Staff, Software Engineer, Information Security

Walmart · Retail · Bangalore, KA, India

Staff Software Engineer to lead the architecture and engineering of Walmart’s enterprise Single Sign-On (SSO) platform within Identity and Access Management (IAM). This role will drive the design of scalable, cloud-native authentication systems leveraging modern Zero Trust principles and advance the next-generation AI-enabled authentication platform using adaptive and agentic security capabilities.

What you'd actually do

  1. Lead the secure design and development of scalable SSO and federation platforms, partnering closely with IAM, application, platform, and security engineering teams.
  2. Architect and implement authentication and identity solutions using standards such as OAuth 2.0, OpenID Connect (OIDC), SAML 2.0, SCIM, and LDAP/AD.
  3. Design and build high-performance authentication services using Java, Go, Python, and modern frontend technologies, integrating with REST APIs and identity stores.
  4. Develop and enhance identity lifecycle flows including login, MFA, adaptive authentication, token issuance/validation, session management, and secure logout.
  5. Drive modernization initiatives such as Zero Trust authentication, password less authentication (FIDO2/WebAuth), and device trust integration.

Skills

Required

  • 10+ years of experience designing, building, and operating highly scalable, distributed authentication or identity platforms.
  • Deep hands-on expertise in Java, Go, or Python, with strong backend system design fundamentals.
  • Proven experience implementing and scaling SSO and federation technologies, including: OAuth 2.0, OpenID Connect (OIDC), SAML 2.0, SCIM, LDAP / Active Directory
  • Strong understanding of authentication flows (Authorization Code + PKCE, Client Credentials, Device Code, Token Exchange).
  • Experience implementing and securing: JWT and opaque tokens, Token introspection and revocation, Secure session management
  • Hands-on experience with MFA, adaptive authentication, risk-based authentication, and password less authentication (FIDO2/WebAuth).
  • Experience working with Identity Providers (e.g., Azure AD, Okta, Ping, custom IdPs).
  • Strong understanding of identity threat detection and response, including session risk, credential abuse detection, and policy enforcement.
  • Exposure to AI/ML-driven security systems, such as: Behavioral analytics, Risk scoring models, Anomaly detection systems, Automated response orchestration
  • Interest or experience in building Agentic AI systems capable of: Autonomous policy evaluation and enforcement, Security signal aggregation and contextual reasoning, Continuous feedback loops for improving authentication decisions
  • Strong knowledge of cryptography fundamentals, PKI, key lifecycle management, and secure token signing (RSA/ECDSA).
  • Experience building cloud-native identity systems in Azure or GCP, using Docker and Kubernetes.
  • Strong Linux fundamentals and troubleshooting skills.
  • Proven ability to influence cross-functional teams and drive enterprise-wide IAM standards.
  • Excellent communication skills, with the ability to translate complex authentication, AI, and risk concepts into clear business and engineering guidance.

Nice to have

  • Security certifications such as CISSP, CSSLP, GIAC, or Cloud Security certifications

What the JD emphasized

  • AI-enabled authentication platform
  • agentic security capabilities
  • Agentic AI capabilities
  • AI-driven adaptive authentication mechanisms
  • behavioral signals
  • contextual risk scoring
  • anomaly detection
  • Dynamically adjust access policies based on risk posture
  • Detect credential abuse or session hijacking in real time
  • Recommend or autonomously enforce remediation actions
  • Continuously learn from telemetry and endpoint signals
  • AI-based identity intelligence
  • privacy and compliance
  • identity threat detection and response
  • session risk
  • credential abuse detection
  • policy enforcement
  • AI/ML-driven security systems
  • Behavioral analytics
  • Risk scoring models
  • Anomaly detection systems
  • Automated response orchestration
  • Agentic AI systems
  • Autonomous policy evaluation and enforcement
  • Security signal aggregation and contextual reasoning
  • Continuous feedback loops for improving authentication decisions

Other signals

  • AI-enabled authentication platform
  • adaptive and agentic security capabilities
  • Agentic AI capabilities
  • AI-driven adaptive authentication mechanisms