Software Engineer II - Identity & Access Management

Klaviyo Klaviyo · Enterprise · Boston, MA · Engineering

Software Engineer II on the Identity & Access Management team at Klaviyo. This role focuses on building and operating the centralized authentication and authorization platform, including login, SSO, MFA, SCIM, and API auth. The engineer will own features end-to-end, contribute to platform extraction into microservices, build shared SDKs, and collaborate with other teams on security and compliance. The role requires experience in backend/full-stack services, strong fundamentals, and a motivation for security and identity problems. Familiarity with AI tools and workflows is a plus.

What you'd actually do

  1. Own features end-to-end across design, implementation, rollout, and observability for core authN/Z capabilities such as login flows, MFA, SSO enhancements, SCIM, sessions, and role/permission enforcement.
  2. Contribute to auth platform extraction: Help move authentication and authorization paths out of the legacy monolith into dedicated micro services, including token verification, API key services, and internal service auth behind Kong and IdP platform.
  3. Build and maintain shared SDKs and contracts that let internal teams adopt IAM services quickly (OAuth, machine auth, org-scoped authZ), making “secure by default” the simplest option for new surfaces and agents.
  4. Collaborate with Organizations & Accounts to support org-scoped identity, multi-account SSO, and flexible org/account models that underpin enterprise experiences and cross-account analytics.
  5. Partner with Platform Integrity & Protection (PAA), Security, and Compliance on secure patterns for account protection (MFA, recovery, device/session risk), ensuring IAM is a strong foundation for account security and anti-abuse controls.

Skills

Required

  • 2-5+ years of professional software engineering experience.
  • Proficiency in at least one of Python, Go, or TypeScript/JavaScript, and comfort working on backend and/or service-oriented systems.
  • Experience building or operating web services or APIs backed by relational databases and/or caches (e.g., MySQL, Postgres, Redis).
  • Familiarity with authentication or authorization concepts (sessions, tokens, OAuth, SSO, MFA, RBAC) and an interest in going much deeper.
  • Exposure to CI/CD pipelines and modern development workflows (code review, testing, deployments, on-call participation or support).

Nice to have

  • Building or integrating with IdPs and identity protocols (SAML/OIDC, enterprise SSO, SCIM, OAuth, API key management).
  • Working with cloud

What the JD emphasized

  • enterprise-grade platform
  • enterprise deal wins
  • enterprise experiences