation.

Skills

Required

  • Python
  • Node.js
  • REST APIs
  • SCIM
  • Okta
  • Google Workspace
  • GCP
  • Azure AD
  • Terraform
  • OIDC
  • OAuth2
  • SAML
  • JWT
  • RBAC
  • ABAC
  • DevOps practices
  • observability
  • secure engineering principles

Nice to have

  • GCP IAM
  • AWS IAM
  • Okta Workflows
  • SailPoint/IGA
  • Privileged Access Management (PAM)
  • CISSP

What the JD emphasized

  • own the architecture, design, and implementation
  • define the long-term IAM automation strategy
  • build resilient and scalable lifecycle workflows
  • enable secure-by-default identity operations
  • highly automated, auditable, and reliable identity solutions
  • automated onboarding, offboarding, and access-change workflows
  • Engineer integration layers
  • Implement error-handling, reconciliation logic, telemetry, and monitoring
  • Modernize existing provisioning logic
  • replace manual processes with scalable automation frameworks
  • Develop tooling and pipelines enabling version-controlled, testable, observable IAM automation
  • technical owner for Handshake’s IAM ecosystem
  • Engineer and optimize authentication & authorization protocols
  • fine-grained access policies
  • scalable RBAC/ABAC models
  • Build custom automation
  • Design SOC2-compliant access controls, approvals, attestations, and auditability mechanisms
  • Build automated access certification systems with full data lineage
  • Conduct identity-related incident forensics and implement preventative automation
  • Provide cross-functional leadership, setting standards, best practices, and reference architectures for identity automation
  • Serve as service owner for IAM automation platforms with accountability for uptime, consistency, and continuous improvement
  • 4–7+ years of hands-on IAM engineering, identity automation, or identity governance experience
  • Strong scripting/automation skills in Python, Node.js, and REST-based integrations
  • Experience with IAM platforms such as Okta, Google Workspace/GCP, Azure AD, or similar
  • Deep understanding of identity protocols, token flows, SCIM, and distributed lifecycle orchestration
  • Experience with Terraform or other infrastructure-as-code frameworks
  • Ability to diagnose complex identity issues across SaaS, cloud, and distributed systems
  • Strong understanding of DevOps practices, observability, and secure engineering principles
  • Demonstrated ownership mindset across architecture, implementation, monitoring, and iterative improvement