Back to all jobs

Software Architect

Cyber Ark

Apr 12

Open to Remote Work

 

About CyberArk:

CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArkLinkedIn or Facebook.

 

Job Description:

We are looking for a passionate and seasoned leader in Identity to guide our team of engineers to improve and expand our Identity Access Management (IAM/CIAM) offering. IAM sits at the core of our service and spans a broad technology scope including Authentication Protocols, Multi Factor Authentication (MFA), Login Experience, Authorization, and Threat Intelligence. You will share our passion, leverage data and experience to make bold recommendations to strengthen scale, performance, and create rich features into high-quality next-generation software.

 

Responsibilities:

  • Provide technical and architectural guidance in building the next-gen Identity Security Platform.
  • Develop and drive the implementation of new features, improvements, and fixes that need to handle our current and future scale.
  • As an enthusiastic technologist, stay up to date with technological trends in industry and continuously motivate engineers to leverage the best-in-class technology in building enterprise-scale software.
  • Help with design and code reviews. Ensure good engineering practices are being applied.

 

Requirements:

  • 5+ years of hands-on technical experience with building enterprise-scale SaaS products, preferably around Identity and Access Management.  CIAM is a plus.
  • 3+ years of experience in Identity
  • Deep working knowledge and experience with information security standard, standards-based authentication, and authorization protocols, directory services, data analysis and modeling tools, encryption and PKI, SIEM, etc.
  • Hands-on technical knowledge of Software Security, Multi-tenancy, Scalability, and High Availability.
  • Experience with Agile software development balanced with enterprise software customer needs. Solid understanding of enterprise-grade applications, business processes, and use of the latest technologies.
  • Experience working at high growth, a fast-paced technology company.
  • Stay up to date with emerging technology trends and provide technical mentorship for the team.
  • BS or equivalent degree in Computer Science/Electrical Engineering.

 

 

CyberArk is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

 

CyberArk may, if required by applicable law, implement a mandatory vaccination policy as a condition of employment, subject to reasonable accommodation where required by law.

 

Recruiting agencies or vendors without a valid agreement between the parties are not authorized to (a) send CyberArk unsolicited resumes or candidate data or (b) contact CyberArk employees for the purposes of presenting candidates for employment. CyberArk will only work with recruiting agencies who have a valid agreement with CyberArk and that are specifically invited by CyberArk’s recruiting team to assist with searching for and submitting candidates for a specific position. Any unsolicited resumes or other candidate data submitted to CyberArk will not be accepted and shall be considered CyberArk’s property. CyberArk will not pay any placement or other fees of any kind for any unsolicited resumes or candidate data that is submitted in violation of this policy. CyberArk does not accept liability under any legal theory such as course of conduct, oral agreements, implied contracts, or otherwise based on negotiations with a candidate identified from an unsolicited resume or data in violation of this policy.