Software Engineer II - Identity & Access Management (core Infra Io)

Klaviyo Klaviyo · Enterprise · Boston, MA · Engineering

Software Engineer II on the Core Infrastructure – Identity & Organizations (Core IO) pillar, focusing on the Identity & Access Management (IAM) team. This role will design and build services for authentication, authorization, login, sessions, permissions, and secure service APIs. The engineer will contribute to platform extraction, build shared SDKs, and collaborate with other teams on security and compliance. The role requires experience in backend services, security/identity concepts, and a platform/infra mindset. While not AI-focused, the candidate is expected to have experimented with AI tools.

What you'd actually do

  1. Own features end-to-end across design, implementation, rollout, and observability for core authN/Z capabilities such as login flows, MFA, SSO enhancements, SCIM, sessions, and role/permission enforcement.
  2. Contribute to auth platform extraction: Help move authentication and authorization paths out of the legacy monolith into dedicated micro services, including token verification, API key services, and internal service auth behind Kong and IdP platform.
  3. Build and maintain shared SDKs and contracts that let internal teams adopt IAM services quickly (OAuth, machine auth, org-scoped authZ), making “secure by default” the simplest option for new surfaces and agents.
  4. Collaborate with Organizations & Accounts to support org-scoped identity, multi-account SSO, and flexible org/account models that underpin enterprise experiences and cross-account analytics.
  5. Partner with Platform Integrity & Protection (PAA), Security, and Compliance on secure patterns for account protection (MFA, recovery, device/session risk), ensuring IAM is a strong foundation for account security and anti-abuse controls.

Skills

Required

  • 2-5+ years of professional software engineering experience.
  • Proficiency in at least one of Python, Go, or TypeScript/JavaScript, and comfort working on backend and/or service-oriented systems.
  • Experience building or operating web services or APIs backed by relational databases and/or caches (e.g., MySQL, Postgres, Redis).
  • Familiarity with authentication or authorization concepts (sessions, tokens, OAuth, SSO, MFA, RBAC) and an interest in going much deeper.
  • Exposure to CI/CD pipelines and modern development workflows (code review, testing, deployments, on-call participation or support).

Nice to have

  • Building or integrating with IdPs and identity protocols (SAML/OIDC, enterprise SSO, SCIM, OAuth, API key management).
  • Working with cloud

What the JD emphasized

  • enterprise-grade platform
  • SSO/SCIM/RBAC/ReBAC
  • secure-by-default patterns
  • secure patterns for account protection
  • account security and anti-abuse controls